May 17 00:33:39.110681 kernel: Linux version 5.15.182-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri May 16 23:09:52 -00 2025 May 17 00:33:39.110726 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=4aad7caeadb0359f379975532748a0b4ae6bb9b229507353e0f5ae84cb9335a0 May 17 00:33:39.110744 kernel: BIOS-provided physical RAM map: May 17 00:33:39.110758 kernel: BIOS-e820: [mem 0x0000000000000000-0x0000000000000fff] reserved May 17 00:33:39.110769 kernel: BIOS-e820: [mem 0x0000000000001000-0x0000000000054fff] usable May 17 00:33:39.110781 kernel: BIOS-e820: [mem 0x0000000000055000-0x000000000005ffff] reserved May 17 00:33:39.110800 kernel: BIOS-e820: [mem 0x0000000000060000-0x0000000000097fff] usable May 17 00:33:39.110813 kernel: BIOS-e820: [mem 0x0000000000098000-0x000000000009ffff] reserved May 17 00:33:39.110827 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bd277fff] usable May 17 00:33:39.110840 kernel: BIOS-e820: [mem 0x00000000bd278000-0x00000000bd281fff] ACPI data May 17 00:33:39.110855 kernel: BIOS-e820: [mem 0x00000000bd282000-0x00000000bf8ecfff] usable May 17 00:33:39.110868 kernel: BIOS-e820: [mem 0x00000000bf8ed000-0x00000000bfb6cfff] reserved May 17 00:33:39.110881 kernel: BIOS-e820: [mem 0x00000000bfb6d000-0x00000000bfb7efff] ACPI data May 17 00:33:39.110895 kernel: BIOS-e820: [mem 0x00000000bfb7f000-0x00000000bfbfefff] ACPI NVS May 17 00:33:39.110917 kernel: BIOS-e820: [mem 0x00000000bfbff000-0x00000000bffdffff] usable May 17 00:33:39.110946 kernel: BIOS-e820: [mem 0x00000000bffe0000-0x00000000bfffffff] reserved May 17 00:33:39.110961 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000021fffffff] usable May 17 00:33:39.110976 kernel: NX (Execute Disable) protection: active May 17 00:33:39.110991 kernel: efi: EFI v2.70 by EDK II May 17 00:33:39.111007 kernel: efi: TPMFinalLog=0xbfbf7000 ACPI=0xbfb7e000 ACPI 2.0=0xbfb7e014 SMBIOS=0xbf9e8000 RNG=0xbfb73018 TPMEventLog=0xbd278018 May 17 00:33:39.111022 kernel: random: crng init done May 17 00:33:39.111036 kernel: SMBIOS 2.4 present. May 17 00:33:39.111055 kernel: DMI: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 May 17 00:33:39.111070 kernel: Hypervisor detected: KVM May 17 00:33:39.111085 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 May 17 00:33:39.111100 kernel: kvm-clock: cpu 0, msr 10619a001, primary cpu clock May 17 00:33:39.111115 kernel: kvm-clock: using sched offset of 13700044497 cycles May 17 00:33:39.111131 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns May 17 00:33:39.111147 kernel: tsc: Detected 2299.998 MHz processor May 17 00:33:39.111162 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved May 17 00:33:39.111179 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable May 17 00:33:39.111194 kernel: last_pfn = 0x220000 max_arch_pfn = 0x400000000 May 17 00:33:39.111212 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 17 00:33:39.111227 kernel: last_pfn = 0xbffe0 max_arch_pfn = 0x400000000 May 17 00:33:39.111242 kernel: Using GB pages for direct mapping May 17 00:33:39.111257 kernel: Secure boot disabled May 17 00:33:39.111272 kernel: ACPI: Early table checksum verification disabled May 17 00:33:39.111287 kernel: ACPI: RSDP 0x00000000BFB7E014 000024 (v02 Google) May 17 00:33:39.111303 kernel: ACPI: XSDT 0x00000000BFB7D0E8 00005C (v01 Google GOOGFACP 00000001 01000013) May 17 00:33:39.111319 kernel: ACPI: FACP 0x00000000BFB78000 0000F4 (v02 Google GOOGFACP 00000001 GOOG 00000001) May 17 00:33:39.111344 kernel: ACPI: DSDT 0x00000000BFB79000 001A64 (v01 Google GOOGDSDT 00000001 GOOG 00000001) May 17 00:33:39.111379 kernel: ACPI: FACS 0x00000000BFBF2000 000040 May 17 00:33:39.111396 kernel: ACPI: SSDT 0x00000000BFB7C000 000316 (v02 GOOGLE Tpm2Tabl 00001000 INTL 20240322) May 17 00:33:39.111412 kernel: ACPI: TPM2 0x00000000BFB7B000 000034 (v04 GOOGLE 00000001 GOOG 00000001) May 17 00:33:39.111429 kernel: ACPI: SRAT 0x00000000BFB77000 0000C8 (v03 Google GOOGSRAT 00000001 GOOG 00000001) May 17 00:33:39.111445 kernel: ACPI: APIC 0x00000000BFB76000 000076 (v05 Google GOOGAPIC 00000001 GOOG 00000001) May 17 00:33:39.111465 kernel: ACPI: SSDT 0x00000000BFB75000 000980 (v01 Google GOOGSSDT 00000001 GOOG 00000001) May 17 00:33:39.111481 kernel: ACPI: WAET 0x00000000BFB74000 000028 (v01 Google GOOGWAET 00000001 GOOG 00000001) May 17 00:33:39.111497 kernel: ACPI: Reserving FACP table memory at [mem 0xbfb78000-0xbfb780f3] May 17 00:33:39.111513 kernel: ACPI: Reserving DSDT table memory at [mem 0xbfb79000-0xbfb7aa63] May 17 00:33:39.111529 kernel: ACPI: Reserving FACS table memory at [mem 0xbfbf2000-0xbfbf203f] May 17 00:33:39.111546 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb7c000-0xbfb7c315] May 17 00:33:39.111563 kernel: ACPI: Reserving TPM2 table memory at [mem 0xbfb7b000-0xbfb7b033] May 17 00:33:39.111579 kernel: ACPI: Reserving SRAT table memory at [mem 0xbfb77000-0xbfb770c7] May 17 00:33:39.111596 kernel: ACPI: Reserving APIC table memory at [mem 0xbfb76000-0xbfb76075] May 17 00:33:39.111616 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb75000-0xbfb7597f] May 17 00:33:39.111633 kernel: ACPI: Reserving WAET table memory at [mem 0xbfb74000-0xbfb74027] May 17 00:33:39.111650 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 May 17 00:33:39.111666 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 May 17 00:33:39.111682 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] May 17 00:33:39.111698 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0xbfffffff] May 17 00:33:39.111714 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x21fffffff] May 17 00:33:39.111731 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0xbfffffff] -> [mem 0x00000000-0xbfffffff] May 17 00:33:39.111747 kernel: NUMA: Node 0 [mem 0x00000000-0xbfffffff] + [mem 0x100000000-0x21fffffff] -> [mem 0x00000000-0x21fffffff] May 17 00:33:39.111767 kernel: NODE_DATA(0) allocated [mem 0x21fffa000-0x21fffffff] May 17 00:33:39.111785 kernel: Zone ranges: May 17 00:33:39.111801 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 17 00:33:39.111817 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] May 17 00:33:39.111834 kernel: Normal [mem 0x0000000100000000-0x000000021fffffff] May 17 00:33:39.111850 kernel: Movable zone start for each node May 17 00:33:39.111867 kernel: Early memory node ranges May 17 00:33:39.111884 kernel: node 0: [mem 0x0000000000001000-0x0000000000054fff] May 17 00:33:39.111900 kernel: node 0: [mem 0x0000000000060000-0x0000000000097fff] May 17 00:33:39.111921 kernel: node 0: [mem 0x0000000000100000-0x00000000bd277fff] May 17 00:33:39.111947 kernel: node 0: [mem 0x00000000bd282000-0x00000000bf8ecfff] May 17 00:33:39.111963 kernel: node 0: [mem 0x00000000bfbff000-0x00000000bffdffff] May 17 00:33:39.111979 kernel: node 0: [mem 0x0000000100000000-0x000000021fffffff] May 17 00:33:39.111996 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000021fffffff] May 17 00:33:39.112012 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 17 00:33:39.112028 kernel: On node 0, zone DMA: 11 pages in unavailable ranges May 17 00:33:39.112045 kernel: On node 0, zone DMA: 104 pages in unavailable ranges May 17 00:33:39.112061 kernel: On node 0, zone DMA32: 10 pages in unavailable ranges May 17 00:33:39.112082 kernel: On node 0, zone DMA32: 786 pages in unavailable ranges May 17 00:33:39.112099 kernel: On node 0, zone Normal: 32 pages in unavailable ranges May 17 00:33:39.112116 kernel: ACPI: PM-Timer IO Port: 0xb008 May 17 00:33:39.112132 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) May 17 00:33:39.112148 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 May 17 00:33:39.112165 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) May 17 00:33:39.112181 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) May 17 00:33:39.112196 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) May 17 00:33:39.112212 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) May 17 00:33:39.112234 kernel: ACPI: Using ACPI (MADT) for SMP configuration information May 17 00:33:39.112250 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs May 17 00:33:39.112266 kernel: [mem 0xc0000000-0xffffffff] available for PCI devices May 17 00:33:39.112283 kernel: Booting paravirtualized kernel on KVM May 17 00:33:39.112300 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 17 00:33:39.112317 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 May 17 00:33:39.112334 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 May 17 00:33:39.112350 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 May 17 00:33:39.112489 kernel: pcpu-alloc: [0] 0 1 May 17 00:33:39.112516 kernel: kvm-guest: PV spinlocks enabled May 17 00:33:39.112532 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) May 17 00:33:39.112548 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1932270 May 17 00:33:39.112561 kernel: Policy zone: Normal May 17 00:33:39.112578 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=4aad7caeadb0359f379975532748a0b4ae6bb9b229507353e0f5ae84cb9335a0 May 17 00:33:39.112594 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 17 00:33:39.112610 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) May 17 00:33:39.112625 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) May 17 00:33:39.112641 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 17 00:33:39.112662 kernel: Memory: 7515412K/7860544K available (12294K kernel code, 2276K rwdata, 13724K rodata, 47472K init, 4108K bss, 344872K reserved, 0K cma-reserved) May 17 00:33:39.112678 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 May 17 00:33:39.112695 kernel: Kernel/User page tables isolation: enabled May 17 00:33:39.112711 kernel: ftrace: allocating 34585 entries in 136 pages May 17 00:33:39.112726 kernel: ftrace: allocated 136 pages with 2 groups May 17 00:33:39.112741 kernel: rcu: Hierarchical RCU implementation. May 17 00:33:39.112758 kernel: rcu: RCU event tracing is enabled. May 17 00:33:39.112774 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. May 17 00:33:39.112795 kernel: Rude variant of Tasks RCU enabled. May 17 00:33:39.112824 kernel: Tracing variant of Tasks RCU enabled. May 17 00:33:39.112842 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 17 00:33:39.112862 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 May 17 00:33:39.112880 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 May 17 00:33:39.112898 kernel: Console: colour dummy device 80x25 May 17 00:33:39.112915 kernel: printk: console [ttyS0] enabled May 17 00:33:39.112943 kernel: ACPI: Core revision 20210730 May 17 00:33:39.112959 kernel: APIC: Switch to symmetric I/O mode setup May 17 00:33:39.112976 kernel: x2apic enabled May 17 00:33:39.112995 kernel: Switched APIC routing to physical x2apic. May 17 00:33:39.113012 kernel: ..TIMER: vector=0x30 apic1=0 pin1=0 apic2=-1 pin2=-1 May 17 00:33:39.113029 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns May 17 00:33:39.113045 kernel: Calibrating delay loop (skipped) preset value.. 4599.99 BogoMIPS (lpj=2299998) May 17 00:33:39.113062 kernel: Last level iTLB entries: 4KB 1024, 2MB 1024, 4MB 1024 May 17 00:33:39.113078 kernel: Last level dTLB entries: 4KB 1024, 2MB 1024, 4MB 1024, 1GB 4 May 17 00:33:39.113095 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization May 17 00:33:39.113116 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit May 17 00:33:39.113132 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall May 17 00:33:39.113149 kernel: Spectre V2 : Mitigation: IBRS May 17 00:33:39.113167 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT May 17 00:33:39.113184 kernel: RETBleed: Mitigation: IBRS May 17 00:33:39.113200 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier May 17 00:33:39.113217 kernel: Spectre V2 : User space: Mitigation: STIBP via seccomp and prctl May 17 00:33:39.113233 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp May 17 00:33:39.113250 kernel: MDS: Mitigation: Clear CPU buffers May 17 00:33:39.113270 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode May 17 00:33:39.113287 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' May 17 00:33:39.113304 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' May 17 00:33:39.113321 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' May 17 00:33:39.113339 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 May 17 00:33:39.113356 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. May 17 00:33:39.113388 kernel: Freeing SMP alternatives memory: 32K May 17 00:33:39.113404 kernel: pid_max: default: 32768 minimum: 301 May 17 00:33:39.113420 kernel: LSM: Security Framework initializing May 17 00:33:39.113440 kernel: SELinux: Initializing. May 17 00:33:39.114416 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) May 17 00:33:39.114441 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) May 17 00:33:39.114458 kernel: smpboot: CPU0: Intel(R) Xeon(R) CPU @ 2.30GHz (family: 0x6, model: 0x3f, stepping: 0x0) May 17 00:33:39.114476 kernel: Performance Events: unsupported p6 CPU model 63 no PMU driver, software events only. May 17 00:33:39.114494 kernel: signal: max sigframe size: 1776 May 17 00:33:39.114511 kernel: rcu: Hierarchical SRCU implementation. May 17 00:33:39.114529 kernel: NMI watchdog: Perf NMI watchdog permanently disabled May 17 00:33:39.114546 kernel: smp: Bringing up secondary CPUs ... May 17 00:33:39.114569 kernel: x86: Booting SMP configuration: May 17 00:33:39.114587 kernel: .... node #0, CPUs: #1 May 17 00:33:39.114604 kernel: kvm-clock: cpu 1, msr 10619a041, secondary cpu clock May 17 00:33:39.114623 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. May 17 00:33:39.114642 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. May 17 00:33:39.114660 kernel: smp: Brought up 1 node, 2 CPUs May 17 00:33:39.114677 kernel: smpboot: Max logical packages: 1 May 17 00:33:39.114695 kernel: smpboot: Total of 2 processors activated (9199.99 BogoMIPS) May 17 00:33:39.114716 kernel: devtmpfs: initialized May 17 00:33:39.114734 kernel: x86/mm: Memory block size: 128MB May 17 00:33:39.114752 kernel: ACPI: PM: Registering ACPI NVS region [mem 0xbfb7f000-0xbfbfefff] (524288 bytes) May 17 00:33:39.114770 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 17 00:33:39.114787 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) May 17 00:33:39.114805 kernel: pinctrl core: initialized pinctrl subsystem May 17 00:33:39.114823 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 17 00:33:39.114840 kernel: audit: initializing netlink subsys (disabled) May 17 00:33:39.114858 kernel: audit: type=2000 audit(1747442018.211:1): state=initialized audit_enabled=0 res=1 May 17 00:33:39.114878 kernel: thermal_sys: Registered thermal governor 'step_wise' May 17 00:33:39.114896 kernel: thermal_sys: Registered thermal governor 'user_space' May 17 00:33:39.114913 kernel: cpuidle: using governor menu May 17 00:33:39.114939 kernel: ACPI: bus type PCI registered May 17 00:33:39.114957 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 17 00:33:39.114974 kernel: dca service started, version 1.12.1 May 17 00:33:39.114991 kernel: PCI: Using configuration type 1 for base access May 17 00:33:39.115009 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. May 17 00:33:39.115027 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 17 00:33:39.115048 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 17 00:33:39.115066 kernel: ACPI: Added _OSI(Module Device) May 17 00:33:39.115083 kernel: ACPI: Added _OSI(Processor Device) May 17 00:33:39.115101 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 17 00:33:39.115118 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 17 00:33:39.115136 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 17 00:33:39.115154 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 17 00:33:39.115171 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 17 00:33:39.115188 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded May 17 00:33:39.115208 kernel: ACPI: Interpreter enabled May 17 00:33:39.115226 kernel: ACPI: PM: (supports S0 S3 S5) May 17 00:33:39.115243 kernel: ACPI: Using IOAPIC for interrupt routing May 17 00:33:39.115261 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 17 00:33:39.115277 kernel: ACPI: Enabled 16 GPEs in block 00 to 0F May 17 00:33:39.115294 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 17 00:33:39.115533 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] May 17 00:33:39.115700 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. May 17 00:33:39.115728 kernel: PCI host bridge to bus 0000:00 May 17 00:33:39.115889 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] May 17 00:33:39.116047 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] May 17 00:33:39.116188 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] May 17 00:33:39.116328 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfefff window] May 17 00:33:39.126226 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 17 00:33:39.126518 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 May 17 00:33:39.126715 kernel: pci 0000:00:01.0: [8086:7110] type 00 class 0x060100 May 17 00:33:39.126896 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 May 17 00:33:39.127068 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI May 17 00:33:39.127246 kernel: pci 0000:00:03.0: [1af4:1004] type 00 class 0x000000 May 17 00:33:39.127484 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc040-0xc07f] May 17 00:33:39.127659 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc0001000-0xc000107f] May 17 00:33:39.127870 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 May 17 00:33:39.128044 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc03f] May 17 00:33:39.128223 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc0000000-0xc000007f] May 17 00:33:39.135442 kernel: pci 0000:00:05.0: [1af4:1005] type 00 class 0x00ff00 May 17 00:33:39.135647 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc080-0xc09f] May 17 00:33:39.135814 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xc0002000-0xc000203f] May 17 00:33:39.135836 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 May 17 00:33:39.135862 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 May 17 00:33:39.135880 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 May 17 00:33:39.135897 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 May 17 00:33:39.135914 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 May 17 00:33:39.135932 kernel: iommu: Default domain type: Translated May 17 00:33:39.135949 kernel: iommu: DMA domain TLB invalidation policy: lazy mode May 17 00:33:39.135965 kernel: vgaarb: loaded May 17 00:33:39.135982 kernel: pps_core: LinuxPPS API ver. 1 registered May 17 00:33:39.135998 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 17 00:33:39.136018 kernel: PTP clock support registered May 17 00:33:39.136036 kernel: Registered efivars operations May 17 00:33:39.136053 kernel: PCI: Using ACPI for IRQ routing May 17 00:33:39.136069 kernel: PCI: pci_cache_line_size set to 64 bytes May 17 00:33:39.136087 kernel: e820: reserve RAM buffer [mem 0x00055000-0x0005ffff] May 17 00:33:39.136103 kernel: e820: reserve RAM buffer [mem 0x00098000-0x0009ffff] May 17 00:33:39.136120 kernel: e820: reserve RAM buffer [mem 0xbd278000-0xbfffffff] May 17 00:33:39.136136 kernel: e820: reserve RAM buffer [mem 0xbf8ed000-0xbfffffff] May 17 00:33:39.136153 kernel: e820: reserve RAM buffer [mem 0xbffe0000-0xbfffffff] May 17 00:33:39.136173 kernel: clocksource: Switched to clocksource kvm-clock May 17 00:33:39.136189 kernel: VFS: Disk quotas dquot_6.6.0 May 17 00:33:39.136205 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 17 00:33:39.136222 kernel: pnp: PnP ACPI init May 17 00:33:39.136238 kernel: pnp: PnP ACPI: found 7 devices May 17 00:33:39.136265 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 17 00:33:39.136282 kernel: NET: Registered PF_INET protocol family May 17 00:33:39.136299 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) May 17 00:33:39.136317 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) May 17 00:33:39.136337 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 17 00:33:39.136355 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) May 17 00:33:39.142051 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) May 17 00:33:39.142080 kernel: TCP: Hash tables configured (established 65536 bind 65536) May 17 00:33:39.142099 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) May 17 00:33:39.142117 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) May 17 00:33:39.142135 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 17 00:33:39.142153 kernel: NET: Registered PF_XDP protocol family May 17 00:33:39.142428 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] May 17 00:33:39.142594 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] May 17 00:33:39.142744 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] May 17 00:33:39.142893 kernel: pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfefff window] May 17 00:33:39.143067 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers May 17 00:33:39.143091 kernel: PCI: CLS 0 bytes, default 64 May 17 00:33:39.143110 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) May 17 00:33:39.143134 kernel: software IO TLB: mapped [mem 0x00000000b7f7f000-0x00000000bbf7f000] (64MB) May 17 00:33:39.143152 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer May 17 00:33:39.143171 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns May 17 00:33:39.143189 kernel: clocksource: Switched to clocksource tsc May 17 00:33:39.143207 kernel: Initialise system trusted keyrings May 17 00:33:39.143223 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 May 17 00:33:39.143240 kernel: Key type asymmetric registered May 17 00:33:39.143265 kernel: Asymmetric key parser 'x509' registered May 17 00:33:39.143282 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 17 00:33:39.143304 kernel: io scheduler mq-deadline registered May 17 00:33:39.143322 kernel: io scheduler kyber registered May 17 00:33:39.143340 kernel: io scheduler bfq registered May 17 00:33:39.143357 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 May 17 00:33:39.143390 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 May 17 00:33:39.143566 kernel: virtio-pci 0000:00:03.0: virtio_pci: leaving for legacy driver May 17 00:33:39.143590 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 10 May 17 00:33:39.143751 kernel: virtio-pci 0000:00:04.0: virtio_pci: leaving for legacy driver May 17 00:33:39.143773 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 May 17 00:33:39.143960 kernel: virtio-pci 0000:00:05.0: virtio_pci: leaving for legacy driver May 17 00:33:39.143984 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 17 00:33:39.144002 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 17 00:33:39.144020 kernel: 00:04: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A May 17 00:33:39.144038 kernel: 00:05: ttyS2 at I/O 0x3e8 (irq = 6, base_baud = 115200) is a 16550A May 17 00:33:39.144055 kernel: 00:06: ttyS3 at I/O 0x2e8 (irq = 7, base_baud = 115200) is a 16550A May 17 00:33:39.144229 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x9009, rev-id 0) May 17 00:33:39.144263 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 May 17 00:33:39.144285 kernel: i8042: Warning: Keylock active May 17 00:33:39.144303 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 May 17 00:33:39.144321 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 May 17 00:33:39.144514 kernel: rtc_cmos 00:00: RTC can wake from S4 May 17 00:33:39.144674 kernel: rtc_cmos 00:00: registered as rtc0 May 17 00:33:39.144830 kernel: rtc_cmos 00:00: setting system clock to 2025-05-17T00:33:38 UTC (1747442018) May 17 00:33:39.144990 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram May 17 00:33:39.145015 kernel: intel_pstate: CPU model not supported May 17 00:33:39.145039 kernel: pstore: Registered efi as persistent store backend May 17 00:33:39.145057 kernel: NET: Registered PF_INET6 protocol family May 17 00:33:39.145076 kernel: Segment Routing with IPv6 May 17 00:33:39.145094 kernel: In-situ OAM (IOAM) with IPv6 May 17 00:33:39.145112 kernel: NET: Registered PF_PACKET protocol family May 17 00:33:39.145129 kernel: Key type dns_resolver registered May 17 00:33:39.145147 kernel: IPI shorthand broadcast: enabled May 17 00:33:39.145165 kernel: sched_clock: Marking stable (733807190, 154372368)->(953515328, -65335770) May 17 00:33:39.145183 kernel: registered taskstats version 1 May 17 00:33:39.145203 kernel: Loading compiled-in X.509 certificates May 17 00:33:39.145221 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 May 17 00:33:39.145239 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.182-flatcar: 01ca23caa8e5879327538f9287e5164b3e97ac0c' May 17 00:33:39.145265 kernel: Key type .fscrypt registered May 17 00:33:39.145283 kernel: Key type fscrypt-provisioning registered May 17 00:33:39.145301 kernel: pstore: Using crash dump compression: deflate May 17 00:33:39.145319 kernel: ima: Allocated hash algorithm: sha1 May 17 00:33:39.145336 kernel: ima: No architecture policies found May 17 00:33:39.145354 kernel: clk: Disabling unused clocks May 17 00:33:39.145520 kernel: Freeing unused kernel image (initmem) memory: 47472K May 17 00:33:39.145538 kernel: Write protecting the kernel read-only data: 28672k May 17 00:33:39.145555 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K May 17 00:33:39.145572 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K May 17 00:33:39.145589 kernel: Run /init as init process May 17 00:33:39.145606 kernel: with arguments: May 17 00:33:39.145641 kernel: /init May 17 00:33:39.145657 kernel: with environment: May 17 00:33:39.145674 kernel: HOME=/ May 17 00:33:39.145697 kernel: TERM=linux May 17 00:33:39.145714 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 17 00:33:39.145735 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 17 00:33:39.145756 systemd[1]: Detected virtualization kvm. May 17 00:33:39.145774 systemd[1]: Detected architecture x86-64. May 17 00:33:39.145791 systemd[1]: Running in initrd. May 17 00:33:39.145808 systemd[1]: No hostname configured, using default hostname. May 17 00:33:39.145841 systemd[1]: Hostname set to . May 17 00:33:39.145866 systemd[1]: Initializing machine ID from VM UUID. May 17 00:33:39.145886 systemd[1]: Queued start job for default target initrd.target. May 17 00:33:39.145904 systemd[1]: Started systemd-ask-password-console.path. May 17 00:33:39.145923 systemd[1]: Reached target cryptsetup.target. May 17 00:33:39.145941 systemd[1]: Reached target paths.target. May 17 00:33:39.145960 systemd[1]: Reached target slices.target. May 17 00:33:39.145977 systemd[1]: Reached target swap.target. May 17 00:33:39.145998 systemd[1]: Reached target timers.target. May 17 00:33:39.146017 systemd[1]: Listening on iscsid.socket. May 17 00:33:39.146034 systemd[1]: Listening on iscsiuio.socket. May 17 00:33:39.146052 systemd[1]: Listening on systemd-journald-audit.socket. May 17 00:33:39.146069 systemd[1]: Listening on systemd-journald-dev-log.socket. May 17 00:33:39.146102 systemd[1]: Listening on systemd-journald.socket. May 17 00:33:39.146124 systemd[1]: Listening on systemd-networkd.socket. May 17 00:33:39.146144 systemd[1]: Listening on systemd-udevd-control.socket. May 17 00:33:39.146167 systemd[1]: Listening on systemd-udevd-kernel.socket. May 17 00:33:39.146185 systemd[1]: Reached target sockets.target. May 17 00:33:39.146221 systemd[1]: Starting kmod-static-nodes.service... May 17 00:33:39.146242 systemd[1]: Finished network-cleanup.service. May 17 00:33:39.146273 systemd[1]: Starting systemd-fsck-usr.service... May 17 00:33:39.146306 systemd[1]: Starting systemd-journald.service... May 17 00:33:39.146328 systemd[1]: Starting systemd-modules-load.service... May 17 00:33:39.146352 systemd[1]: Starting systemd-resolved.service... May 17 00:33:39.146454 systemd[1]: Starting systemd-vconsole-setup.service... May 17 00:33:39.146474 systemd[1]: Finished kmod-static-nodes.service. May 17 00:33:39.146519 kernel: audit: type=1130 audit(1747442019.127:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:39.146545 systemd[1]: Finished systemd-fsck-usr.service. May 17 00:33:39.146566 kernel: audit: type=1130 audit(1747442019.135:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:39.146587 systemd[1]: Finished systemd-vconsole-setup.service. May 17 00:33:39.146612 systemd-journald[189]: Journal started May 17 00:33:39.146714 systemd-journald[189]: Runtime Journal (/run/log/journal/9a1270d9d220927325ed9678dddb1611) is 8.0M, max 148.8M, 140.8M free. May 17 00:33:39.127000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:39.135000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:39.147689 systemd-modules-load[190]: Inserted module 'overlay' May 17 00:33:39.171929 systemd[1]: Started systemd-journald.service. May 17 00:33:39.171974 kernel: audit: type=1130 audit(1747442019.153:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:39.172002 kernel: audit: type=1130 audit(1747442019.161:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:39.153000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:39.161000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:39.164439 systemd[1]: Starting dracut-cmdline-ask.service... May 17 00:33:39.172802 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 17 00:33:39.185000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:39.186296 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 17 00:33:39.191387 kernel: audit: type=1130 audit(1747442019.185:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:39.202663 systemd-resolved[191]: Positive Trust Anchors: May 17 00:33:39.203111 systemd-resolved[191]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 17 00:33:39.203298 systemd-resolved[191]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 17 00:33:39.210087 systemd-resolved[191]: Defaulting to hostname 'linux'. May 17 00:33:39.212116 systemd[1]: Started systemd-resolved.service. May 17 00:33:39.212311 systemd[1]: Reached target nss-lookup.target. May 17 00:33:39.210000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:39.216463 kernel: audit: type=1130 audit(1747442019.210:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:39.216871 systemd[1]: Finished dracut-cmdline-ask.service. May 17 00:33:39.216000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:39.219788 systemd[1]: Starting dracut-cmdline.service... May 17 00:33:39.227493 kernel: audit: type=1130 audit(1747442019.216:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:39.242474 dracut-cmdline[205]: dracut-dracut-053 May 17 00:33:39.248502 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 17 00:33:39.248538 dracut-cmdline[205]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=4aad7caeadb0359f379975532748a0b4ae6bb9b229507353e0f5ae84cb9335a0 May 17 00:33:39.257489 kernel: Bridge firewalling registered May 17 00:33:39.255096 systemd-modules-load[190]: Inserted module 'br_netfilter' May 17 00:33:39.285395 kernel: SCSI subsystem initialized May 17 00:33:39.306174 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 17 00:33:39.306251 kernel: device-mapper: uevent: version 1.0.3 May 17 00:33:39.308393 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 17 00:33:39.313077 systemd-modules-load[190]: Inserted module 'dm_multipath' May 17 00:33:39.314783 systemd[1]: Finished systemd-modules-load.service. May 17 00:33:39.323000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:39.325711 systemd[1]: Starting systemd-sysctl.service... May 17 00:33:39.337500 kernel: audit: type=1130 audit(1747442019.323:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:39.339775 systemd[1]: Finished systemd-sysctl.service. May 17 00:33:39.350499 kernel: audit: type=1130 audit(1747442019.342:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:39.342000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:39.361393 kernel: Loading iSCSI transport class v2.0-870. May 17 00:33:39.382391 kernel: iscsi: registered transport (tcp) May 17 00:33:39.409480 kernel: iscsi: registered transport (qla4xxx) May 17 00:33:39.409561 kernel: QLogic iSCSI HBA Driver May 17 00:33:39.456410 systemd[1]: Finished dracut-cmdline.service. May 17 00:33:39.455000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:39.457874 systemd[1]: Starting dracut-pre-udev.service... May 17 00:33:39.520457 kernel: raid6: avx2x4 gen() 18080 MB/s May 17 00:33:39.541417 kernel: raid6: avx2x4 xor() 7948 MB/s May 17 00:33:39.562411 kernel: raid6: avx2x2 gen() 17991 MB/s May 17 00:33:39.583405 kernel: raid6: avx2x2 xor() 18599 MB/s May 17 00:33:39.604409 kernel: raid6: avx2x1 gen() 13728 MB/s May 17 00:33:39.625436 kernel: raid6: avx2x1 xor() 16037 MB/s May 17 00:33:39.646414 kernel: raid6: sse2x4 gen() 10989 MB/s May 17 00:33:39.667404 kernel: raid6: sse2x4 xor() 6802 MB/s May 17 00:33:39.688417 kernel: raid6: sse2x2 gen() 11781 MB/s May 17 00:33:39.709404 kernel: raid6: sse2x2 xor() 7415 MB/s May 17 00:33:39.730405 kernel: raid6: sse2x1 gen() 10469 MB/s May 17 00:33:39.756783 kernel: raid6: sse2x1 xor() 5195 MB/s May 17 00:33:39.756859 kernel: raid6: using algorithm avx2x4 gen() 18080 MB/s May 17 00:33:39.756884 kernel: raid6: .... xor() 7948 MB/s, rmw enabled May 17 00:33:39.761864 kernel: raid6: using avx2x2 recovery algorithm May 17 00:33:39.787404 kernel: xor: automatically using best checksumming function avx May 17 00:33:39.901395 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no May 17 00:33:39.912678 systemd[1]: Finished dracut-pre-udev.service. May 17 00:33:39.911000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:39.912000 audit: BPF prog-id=7 op=LOAD May 17 00:33:39.912000 audit: BPF prog-id=8 op=LOAD May 17 00:33:39.914046 systemd[1]: Starting systemd-udevd.service... May 17 00:33:39.930561 systemd-udevd[388]: Using default interface naming scheme 'v252'. May 17 00:33:39.952712 systemd[1]: Started systemd-udevd.service. May 17 00:33:39.960000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:39.962840 systemd[1]: Starting dracut-pre-trigger.service... May 17 00:33:39.977533 dracut-pre-trigger[396]: rd.md=0: removing MD RAID activation May 17 00:33:40.018541 systemd[1]: Finished dracut-pre-trigger.service. May 17 00:33:40.017000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:40.019951 systemd[1]: Starting systemd-udev-trigger.service... May 17 00:33:40.088214 systemd[1]: Finished systemd-udev-trigger.service. May 17 00:33:40.095000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:40.168584 kernel: cryptd: max_cpu_qlen set to 1000 May 17 00:33:40.198391 kernel: scsi host0: Virtio SCSI HBA May 17 00:33:40.224716 kernel: AVX2 version of gcm_enc/dec engaged. May 17 00:33:40.234391 kernel: scsi 0:0:1:0: Direct-Access Google PersistentDisk 1 PQ: 0 ANSI: 6 May 17 00:33:40.259394 kernel: AES CTR mode by8 optimization enabled May 17 00:33:40.345701 kernel: sd 0:0:1:0: [sda] 25165824 512-byte logical blocks: (12.9 GB/12.0 GiB) May 17 00:33:40.404639 kernel: sd 0:0:1:0: [sda] 4096-byte physical blocks May 17 00:33:40.404912 kernel: sd 0:0:1:0: [sda] Write Protect is off May 17 00:33:40.405153 kernel: sd 0:0:1:0: [sda] Mode Sense: 1f 00 00 08 May 17 00:33:40.405393 kernel: sd 0:0:1:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA May 17 00:33:40.405618 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 17 00:33:40.405642 kernel: GPT:17805311 != 25165823 May 17 00:33:40.405665 kernel: GPT:Alternate GPT header not at the end of the disk. May 17 00:33:40.405686 kernel: GPT:17805311 != 25165823 May 17 00:33:40.405706 kernel: GPT: Use GNU Parted to correct GPT errors. May 17 00:33:40.405725 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 17 00:33:40.405746 kernel: sd 0:0:1:0: [sda] Attached SCSI disk May 17 00:33:40.460710 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 17 00:33:40.480659 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/sda6 scanned by (udev-worker) (434) May 17 00:33:40.490556 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 17 00:33:40.499792 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 17 00:33:40.530646 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 17 00:33:40.546652 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 17 00:33:40.558649 systemd[1]: Starting disk-uuid.service... May 17 00:33:40.579718 disk-uuid[503]: Primary Header is updated. May 17 00:33:40.579718 disk-uuid[503]: Secondary Entries is updated. May 17 00:33:40.579718 disk-uuid[503]: Secondary Header is updated. May 17 00:33:40.606528 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 17 00:33:40.624396 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 17 00:33:40.638392 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 17 00:33:41.636277 disk-uuid[504]: The operation has completed successfully. May 17 00:33:41.645547 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 17 00:33:41.708055 systemd[1]: disk-uuid.service: Deactivated successfully. May 17 00:33:41.714000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:41.714000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:41.708189 systemd[1]: Finished disk-uuid.service. May 17 00:33:41.725677 systemd[1]: Starting verity-setup.service... May 17 00:33:41.754392 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" May 17 00:33:41.837564 systemd[1]: Found device dev-mapper-usr.device. May 17 00:33:41.840062 systemd[1]: Mounting sysusr-usr.mount... May 17 00:33:41.866000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:41.858882 systemd[1]: Finished verity-setup.service. May 17 00:33:41.942414 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 17 00:33:41.942456 systemd[1]: Mounted sysusr-usr.mount. May 17 00:33:41.942845 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 17 00:33:41.993666 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm May 17 00:33:41.993708 kernel: BTRFS info (device sda6): using free space tree May 17 00:33:41.993731 kernel: BTRFS info (device sda6): has skinny extents May 17 00:33:41.943757 systemd[1]: Starting ignition-setup.service... May 17 00:33:41.963509 systemd[1]: Starting parse-ip-for-networkd.service... May 17 00:33:42.065544 systemd[1]: Finished parse-ip-for-networkd.service. May 17 00:33:42.087406 kernel: BTRFS info (device sda6): enabling ssd optimizations May 17 00:33:42.073000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:42.074000 audit: BPF prog-id=9 op=LOAD May 17 00:33:42.076683 systemd[1]: Starting systemd-networkd.service... May 17 00:33:42.115313 systemd[1]: Finished ignition-setup.service. May 17 00:33:42.122000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:42.117566 systemd-networkd[671]: lo: Link UP May 17 00:33:42.129000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:42.117572 systemd-networkd[671]: lo: Gained carrier May 17 00:33:42.118212 systemd-networkd[671]: Enumeration completed May 17 00:33:42.118855 systemd-networkd[671]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 17 00:33:42.120995 systemd-networkd[671]: eth0: Link UP May 17 00:33:42.196000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:42.121003 systemd-networkd[671]: eth0: Gained carrier May 17 00:33:42.211515 iscsid[683]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 17 00:33:42.211515 iscsid[683]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log May 17 00:33:42.211515 iscsid[683]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 17 00:33:42.211515 iscsid[683]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 17 00:33:42.211515 iscsid[683]: If using hardware iscsi like qla4xxx this message can be ignored. May 17 00:33:42.211515 iscsid[683]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 17 00:33:42.211515 iscsid[683]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 17 00:33:42.279000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:42.123858 systemd[1]: Started systemd-networkd.service. May 17 00:33:42.333000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:42.129510 systemd-networkd[671]: eth0: Overlong DHCP hostname received, shortened from 'ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758.c.flatcar-212911.internal' to 'ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758' May 17 00:33:42.129526 systemd-networkd[671]: eth0: DHCPv4 address 10.128.0.24/32, gateway 10.128.0.1 acquired from 169.254.169.254 May 17 00:33:42.131075 systemd[1]: Reached target network.target. May 17 00:33:42.152629 systemd[1]: Starting ignition-fetch-offline.service... May 17 00:33:42.172699 systemd[1]: Starting iscsiuio.service... May 17 00:33:42.433000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:42.441040 ignition[679]: Ignition 2.14.0 May 17 00:33:42.190661 systemd[1]: Started iscsiuio.service. May 17 00:33:42.441052 ignition[679]: Stage: fetch-offline May 17 00:33:42.198813 systemd[1]: Starting iscsid.service... May 17 00:33:42.441120 ignition[679]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:33:42.467000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:42.228761 systemd[1]: Started iscsid.service. May 17 00:33:42.441162 ignition[679]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 May 17 00:33:42.282271 systemd[1]: Starting dracut-initqueue.service... May 17 00:33:42.466906 ignition[679]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" May 17 00:33:42.299712 systemd[1]: Finished dracut-initqueue.service. May 17 00:33:42.467097 ignition[679]: parsed url from cmdline: "" May 17 00:33:42.334833 systemd[1]: Reached target remote-fs-pre.target. May 17 00:33:42.532000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:42.467103 ignition[679]: no config URL provided May 17 00:33:42.350524 systemd[1]: Reached target remote-cryptsetup.target. May 17 00:33:42.467109 ignition[679]: reading system config file "/usr/lib/ignition/user.ign" May 17 00:33:42.379655 systemd[1]: Reached target remote-fs.target. May 17 00:33:42.581000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:42.467120 ignition[679]: no config at "/usr/lib/ignition/user.ign" May 17 00:33:42.401756 systemd[1]: Starting dracut-pre-mount.service... May 17 00:33:42.467129 ignition[679]: failed to fetch config: resource requires networking May 17 00:33:42.417100 systemd[1]: Finished dracut-pre-mount.service. May 17 00:33:42.467505 ignition[679]: Ignition finished successfully May 17 00:33:42.626000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:42.468470 systemd[1]: Finished ignition-fetch-offline.service. May 17 00:33:42.481683 ignition[703]: Ignition 2.14.0 May 17 00:33:42.469812 systemd[1]: Starting ignition-fetch.service... May 17 00:33:42.481694 ignition[703]: Stage: fetch May 17 00:33:42.500506 unknown[703]: fetched base config from "system" May 17 00:33:42.481842 ignition[703]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:33:42.500522 unknown[703]: fetched base config from "system" May 17 00:33:42.481873 ignition[703]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 May 17 00:33:42.500538 unknown[703]: fetched user config from "gcp" May 17 00:33:42.489465 ignition[703]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" May 17 00:33:42.519011 systemd[1]: Finished ignition-fetch.service. May 17 00:33:42.489681 ignition[703]: parsed url from cmdline: "" May 17 00:33:42.534840 systemd[1]: Starting ignition-kargs.service... May 17 00:33:42.489686 ignition[703]: no config URL provided May 17 00:33:42.564821 systemd[1]: Finished ignition-kargs.service. May 17 00:33:42.489693 ignition[703]: reading system config file "/usr/lib/ignition/user.ign" May 17 00:33:42.583816 systemd[1]: Starting ignition-disks.service... May 17 00:33:42.489704 ignition[703]: no config at "/usr/lib/ignition/user.ign" May 17 00:33:42.620937 systemd[1]: Finished ignition-disks.service. May 17 00:33:42.489744 ignition[703]: GET http://169.254.169.254/computeMetadata/v1/instance/attributes/user-data: attempt #1 May 17 00:33:42.627909 systemd[1]: Reached target initrd-root-device.target. May 17 00:33:42.494028 ignition[703]: GET result: OK May 17 00:33:42.649535 systemd[1]: Reached target local-fs-pre.target. May 17 00:33:42.494309 ignition[703]: parsing config with SHA512: 393ad1bf61119aef7788a2994f9853daadc8671187cd5eeaf249c69b6a4ad7c4545c66083d5bbc9d85e179edc0c10ff16b978572680720e7a7307dfe2235d97c May 17 00:33:42.663575 systemd[1]: Reached target local-fs.target. May 17 00:33:42.501163 ignition[703]: fetch: fetch complete May 17 00:33:42.676577 systemd[1]: Reached target sysinit.target. May 17 00:33:42.501172 ignition[703]: fetch: fetch passed May 17 00:33:42.676704 systemd[1]: Reached target basic.target. May 17 00:33:42.501219 ignition[703]: Ignition finished successfully May 17 00:33:42.697807 systemd[1]: Starting systemd-fsck-root.service... May 17 00:33:42.547863 ignition[709]: Ignition 2.14.0 May 17 00:33:42.547874 ignition[709]: Stage: kargs May 17 00:33:42.548009 ignition[709]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:33:42.548040 ignition[709]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 May 17 00:33:42.556229 ignition[709]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" May 17 00:33:42.557729 ignition[709]: kargs: kargs passed May 17 00:33:42.557792 ignition[709]: Ignition finished successfully May 17 00:33:42.596119 ignition[715]: Ignition 2.14.0 May 17 00:33:42.596128 ignition[715]: Stage: disks May 17 00:33:42.596257 ignition[715]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:33:42.596300 ignition[715]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 May 17 00:33:42.604635 ignition[715]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" May 17 00:33:42.605925 ignition[715]: disks: disks passed May 17 00:33:42.605976 ignition[715]: Ignition finished successfully May 17 00:33:42.749515 systemd-fsck[723]: ROOT: clean, 619/1628000 files, 124060/1617920 blocks May 17 00:33:42.929304 systemd[1]: Finished systemd-fsck-root.service. May 17 00:33:42.928000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:42.930615 systemd[1]: Mounting sysroot.mount... May 17 00:33:42.966613 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 17 00:33:42.960511 systemd[1]: Mounted sysroot.mount. May 17 00:33:42.973758 systemd[1]: Reached target initrd-root-fs.target. May 17 00:33:42.992901 systemd[1]: Mounting sysroot-usr.mount... May 17 00:33:43.004122 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 17 00:33:43.004179 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 17 00:33:43.004213 systemd[1]: Reached target ignition-diskful.target. May 17 00:33:43.093252 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (729) May 17 00:33:43.093323 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm May 17 00:33:43.093349 kernel: BTRFS info (device sda6): using free space tree May 17 00:33:43.093477 kernel: BTRFS info (device sda6): has skinny extents May 17 00:33:43.020240 systemd[1]: Mounted sysroot-usr.mount. May 17 00:33:43.043353 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 17 00:33:43.115526 kernel: BTRFS info (device sda6): enabling ssd optimizations May 17 00:33:43.115567 initrd-setup-root[734]: cut: /sysroot/etc/passwd: No such file or directory May 17 00:33:43.068841 systemd[1]: Starting initrd-setup-root.service... May 17 00:33:43.148578 initrd-setup-root[758]: cut: /sysroot/etc/group: No such file or directory May 17 00:33:43.127547 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 17 00:33:43.167542 initrd-setup-root[766]: cut: /sysroot/etc/shadow: No such file or directory May 17 00:33:43.177511 initrd-setup-root[776]: cut: /sysroot/etc/gshadow: No such file or directory May 17 00:33:43.197214 systemd[1]: Finished initrd-setup-root.service. May 17 00:33:43.236653 kernel: kauditd_printk_skb: 23 callbacks suppressed May 17 00:33:43.236691 kernel: audit: type=1130 audit(1747442023.196:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:43.196000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:43.198633 systemd[1]: Starting ignition-mount.service... May 17 00:33:43.244518 systemd[1]: Starting sysroot-boot.service... May 17 00:33:43.258858 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. May 17 00:33:43.259003 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. May 17 00:33:43.284347 ignition[795]: INFO : Ignition 2.14.0 May 17 00:33:43.284347 ignition[795]: INFO : Stage: mount May 17 00:33:43.284347 ignition[795]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:33:43.284347 ignition[795]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 May 17 00:33:43.363708 kernel: audit: type=1130 audit(1747442023.298:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:43.363742 kernel: audit: type=1130 audit(1747442023.325:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:43.298000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:43.325000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:43.284812 systemd[1]: Finished sysroot-boot.service. May 17 00:33:43.395553 ignition[795]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" May 17 00:33:43.395553 ignition[795]: INFO : mount: mount passed May 17 00:33:43.395553 ignition[795]: INFO : Ignition finished successfully May 17 00:33:43.460529 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sda6 scanned by mount (804) May 17 00:33:43.460570 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm May 17 00:33:43.460612 kernel: BTRFS info (device sda6): using free space tree May 17 00:33:43.460634 kernel: BTRFS info (device sda6): has skinny extents May 17 00:33:43.460656 kernel: BTRFS info (device sda6): enabling ssd optimizations May 17 00:33:43.299899 systemd[1]: Finished ignition-mount.service. May 17 00:33:43.328146 systemd[1]: Starting ignition-files.service... May 17 00:33:43.393129 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 17 00:33:43.462880 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 17 00:33:43.501518 ignition[823]: INFO : Ignition 2.14.0 May 17 00:33:43.501518 ignition[823]: INFO : Stage: files May 17 00:33:43.501518 ignition[823]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:33:43.501518 ignition[823]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 May 17 00:33:43.501518 ignition[823]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" May 17 00:33:43.501518 ignition[823]: DEBUG : files: compiled without relabeling support, skipping May 17 00:33:43.513591 unknown[823]: wrote ssh authorized keys file for user: core May 17 00:33:43.577522 ignition[823]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 17 00:33:43.577522 ignition[823]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 17 00:33:43.577522 ignition[823]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 17 00:33:43.577522 ignition[823]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 17 00:33:43.577522 ignition[823]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 17 00:33:43.577522 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/hosts" May 17 00:33:43.577522 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(3): oem config not found in "/usr/share/oem", looking on oem partition May 17 00:33:43.577522 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3698302921" May 17 00:33:43.577522 ignition[823]: CRITICAL : files: createFilesystemsFiles: createFiles: op(3): op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3698302921": device or resource busy May 17 00:33:43.577522 ignition[823]: ERROR : files: createFilesystemsFiles: createFiles: op(3): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3698302921", trying btrfs: device or resource busy May 17 00:33:43.577522 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3698302921" May 17 00:33:43.577522 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3698302921" May 17 00:33:43.577522 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(6): [started] unmounting "/mnt/oem3698302921" May 17 00:33:43.577522 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(6): [finished] unmounting "/mnt/oem3698302921" May 17 00:33:43.577522 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/hosts" May 17 00:33:43.577522 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/helm-v3.17.0-linux-amd64.tar.gz" May 17 00:33:43.577522 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://get.helm.sh/helm-v3.17.0-linux-amd64.tar.gz: attempt #1 May 17 00:33:43.836586 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK May 17 00:33:43.923661 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/helm-v3.17.0-linux-amd64.tar.gz" May 17 00:33:43.940513 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" May 17 00:33:43.940513 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(8): oem config not found in "/usr/share/oem", looking on oem partition May 17 00:33:43.940513 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(9): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem311119464" May 17 00:33:43.940513 ignition[823]: CRITICAL : files: createFilesystemsFiles: createFiles: op(8): op(9): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem311119464": device or resource busy May 17 00:33:43.940513 ignition[823]: ERROR : files: createFilesystemsFiles: createFiles: op(8): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem311119464", trying btrfs: device or resource busy May 17 00:33:43.940513 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem311119464" May 17 00:33:43.940513 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(a): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem311119464" May 17 00:33:43.940513 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(b): [started] unmounting "/mnt/oem311119464" May 17 00:33:43.940513 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(b): [finished] unmounting "/mnt/oem311119464" May 17 00:33:43.940513 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" May 17 00:33:43.940513 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/install.sh" May 17 00:33:43.940513 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/install.sh" May 17 00:33:43.940513 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nginx.yaml" May 17 00:33:43.940513 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nginx.yaml" May 17 00:33:43.940513 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/home/core/nfs-pod.yaml" May 17 00:33:44.185509 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" May 17 00:33:44.185509 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" May 17 00:33:44.185509 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" May 17 00:33:44.185509 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(10): [started] writing file "/sysroot/etc/flatcar/update.conf" May 17 00:33:44.185509 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(10): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 17 00:33:44.185509 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(11): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" May 17 00:33:44.185509 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(11): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" May 17 00:33:44.185509 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(12): [started] writing file "/sysroot/etc/systemd/system/oem-gce.service" May 17 00:33:44.185509 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(12): oem config not found in "/usr/share/oem", looking on oem partition May 17 00:33:44.185509 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(13): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem774216137" May 17 00:33:44.185509 ignition[823]: CRITICAL : files: createFilesystemsFiles: createFiles: op(12): op(13): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem774216137": device or resource busy May 17 00:33:44.185509 ignition[823]: ERROR : files: createFilesystemsFiles: createFiles: op(12): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem774216137", trying btrfs: device or resource busy May 17 00:33:44.185509 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(14): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem774216137" May 17 00:33:44.185509 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(14): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem774216137" May 17 00:33:44.133531 systemd-networkd[671]: eth0: Gained IPv6LL May 17 00:33:44.436576 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(15): [started] unmounting "/mnt/oem774216137" May 17 00:33:44.436576 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(15): [finished] unmounting "/mnt/oem774216137" May 17 00:33:44.436576 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(12): [finished] writing file "/sysroot/etc/systemd/system/oem-gce.service" May 17 00:33:44.436576 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(16): [started] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" May 17 00:33:44.436576 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(16): oem config not found in "/usr/share/oem", looking on oem partition May 17 00:33:44.436576 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(16): op(17): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem238549519" May 17 00:33:44.436576 ignition[823]: CRITICAL : files: createFilesystemsFiles: createFiles: op(16): op(17): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem238549519": device or resource busy May 17 00:33:44.436576 ignition[823]: ERROR : files: createFilesystemsFiles: createFiles: op(16): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem238549519", trying btrfs: device or resource busy May 17 00:33:44.436576 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(16): op(18): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem238549519" May 17 00:33:44.436576 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(16): op(18): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem238549519" May 17 00:33:44.436576 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(16): op(19): [started] unmounting "/mnt/oem238549519" May 17 00:33:44.436576 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(16): op(19): [finished] unmounting "/mnt/oem238549519" May 17 00:33:44.436576 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(16): [finished] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" May 17 00:33:44.436576 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(1a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" May 17 00:33:44.676583 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(1a): GET https://extensions.flatcar.org/extensions/kubernetes-v1.32.4-x86-64.raw: attempt #1 May 17 00:33:44.676583 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(1a): GET result: OK May 17 00:33:44.927548 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(1a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" May 17 00:33:44.927548 ignition[823]: INFO : files: op(1b): [started] processing unit "coreos-metadata-sshkeys@.service" May 17 00:33:44.927548 ignition[823]: INFO : files: op(1b): [finished] processing unit "coreos-metadata-sshkeys@.service" May 17 00:33:44.927548 ignition[823]: INFO : files: op(1c): [started] processing unit "oem-gce.service" May 17 00:33:44.927548 ignition[823]: INFO : files: op(1c): [finished] processing unit "oem-gce.service" May 17 00:33:44.927548 ignition[823]: INFO : files: op(1d): [started] processing unit "oem-gce-enable-oslogin.service" May 17 00:33:44.927548 ignition[823]: INFO : files: op(1d): [finished] processing unit "oem-gce-enable-oslogin.service" May 17 00:33:44.927548 ignition[823]: INFO : files: op(1e): [started] processing unit "prepare-helm.service" May 17 00:33:45.151530 kernel: audit: type=1130 audit(1747442024.953:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:45.151575 kernel: audit: type=1130 audit(1747442025.022:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:45.151611 kernel: audit: type=1130 audit(1747442025.062:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:45.151634 kernel: audit: type=1131 audit(1747442025.062:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:44.953000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:45.022000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:45.062000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:45.062000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:44.937112 systemd[1]: Finished ignition-files.service. May 17 00:33:45.165534 ignition[823]: INFO : files: op(1e): op(1f): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 17 00:33:45.165534 ignition[823]: INFO : files: op(1e): op(1f): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 17 00:33:45.165534 ignition[823]: INFO : files: op(1e): [finished] processing unit "prepare-helm.service" May 17 00:33:45.165534 ignition[823]: INFO : files: op(20): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " May 17 00:33:45.165534 ignition[823]: INFO : files: op(20): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " May 17 00:33:45.165534 ignition[823]: INFO : files: op(21): [started] setting preset to enabled for "oem-gce.service" May 17 00:33:45.165534 ignition[823]: INFO : files: op(21): [finished] setting preset to enabled for "oem-gce.service" May 17 00:33:45.165534 ignition[823]: INFO : files: op(22): [started] setting preset to enabled for "oem-gce-enable-oslogin.service" May 17 00:33:45.165534 ignition[823]: INFO : files: op(22): [finished] setting preset to enabled for "oem-gce-enable-oslogin.service" May 17 00:33:45.165534 ignition[823]: INFO : files: op(23): [started] setting preset to enabled for "prepare-helm.service" May 17 00:33:45.165534 ignition[823]: INFO : files: op(23): [finished] setting preset to enabled for "prepare-helm.service" May 17 00:33:45.165534 ignition[823]: INFO : files: createResultFile: createFiles: op(24): [started] writing file "/sysroot/etc/.ignition-result.json" May 17 00:33:45.165534 ignition[823]: INFO : files: createResultFile: createFiles: op(24): [finished] writing file "/sysroot/etc/.ignition-result.json" May 17 00:33:45.165534 ignition[823]: INFO : files: files passed May 17 00:33:45.165534 ignition[823]: INFO : Ignition finished successfully May 17 00:33:45.493562 kernel: audit: type=1130 audit(1747442025.190:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:45.493620 kernel: audit: type=1131 audit(1747442025.190:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:45.493644 kernel: audit: type=1130 audit(1747442025.332:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:45.190000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:45.190000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:45.332000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:45.471000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:44.964056 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 17 00:33:44.986715 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 17 00:33:45.535567 initrd-setup-root-after-ignition[846]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 17 00:33:44.987807 systemd[1]: Starting ignition-quench.service... May 17 00:33:45.007103 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 17 00:33:45.024206 systemd[1]: ignition-quench.service: Deactivated successfully. May 17 00:33:45.024394 systemd[1]: Finished ignition-quench.service. May 17 00:33:45.063986 systemd[1]: Reached target ignition-complete.target. May 17 00:33:45.140633 systemd[1]: Starting initrd-parse-etc.service... May 17 00:33:45.172325 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 17 00:33:45.172470 systemd[1]: Finished initrd-parse-etc.service. May 17 00:33:45.191745 systemd[1]: Reached target initrd-fs.target. May 17 00:33:45.679000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:45.265718 systemd[1]: Reached target initrd.target. May 17 00:33:45.279763 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 17 00:33:45.709000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:45.281084 systemd[1]: Starting dracut-pre-pivot.service... May 17 00:33:45.730000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:45.298971 systemd[1]: Finished dracut-pre-pivot.service. May 17 00:33:45.746000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:45.335121 systemd[1]: Starting initrd-cleanup.service... May 17 00:33:45.761556 ignition[861]: INFO : Ignition 2.14.0 May 17 00:33:45.761556 ignition[861]: INFO : Stage: umount May 17 00:33:45.761556 ignition[861]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:33:45.761556 ignition[861]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 May 17 00:33:45.393887 systemd[1]: Stopped target nss-lookup.target. May 17 00:33:45.816000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:45.831650 iscsid[683]: iscsid shutting down. May 17 00:33:45.845654 ignition[861]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" May 17 00:33:45.845654 ignition[861]: INFO : umount: umount passed May 17 00:33:45.845654 ignition[861]: INFO : Ignition finished successfully May 17 00:33:45.852000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:45.871000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:45.406791 systemd[1]: Stopped target remote-cryptsetup.target. May 17 00:33:45.893000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:45.427866 systemd[1]: Stopped target timers.target. May 17 00:33:45.909000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:45.449803 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 17 00:33:45.923000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:45.449993 systemd[1]: Stopped dracut-pre-pivot.service. May 17 00:33:45.939000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:45.939000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:45.472986 systemd[1]: Stopped target initrd.target. May 17 00:33:45.954000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:45.479847 systemd[1]: Stopped target basic.target. May 17 00:33:45.969000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:45.500836 systemd[1]: Stopped target ignition-complete.target. May 17 00:33:45.984000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:45.518859 systemd[1]: Stopped target ignition-diskful.target. May 17 00:33:46.000000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:45.543855 systemd[1]: Stopped target initrd-root-device.target. May 17 00:33:45.565830 systemd[1]: Stopped target remote-fs.target. May 17 00:33:45.580797 systemd[1]: Stopped target remote-fs-pre.target. May 17 00:33:45.596790 systemd[1]: Stopped target sysinit.target. May 17 00:33:45.612857 systemd[1]: Stopped target local-fs.target. May 17 00:33:45.627831 systemd[1]: Stopped target local-fs-pre.target. May 17 00:33:46.088000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:45.643805 systemd[1]: Stopped target swap.target. May 17 00:33:46.104000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:45.658772 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 17 00:33:45.658962 systemd[1]: Stopped dracut-pre-mount.service. May 17 00:33:45.681003 systemd[1]: Stopped target cryptsetup.target. May 17 00:33:46.140000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:45.695792 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 17 00:33:45.695992 systemd[1]: Stopped dracut-initqueue.service. May 17 00:33:45.710932 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 17 00:33:45.711111 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 17 00:33:45.731909 systemd[1]: ignition-files.service: Deactivated successfully. May 17 00:33:46.220000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:45.732087 systemd[1]: Stopped ignition-files.service. May 17 00:33:46.236000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:46.236000 audit: BPF prog-id=6 op=UNLOAD May 17 00:33:45.749331 systemd[1]: Stopping ignition-mount.service... May 17 00:33:45.782898 systemd[1]: Stopping iscsid.service... May 17 00:33:45.793686 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 17 00:33:46.278000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:45.793924 systemd[1]: Stopped kmod-static-nodes.service. May 17 00:33:46.296000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:45.819463 systemd[1]: Stopping sysroot-boot.service... May 17 00:33:46.311000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:45.838527 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 17 00:33:45.838813 systemd[1]: Stopped systemd-udev-trigger.service. May 17 00:33:45.853768 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 17 00:33:46.349000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:45.853957 systemd[1]: Stopped dracut-pre-trigger.service. May 17 00:33:45.876934 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 17 00:33:45.878038 systemd[1]: iscsid.service: Deactivated successfully. May 17 00:33:46.399000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:45.878159 systemd[1]: Stopped iscsid.service. May 17 00:33:46.416000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:45.895357 systemd[1]: ignition-mount.service: Deactivated successfully. May 17 00:33:46.431000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:45.895535 systemd[1]: Stopped ignition-mount.service. May 17 00:33:45.911281 systemd[1]: sysroot-boot.service: Deactivated successfully. May 17 00:33:45.911400 systemd[1]: Stopped sysroot-boot.service. May 17 00:33:46.471000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:45.926729 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 17 00:33:46.486000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:45.926837 systemd[1]: Finished initrd-cleanup.service. May 17 00:33:46.502000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:46.502000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:45.940780 systemd[1]: ignition-disks.service: Deactivated successfully. May 17 00:33:45.940851 systemd[1]: Stopped ignition-disks.service. May 17 00:33:45.955680 systemd[1]: ignition-kargs.service: Deactivated successfully. May 17 00:33:45.955744 systemd[1]: Stopped ignition-kargs.service. May 17 00:33:45.970675 systemd[1]: ignition-fetch.service: Deactivated successfully. May 17 00:33:45.970735 systemd[1]: Stopped ignition-fetch.service. May 17 00:33:45.985696 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 17 00:33:46.587546 systemd-journald[189]: Received SIGTERM from PID 1 (systemd). May 17 00:33:45.985787 systemd[1]: Stopped ignition-fetch-offline.service. May 17 00:33:46.001664 systemd[1]: Stopped target paths.target. May 17 00:33:46.016510 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 17 00:33:46.020511 systemd[1]: Stopped systemd-ask-password-console.path. May 17 00:33:46.033536 systemd[1]: Stopped target slices.target. May 17 00:33:46.046504 systemd[1]: Stopped target sockets.target. May 17 00:33:46.060586 systemd[1]: iscsid.socket: Deactivated successfully. May 17 00:33:46.060663 systemd[1]: Closed iscsid.socket. May 17 00:33:46.074581 systemd[1]: ignition-setup.service: Deactivated successfully. May 17 00:33:46.074675 systemd[1]: Stopped ignition-setup.service. May 17 00:33:46.089650 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 17 00:33:46.089726 systemd[1]: Stopped initrd-setup-root.service. May 17 00:33:46.105781 systemd[1]: Stopping iscsiuio.service... May 17 00:33:46.119986 systemd[1]: iscsiuio.service: Deactivated successfully. May 17 00:33:46.120108 systemd[1]: Stopped iscsiuio.service. May 17 00:33:46.141907 systemd[1]: Stopped target network.target. May 17 00:33:46.156641 systemd[1]: iscsiuio.socket: Deactivated successfully. May 17 00:33:46.156704 systemd[1]: Closed iscsiuio.socket. May 17 00:33:46.172829 systemd[1]: Stopping systemd-networkd.service... May 17 00:33:46.176447 systemd-networkd[671]: eth0: DHCPv6 lease lost May 17 00:33:46.587000 audit: BPF prog-id=9 op=UNLOAD May 17 00:33:46.187841 systemd[1]: Stopping systemd-resolved.service... May 17 00:33:46.205932 systemd[1]: systemd-resolved.service: Deactivated successfully. May 17 00:33:46.206056 systemd[1]: Stopped systemd-resolved.service. May 17 00:33:46.222315 systemd[1]: systemd-networkd.service: Deactivated successfully. May 17 00:33:46.222491 systemd[1]: Stopped systemd-networkd.service. May 17 00:33:46.238158 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 17 00:33:46.238201 systemd[1]: Closed systemd-networkd.socket. May 17 00:33:46.253570 systemd[1]: Stopping network-cleanup.service... May 17 00:33:46.259681 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 17 00:33:46.259760 systemd[1]: Stopped parse-ip-for-networkd.service. May 17 00:33:46.279762 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 17 00:33:46.279853 systemd[1]: Stopped systemd-sysctl.service. May 17 00:33:46.297745 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 17 00:33:46.297820 systemd[1]: Stopped systemd-modules-load.service. May 17 00:33:46.312873 systemd[1]: Stopping systemd-udevd.service... May 17 00:33:46.328276 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 17 00:33:46.329028 systemd[1]: systemd-udevd.service: Deactivated successfully. May 17 00:33:46.329178 systemd[1]: Stopped systemd-udevd.service. May 17 00:33:46.352225 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 17 00:33:46.352310 systemd[1]: Closed systemd-udevd-control.socket. May 17 00:33:46.368638 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 17 00:33:46.368709 systemd[1]: Closed systemd-udevd-kernel.socket. May 17 00:33:46.383726 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 17 00:33:46.383807 systemd[1]: Stopped dracut-pre-udev.service. May 17 00:33:46.400789 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 17 00:33:46.400864 systemd[1]: Stopped dracut-cmdline.service. May 17 00:33:46.417794 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 17 00:33:46.417871 systemd[1]: Stopped dracut-cmdline-ask.service. May 17 00:33:46.433734 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 17 00:33:46.456496 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 17 00:33:46.456622 systemd[1]: Stopped systemd-vconsole-setup.service. May 17 00:33:46.473228 systemd[1]: network-cleanup.service: Deactivated successfully. May 17 00:33:46.473354 systemd[1]: Stopped network-cleanup.service. May 17 00:33:46.487940 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 17 00:33:46.488058 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 17 00:33:46.503896 systemd[1]: Reached target initrd-switch-root.target. May 17 00:33:46.520662 systemd[1]: Starting initrd-switch-root.service... May 17 00:33:46.549100 systemd[1]: Switching root. May 17 00:33:46.590430 systemd-journald[189]: Journal stopped May 17 00:33:51.397403 kernel: SELinux: Class mctp_socket not defined in policy. May 17 00:33:51.397513 kernel: SELinux: Class anon_inode not defined in policy. May 17 00:33:51.397549 kernel: SELinux: the above unknown classes and permissions will be allowed May 17 00:33:51.397578 kernel: SELinux: policy capability network_peer_controls=1 May 17 00:33:51.397601 kernel: SELinux: policy capability open_perms=1 May 17 00:33:51.397625 kernel: SELinux: policy capability extended_socket_class=1 May 17 00:33:51.397651 kernel: SELinux: policy capability always_check_network=0 May 17 00:33:51.397674 kernel: SELinux: policy capability cgroup_seclabel=1 May 17 00:33:51.397697 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 17 00:33:51.397721 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 17 00:33:51.397743 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 17 00:33:51.397780 systemd[1]: Successfully loaded SELinux policy in 119.233ms. May 17 00:33:51.397824 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 10.756ms. May 17 00:33:51.397850 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 17 00:33:51.397875 systemd[1]: Detected virtualization kvm. May 17 00:33:51.397898 systemd[1]: Detected architecture x86-64. May 17 00:33:51.397922 systemd[1]: Detected first boot. May 17 00:33:51.397952 systemd[1]: Initializing machine ID from VM UUID. May 17 00:33:51.397981 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 17 00:33:51.398005 systemd[1]: Populated /etc with preset unit settings. May 17 00:33:51.398030 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:33:51.398061 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:33:51.398094 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:33:51.398124 kernel: kauditd_printk_skb: 51 callbacks suppressed May 17 00:33:51.398147 kernel: audit: type=1334 audit(1747442030.446:88): prog-id=12 op=LOAD May 17 00:33:51.398170 kernel: audit: type=1334 audit(1747442030.446:89): prog-id=3 op=UNLOAD May 17 00:33:51.398194 kernel: audit: type=1334 audit(1747442030.451:90): prog-id=13 op=LOAD May 17 00:33:51.398216 kernel: audit: type=1334 audit(1747442030.458:91): prog-id=14 op=LOAD May 17 00:33:51.398239 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 17 00:33:51.398264 kernel: audit: type=1334 audit(1747442030.458:92): prog-id=4 op=UNLOAD May 17 00:33:51.398286 kernel: audit: type=1334 audit(1747442030.458:93): prog-id=5 op=UNLOAD May 17 00:33:51.398302 kernel: audit: type=1131 audit(1747442030.461:94): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:51.398321 systemd[1]: Stopped initrd-switch-root.service. May 17 00:33:51.398342 kernel: audit: type=1334 audit(1747442030.529:95): prog-id=12 op=UNLOAD May 17 00:33:51.398360 kernel: audit: type=1130 audit(1747442030.545:96): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:51.398410 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 17 00:33:51.398434 kernel: audit: type=1131 audit(1747442030.545:97): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:51.398459 systemd[1]: Created slice system-addon\x2dconfig.slice. May 17 00:33:51.398482 systemd[1]: Created slice system-addon\x2drun.slice. May 17 00:33:51.398497 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. May 17 00:33:51.398519 systemd[1]: Created slice system-getty.slice. May 17 00:33:51.398537 systemd[1]: Created slice system-modprobe.slice. May 17 00:33:51.398552 systemd[1]: Created slice system-serial\x2dgetty.slice. May 17 00:33:51.398566 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 17 00:33:51.398581 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 17 00:33:51.398596 systemd[1]: Created slice user.slice. May 17 00:33:51.398612 systemd[1]: Started systemd-ask-password-console.path. May 17 00:33:51.398626 systemd[1]: Started systemd-ask-password-wall.path. May 17 00:33:51.398642 systemd[1]: Set up automount boot.automount. May 17 00:33:51.398656 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 17 00:33:51.398674 systemd[1]: Stopped target initrd-switch-root.target. May 17 00:33:51.398688 systemd[1]: Stopped target initrd-fs.target. May 17 00:33:51.398702 systemd[1]: Stopped target initrd-root-fs.target. May 17 00:33:51.398719 systemd[1]: Reached target integritysetup.target. May 17 00:33:51.398734 systemd[1]: Reached target remote-cryptsetup.target. May 17 00:33:51.398749 systemd[1]: Reached target remote-fs.target. May 17 00:33:51.398763 systemd[1]: Reached target slices.target. May 17 00:33:51.398778 systemd[1]: Reached target swap.target. May 17 00:33:51.398793 systemd[1]: Reached target torcx.target. May 17 00:33:51.398811 systemd[1]: Reached target veritysetup.target. May 17 00:33:51.398827 systemd[1]: Listening on systemd-coredump.socket. May 17 00:33:51.398842 systemd[1]: Listening on systemd-initctl.socket. May 17 00:33:51.398857 systemd[1]: Listening on systemd-networkd.socket. May 17 00:33:51.398875 systemd[1]: Listening on systemd-udevd-control.socket. May 17 00:33:51.398898 systemd[1]: Listening on systemd-udevd-kernel.socket. May 17 00:33:51.398914 systemd[1]: Listening on systemd-userdbd.socket. May 17 00:33:51.398929 systemd[1]: Mounting dev-hugepages.mount... May 17 00:33:51.398943 systemd[1]: Mounting dev-mqueue.mount... May 17 00:33:51.398958 systemd[1]: Mounting media.mount... May 17 00:33:51.398976 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:33:51.398991 systemd[1]: Mounting sys-kernel-debug.mount... May 17 00:33:51.399005 systemd[1]: Mounting sys-kernel-tracing.mount... May 17 00:33:51.399023 systemd[1]: Mounting tmp.mount... May 17 00:33:51.399038 systemd[1]: Starting flatcar-tmpfiles.service... May 17 00:33:51.399054 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:33:51.399069 systemd[1]: Starting kmod-static-nodes.service... May 17 00:33:51.399086 systemd[1]: Starting modprobe@configfs.service... May 17 00:33:51.399105 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:33:51.399131 systemd[1]: Starting modprobe@drm.service... May 17 00:33:51.399152 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:33:51.399176 systemd[1]: Starting modprobe@fuse.service... May 17 00:33:51.399192 systemd[1]: Starting modprobe@loop.service... May 17 00:33:51.399206 kernel: fuse: init (API version 7.34) May 17 00:33:51.399221 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 17 00:33:51.399235 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 17 00:33:51.399250 kernel: loop: module loaded May 17 00:33:51.399267 systemd[1]: Stopped systemd-fsck-root.service. May 17 00:33:51.399282 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 17 00:33:51.399296 systemd[1]: Stopped systemd-fsck-usr.service. May 17 00:33:51.399310 systemd[1]: Stopped systemd-journald.service. May 17 00:33:51.399325 systemd[1]: Starting systemd-journald.service... May 17 00:33:51.399345 systemd[1]: Starting systemd-modules-load.service... May 17 00:33:51.399361 systemd[1]: Starting systemd-network-generator.service... May 17 00:33:51.399396 systemd[1]: Starting systemd-remount-fs.service... May 17 00:33:51.399424 systemd-journald[985]: Journal started May 17 00:33:51.399526 systemd-journald[985]: Runtime Journal (/run/log/journal/9a1270d9d220927325ed9678dddb1611) is 8.0M, max 148.8M, 140.8M free. May 17 00:33:46.907000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 17 00:33:47.056000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 17 00:33:47.056000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 17 00:33:47.056000 audit: BPF prog-id=10 op=LOAD May 17 00:33:47.056000 audit: BPF prog-id=10 op=UNLOAD May 17 00:33:47.056000 audit: BPF prog-id=11 op=LOAD May 17 00:33:47.056000 audit: BPF prog-id=11 op=UNLOAD May 17 00:33:47.208000 audit[894]: AVC avc: denied { associate } for pid=894 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 17 00:33:47.208000 audit[894]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001178d2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=877 pid=894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:47.208000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 17 00:33:47.219000 audit[894]: AVC avc: denied { associate } for pid=894 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 17 00:33:47.219000 audit[894]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001179a9 a2=1ed a3=0 items=2 ppid=877 pid=894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:47.219000 audit: CWD cwd="/" May 17 00:33:47.219000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:47.219000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:47.219000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 17 00:33:50.446000 audit: BPF prog-id=12 op=LOAD May 17 00:33:50.446000 audit: BPF prog-id=3 op=UNLOAD May 17 00:33:50.451000 audit: BPF prog-id=13 op=LOAD May 17 00:33:50.458000 audit: BPF prog-id=14 op=LOAD May 17 00:33:50.458000 audit: BPF prog-id=4 op=UNLOAD May 17 00:33:50.458000 audit: BPF prog-id=5 op=UNLOAD May 17 00:33:50.461000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:50.529000 audit: BPF prog-id=12 op=UNLOAD May 17 00:33:50.545000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:50.545000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:51.298000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:51.319000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:51.333000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:51.333000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:51.334000 audit: BPF prog-id=15 op=LOAD May 17 00:33:51.334000 audit: BPF prog-id=16 op=LOAD May 17 00:33:51.334000 audit: BPF prog-id=17 op=LOAD May 17 00:33:51.334000 audit: BPF prog-id=13 op=UNLOAD May 17 00:33:51.334000 audit: BPF prog-id=14 op=UNLOAD May 17 00:33:51.394000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 17 00:33:51.394000 audit[985]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=4 a1=7ffeecc19b50 a2=4000 a3=7ffeecc19bec items=0 ppid=1 pid=985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:51.394000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 17 00:33:47.204544 /usr/lib/systemd/system-generators/torcx-generator[894]: time="2025-05-17T00:33:47Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:33:50.444874 systemd[1]: Queued start job for default target multi-user.target. May 17 00:33:47.205706 /usr/lib/systemd/system-generators/torcx-generator[894]: time="2025-05-17T00:33:47Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 17 00:33:50.444889 systemd[1]: Unnecessary job was removed for dev-sda6.device. May 17 00:33:47.205750 /usr/lib/systemd/system-generators/torcx-generator[894]: time="2025-05-17T00:33:47Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 17 00:33:50.461962 systemd[1]: systemd-journald.service: Deactivated successfully. May 17 00:33:47.205804 /usr/lib/systemd/system-generators/torcx-generator[894]: time="2025-05-17T00:33:47Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 17 00:33:47.205826 /usr/lib/systemd/system-generators/torcx-generator[894]: time="2025-05-17T00:33:47Z" level=debug msg="skipped missing lower profile" missing profile=oem May 17 00:33:47.205883 /usr/lib/systemd/system-generators/torcx-generator[894]: time="2025-05-17T00:33:47Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 17 00:33:47.205908 /usr/lib/systemd/system-generators/torcx-generator[894]: time="2025-05-17T00:33:47Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 17 00:33:47.206221 /usr/lib/systemd/system-generators/torcx-generator[894]: time="2025-05-17T00:33:47Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 17 00:33:47.206285 /usr/lib/systemd/system-generators/torcx-generator[894]: time="2025-05-17T00:33:47Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 17 00:33:47.206310 /usr/lib/systemd/system-generators/torcx-generator[894]: time="2025-05-17T00:33:47Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 17 00:33:47.208769 /usr/lib/systemd/system-generators/torcx-generator[894]: time="2025-05-17T00:33:47Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 17 00:33:47.208817 /usr/lib/systemd/system-generators/torcx-generator[894]: time="2025-05-17T00:33:47Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 17 00:33:47.208858 /usr/lib/systemd/system-generators/torcx-generator[894]: time="2025-05-17T00:33:47Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 17 00:33:47.208888 /usr/lib/systemd/system-generators/torcx-generator[894]: time="2025-05-17T00:33:47Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 17 00:33:47.208923 /usr/lib/systemd/system-generators/torcx-generator[894]: time="2025-05-17T00:33:47Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 17 00:33:47.208950 /usr/lib/systemd/system-generators/torcx-generator[894]: time="2025-05-17T00:33:47Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 17 00:33:49.809768 /usr/lib/systemd/system-generators/torcx-generator[894]: time="2025-05-17T00:33:49Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:33:49.810073 /usr/lib/systemd/system-generators/torcx-generator[894]: time="2025-05-17T00:33:49Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:33:49.810200 /usr/lib/systemd/system-generators/torcx-generator[894]: time="2025-05-17T00:33:49Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:33:49.810493 /usr/lib/systemd/system-generators/torcx-generator[894]: time="2025-05-17T00:33:49Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:33:49.810557 /usr/lib/systemd/system-generators/torcx-generator[894]: time="2025-05-17T00:33:49Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 17 00:33:49.810629 /usr/lib/systemd/system-generators/torcx-generator[894]: time="2025-05-17T00:33:49Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 17 00:33:51.408527 systemd[1]: Starting systemd-udev-trigger.service... May 17 00:33:51.423512 systemd[1]: verity-setup.service: Deactivated successfully. May 17 00:33:51.423617 systemd[1]: Stopped verity-setup.service. May 17 00:33:51.433000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:51.447646 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:33:51.456419 systemd[1]: Started systemd-journald.service. May 17 00:33:51.463000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:51.465845 systemd[1]: Mounted dev-hugepages.mount. May 17 00:33:51.472755 systemd[1]: Mounted dev-mqueue.mount. May 17 00:33:51.479753 systemd[1]: Mounted media.mount. May 17 00:33:51.486710 systemd[1]: Mounted sys-kernel-debug.mount. May 17 00:33:51.495700 systemd[1]: Mounted sys-kernel-tracing.mount. May 17 00:33:51.504672 systemd[1]: Mounted tmp.mount. May 17 00:33:51.511763 systemd[1]: Finished flatcar-tmpfiles.service. May 17 00:33:51.519000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:51.520938 systemd[1]: Finished kmod-static-nodes.service. May 17 00:33:51.528000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:51.529912 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 17 00:33:51.530124 systemd[1]: Finished modprobe@configfs.service. May 17 00:33:51.537000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:51.537000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:51.538962 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:33:51.539199 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:33:51.547000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:51.547000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:51.548986 systemd[1]: modprobe@drm.service: Deactivated successfully. May 17 00:33:51.549341 systemd[1]: Finished modprobe@drm.service. May 17 00:33:51.557000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:51.557000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:51.558998 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:33:51.559221 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:33:51.566000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:51.566000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:51.568102 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 17 00:33:51.568360 systemd[1]: Finished modprobe@fuse.service. May 17 00:33:51.575000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:51.575000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:51.576955 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:33:51.577176 systemd[1]: Finished modprobe@loop.service. May 17 00:33:51.584000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:51.584000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:51.586104 systemd[1]: Finished systemd-modules-load.service. May 17 00:33:51.593000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:51.595084 systemd[1]: Finished systemd-network-generator.service. May 17 00:33:51.602000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:51.603957 systemd[1]: Finished systemd-remount-fs.service. May 17 00:33:51.611000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:51.612877 systemd[1]: Finished systemd-udev-trigger.service. May 17 00:33:51.620000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:51.622279 systemd[1]: Reached target network-pre.target. May 17 00:33:51.632029 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 17 00:33:51.642015 systemd[1]: Mounting sys-kernel-config.mount... May 17 00:33:51.649517 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 17 00:33:51.652492 systemd[1]: Starting systemd-hwdb-update.service... May 17 00:33:51.661287 systemd[1]: Starting systemd-journal-flush.service... May 17 00:33:51.670544 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:33:51.672257 systemd[1]: Starting systemd-random-seed.service... May 17 00:33:51.679551 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:33:51.681311 systemd[1]: Starting systemd-sysctl.service... May 17 00:33:51.687157 systemd-journald[985]: Time spent on flushing to /var/log/journal/9a1270d9d220927325ed9678dddb1611 is 66.556ms for 1149 entries. May 17 00:33:51.687157 systemd-journald[985]: System Journal (/var/log/journal/9a1270d9d220927325ed9678dddb1611) is 8.0M, max 584.8M, 576.8M free. May 17 00:33:51.777431 systemd-journald[985]: Received client request to flush runtime journal. May 17 00:33:51.743000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:51.752000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:51.697167 systemd[1]: Starting systemd-sysusers.service... May 17 00:33:51.706231 systemd[1]: Starting systemd-udev-settle.service... May 17 00:33:51.717000 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 17 00:33:51.778254 udevadm[999]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. May 17 00:33:51.726715 systemd[1]: Mounted sys-kernel-config.mount. May 17 00:33:51.735898 systemd[1]: Finished systemd-random-seed.service. May 17 00:33:51.744974 systemd[1]: Finished systemd-sysctl.service. May 17 00:33:51.758063 systemd[1]: Reached target first-boot-complete.target. May 17 00:33:51.776797 systemd[1]: Finished systemd-sysusers.service. May 17 00:33:51.784000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:51.786188 systemd[1]: Finished systemd-journal-flush.service. May 17 00:33:51.793000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:52.339580 systemd[1]: Finished systemd-hwdb-update.service. May 17 00:33:52.346000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:52.346000 audit: BPF prog-id=18 op=LOAD May 17 00:33:52.347000 audit: BPF prog-id=19 op=LOAD May 17 00:33:52.347000 audit: BPF prog-id=7 op=UNLOAD May 17 00:33:52.347000 audit: BPF prog-id=8 op=UNLOAD May 17 00:33:52.349352 systemd[1]: Starting systemd-udevd.service... May 17 00:33:52.372175 systemd-udevd[1002]: Using default interface naming scheme 'v252'. May 17 00:33:52.427175 systemd[1]: Started systemd-udevd.service. May 17 00:33:52.434000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:52.436000 audit: BPF prog-id=20 op=LOAD May 17 00:33:52.439207 systemd[1]: Starting systemd-networkd.service... May 17 00:33:52.452000 audit: BPF prog-id=21 op=LOAD May 17 00:33:52.453000 audit: BPF prog-id=22 op=LOAD May 17 00:33:52.453000 audit: BPF prog-id=23 op=LOAD May 17 00:33:52.455688 systemd[1]: Starting systemd-userdbd.service... May 17 00:33:52.510481 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. May 17 00:33:52.518133 systemd[1]: Started systemd-userdbd.service. May 17 00:33:52.525000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:52.631461 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 May 17 00:33:52.665512 systemd-networkd[1016]: lo: Link UP May 17 00:33:52.665527 systemd-networkd[1016]: lo: Gained carrier May 17 00:33:52.666317 systemd-networkd[1016]: Enumeration completed May 17 00:33:52.666477 systemd[1]: Started systemd-networkd.service. May 17 00:33:52.667607 systemd-networkd[1016]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 17 00:33:52.669925 systemd-networkd[1016]: eth0: Link UP May 17 00:33:52.670110 systemd-networkd[1016]: eth0: Gained carrier May 17 00:33:52.674000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:52.684750 systemd-networkd[1016]: eth0: Overlong DHCP hostname received, shortened from 'ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758.c.flatcar-212911.internal' to 'ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758' May 17 00:33:52.684776 systemd-networkd[1016]: eth0: DHCPv4 address 10.128.0.24/32, gateway 10.128.0.1 acquired from 169.254.169.254 May 17 00:33:52.695414 kernel: ACPI: button: Power Button [PWRF] May 17 00:33:52.736000 audit[1012]: AVC avc: denied { confidentiality } for pid=1012 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 17 00:33:52.749399 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input3 May 17 00:33:52.765397 kernel: ACPI: button: Sleep Button [SLPF] May 17 00:33:52.736000 audit[1012]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=563a5a21e5d0 a1=338ac a2=7f80d2a9abc5 a3=5 items=110 ppid=1002 pid=1012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:52.736000 audit: CWD cwd="/" May 17 00:33:52.736000 audit: PATH item=0 name=(null) inode=1042 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=1 name=(null) inode=14480 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=2 name=(null) inode=14480 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=3 name=(null) inode=14481 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=4 name=(null) inode=14480 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=5 name=(null) inode=14482 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=6 name=(null) inode=14480 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=7 name=(null) inode=14483 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=8 name=(null) inode=14483 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=9 name=(null) inode=14484 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=10 name=(null) inode=14483 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=11 name=(null) inode=14485 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=12 name=(null) inode=14483 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=13 name=(null) inode=14486 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=14 name=(null) inode=14483 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=15 name=(null) inode=14487 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=16 name=(null) inode=14483 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=17 name=(null) inode=14488 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=18 name=(null) inode=14480 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=19 name=(null) inode=14489 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=20 name=(null) inode=14489 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=21 name=(null) inode=14490 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.781552 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 17 00:33:52.736000 audit: PATH item=22 name=(null) inode=14489 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=23 name=(null) inode=14491 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=24 name=(null) inode=14489 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=25 name=(null) inode=14492 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=26 name=(null) inode=14489 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=27 name=(null) inode=14493 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=28 name=(null) inode=14489 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=29 name=(null) inode=14494 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=30 name=(null) inode=14480 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=31 name=(null) inode=14495 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=32 name=(null) inode=14495 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=33 name=(null) inode=14496 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=34 name=(null) inode=14495 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=35 name=(null) inode=14497 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=36 name=(null) inode=14495 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=37 name=(null) inode=14498 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=38 name=(null) inode=14495 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=39 name=(null) inode=14499 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=40 name=(null) inode=14495 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=41 name=(null) inode=14500 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=42 name=(null) inode=14480 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=43 name=(null) inode=14501 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=44 name=(null) inode=14501 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=45 name=(null) inode=14502 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=46 name=(null) inode=14501 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=47 name=(null) inode=14503 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=48 name=(null) inode=14501 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=49 name=(null) inode=14504 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=50 name=(null) inode=14501 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=51 name=(null) inode=14505 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=52 name=(null) inode=14501 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=53 name=(null) inode=14506 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=54 name=(null) inode=1042 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=55 name=(null) inode=14507 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=56 name=(null) inode=14507 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=57 name=(null) inode=14508 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=58 name=(null) inode=14507 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=59 name=(null) inode=14509 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=60 name=(null) inode=14507 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=61 name=(null) inode=14510 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=62 name=(null) inode=14510 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=63 name=(null) inode=14511 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=64 name=(null) inode=14510 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=65 name=(null) inode=14512 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=66 name=(null) inode=14510 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=67 name=(null) inode=14513 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=68 name=(null) inode=14510 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=69 name=(null) inode=14514 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=70 name=(null) inode=14510 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=71 name=(null) inode=14515 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=72 name=(null) inode=14507 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=73 name=(null) inode=14516 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=74 name=(null) inode=14516 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=75 name=(null) inode=14517 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=76 name=(null) inode=14516 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=77 name=(null) inode=14518 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=78 name=(null) inode=14516 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=79 name=(null) inode=14519 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=80 name=(null) inode=14516 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=81 name=(null) inode=14520 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=82 name=(null) inode=14516 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=83 name=(null) inode=14521 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=84 name=(null) inode=14507 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=85 name=(null) inode=14522 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=86 name=(null) inode=14522 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=87 name=(null) inode=14523 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=88 name=(null) inode=14522 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=89 name=(null) inode=14524 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=90 name=(null) inode=14522 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=91 name=(null) inode=14525 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=92 name=(null) inode=14522 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=93 name=(null) inode=14526 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=94 name=(null) inode=14522 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=95 name=(null) inode=14527 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=96 name=(null) inode=14507 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=97 name=(null) inode=14528 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=98 name=(null) inode=14528 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=99 name=(null) inode=14529 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=100 name=(null) inode=14528 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=101 name=(null) inode=14530 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=102 name=(null) inode=14528 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=103 name=(null) inode=14531 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=104 name=(null) inode=14528 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=105 name=(null) inode=14532 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=106 name=(null) inode=14528 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=107 name=(null) inode=14533 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PATH item=109 name=(null) inode=14538 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:52.736000 audit: PROCTITLE proctitle="(udev-worker)" May 17 00:33:52.800407 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input4 May 17 00:33:52.804392 kernel: EDAC MC: Ver: 3.0.0 May 17 00:33:52.820475 kernel: piix4_smbus 0000:00:01.3: SMBus base address uninitialized - upgrade BIOS or use force_addr=0xaddr May 17 00:33:52.829406 kernel: mousedev: PS/2 mouse device common for all mice May 17 00:33:52.844890 systemd[1]: Finished systemd-udev-settle.service. May 17 00:33:52.852000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:52.855200 systemd[1]: Starting lvm2-activation-early.service... May 17 00:33:52.887031 lvm[1039]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 17 00:33:52.917737 systemd[1]: Finished lvm2-activation-early.service. May 17 00:33:52.925000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:52.926733 systemd[1]: Reached target cryptsetup.target. May 17 00:33:52.937007 systemd[1]: Starting lvm2-activation.service... May 17 00:33:52.942847 lvm[1040]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 17 00:33:52.970860 systemd[1]: Finished lvm2-activation.service. May 17 00:33:52.978000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:52.979732 systemd[1]: Reached target local-fs-pre.target. May 17 00:33:52.988531 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 17 00:33:52.988586 systemd[1]: Reached target local-fs.target. May 17 00:33:52.997529 systemd[1]: Reached target machines.target. May 17 00:33:53.007106 systemd[1]: Starting ldconfig.service... May 17 00:33:53.016175 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:33:53.016265 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:33:53.018053 systemd[1]: Starting systemd-boot-update.service... May 17 00:33:53.027152 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 17 00:33:53.039288 systemd[1]: Starting systemd-machine-id-commit.service... May 17 00:33:53.041291 systemd[1]: Starting systemd-sysext.service... May 17 00:33:53.041985 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1042 (bootctl) May 17 00:33:53.044173 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 17 00:33:53.062446 systemd[1]: Unmounting usr-share-oem.mount... May 17 00:33:53.073563 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 17 00:33:53.073755 systemd[1]: Unmounted usr-share-oem.mount. May 17 00:33:53.083419 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 17 00:33:53.096000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:53.098400 kernel: loop0: detected capacity change from 0 to 224512 May 17 00:33:53.230459 systemd-fsck[1053]: fsck.fat 4.2 (2021-01-31) May 17 00:33:53.230459 systemd-fsck[1053]: /dev/sda1: 790 files, 120726/258078 clusters May 17 00:33:53.233629 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 17 00:33:53.243000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:53.246758 systemd[1]: Mounting boot.mount... May 17 00:33:53.262321 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 17 00:33:53.263224 systemd[1]: Finished systemd-machine-id-commit.service. May 17 00:33:53.270000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:53.273294 systemd[1]: Mounted boot.mount. May 17 00:33:53.297407 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 17 00:33:53.304657 systemd[1]: Finished systemd-boot-update.service. May 17 00:33:53.312000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:53.324402 kernel: loop1: detected capacity change from 0 to 224512 May 17 00:33:53.351798 (sd-sysext)[1057]: Using extensions 'kubernetes'. May 17 00:33:53.352551 (sd-sysext)[1057]: Merged extensions into '/usr'. May 17 00:33:53.379972 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:33:53.382931 systemd[1]: Mounting usr-share-oem.mount... May 17 00:33:53.390941 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:33:53.393060 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:33:53.403172 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:33:53.412211 systemd[1]: Starting modprobe@loop.service... May 17 00:33:53.419716 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:33:53.419945 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:33:53.420152 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:33:53.424942 systemd[1]: Mounted usr-share-oem.mount. May 17 00:33:53.433074 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:33:53.433310 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:33:53.440000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:53.440000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:53.442264 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:33:53.442475 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:33:53.449000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:53.449000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:53.451139 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:33:53.451303 systemd[1]: Finished modprobe@loop.service. May 17 00:33:53.458000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:53.458000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:53.460229 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:33:53.460452 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:33:53.462064 systemd[1]: Finished systemd-sysext.service. May 17 00:33:53.469000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:53.472494 systemd[1]: Starting ensure-sysext.service... May 17 00:33:53.482327 systemd[1]: Starting systemd-tmpfiles-setup.service... May 17 00:33:53.492873 systemd[1]: Reloading. May 17 00:33:53.524905 systemd-tmpfiles[1064]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 17 00:33:53.535529 systemd-tmpfiles[1064]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 17 00:33:53.550417 systemd-tmpfiles[1064]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 17 00:33:53.640634 /usr/lib/systemd/system-generators/torcx-generator[1084]: time="2025-05-17T00:33:53Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:33:53.641119 /usr/lib/systemd/system-generators/torcx-generator[1084]: time="2025-05-17T00:33:53Z" level=info msg="torcx already run" May 17 00:33:53.733560 systemd-networkd[1016]: eth0: Gained IPv6LL May 17 00:33:53.747837 ldconfig[1041]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 17 00:33:53.844311 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:33:53.844339 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:33:53.868074 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:33:53.945000 audit: BPF prog-id=24 op=LOAD May 17 00:33:53.945000 audit: BPF prog-id=20 op=UNLOAD May 17 00:33:53.948000 audit: BPF prog-id=25 op=LOAD May 17 00:33:53.948000 audit: BPF prog-id=21 op=UNLOAD May 17 00:33:53.948000 audit: BPF prog-id=26 op=LOAD May 17 00:33:53.948000 audit: BPF prog-id=27 op=LOAD May 17 00:33:53.948000 audit: BPF prog-id=22 op=UNLOAD May 17 00:33:53.948000 audit: BPF prog-id=23 op=UNLOAD May 17 00:33:53.949000 audit: BPF prog-id=28 op=LOAD May 17 00:33:53.949000 audit: BPF prog-id=29 op=LOAD May 17 00:33:53.949000 audit: BPF prog-id=18 op=UNLOAD May 17 00:33:53.949000 audit: BPF prog-id=19 op=UNLOAD May 17 00:33:53.951000 audit: BPF prog-id=30 op=LOAD May 17 00:33:53.951000 audit: BPF prog-id=15 op=UNLOAD May 17 00:33:53.951000 audit: BPF prog-id=31 op=LOAD May 17 00:33:53.951000 audit: BPF prog-id=32 op=LOAD May 17 00:33:53.951000 audit: BPF prog-id=16 op=UNLOAD May 17 00:33:53.951000 audit: BPF prog-id=17 op=UNLOAD May 17 00:33:53.957008 systemd[1]: Finished ldconfig.service. May 17 00:33:53.964000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:53.967308 systemd[1]: Finished systemd-tmpfiles-setup.service. May 17 00:33:53.974000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:53.982084 systemd[1]: Starting audit-rules.service... May 17 00:33:53.992729 systemd[1]: Starting clean-ca-certificates.service... May 17 00:33:54.004194 systemd[1]: Starting oem-gce-enable-oslogin.service... May 17 00:33:54.014684 systemd[1]: Starting systemd-journal-catalog-update.service... May 17 00:33:54.023000 audit: BPF prog-id=33 op=LOAD May 17 00:33:54.026431 systemd[1]: Starting systemd-resolved.service... May 17 00:33:54.033000 audit: BPF prog-id=34 op=LOAD May 17 00:33:54.036489 systemd[1]: Starting systemd-timesyncd.service... May 17 00:33:54.045725 systemd[1]: Starting systemd-update-utmp.service... May 17 00:33:54.054620 systemd[1]: Finished clean-ca-certificates.service. May 17 00:33:54.054000 audit[1157]: SYSTEM_BOOT pid=1157 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 17 00:33:54.062240 augenrules[1159]: No rules May 17 00:33:54.060000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 17 00:33:54.060000 audit[1159]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd3a09cce0 a2=420 a3=0 items=0 ppid=1129 pid=1159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:54.060000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 17 00:33:54.065233 systemd[1]: Finished audit-rules.service. May 17 00:33:54.076106 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. May 17 00:33:54.076346 systemd[1]: Finished oem-gce-enable-oslogin.service. May 17 00:33:54.086179 systemd[1]: Finished systemd-journal-catalog-update.service. May 17 00:33:54.101843 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:33:54.103338 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:33:54.107128 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:33:54.118015 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:33:54.127772 systemd[1]: Starting modprobe@loop.service... May 17 00:33:54.136773 systemd[1]: Starting oem-gce-enable-oslogin.service... May 17 00:33:54.142137 enable-oslogin[1167]: /etc/pam.d/sshd already exists. Not enabling OS Login May 17 00:33:54.145874 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:33:54.146244 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:33:54.148915 systemd[1]: Starting systemd-update-done.service... May 17 00:33:54.155486 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 17 00:33:54.155797 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:33:54.160912 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:33:54.161568 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:33:54.171105 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:33:54.171318 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:33:54.181387 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:33:54.181611 systemd[1]: Finished modprobe@loop.service. May 17 00:33:54.191379 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. May 17 00:33:54.191628 systemd[1]: Finished oem-gce-enable-oslogin.service. May 17 00:33:54.201541 systemd[1]: Finished systemd-update-done.service. May 17 00:33:54.215268 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:33:54.215744 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:33:54.219959 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:33:54.229802 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:33:54.232439 systemd-resolved[1148]: Positive Trust Anchors: May 17 00:33:54.232452 systemd-resolved[1148]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 17 00:33:54.232516 systemd-resolved[1148]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 17 00:33:54.238567 systemd[1]: Starting modprobe@loop.service... May 17 00:33:54.247671 systemd[1]: Starting oem-gce-enable-oslogin.service... May 17 00:33:54.249524 systemd-resolved[1148]: Defaulting to hostname 'linux'. May 17 00:33:54.253360 enable-oslogin[1172]: /etc/pam.d/sshd already exists. Not enabling OS Login May 17 00:33:54.256584 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:33:54.256833 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:33:54.257024 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 17 00:33:54.257173 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:33:54.259234 systemd[1]: Started systemd-resolved.service. May 17 00:33:54.268290 systemd[1]: Finished systemd-update-utmp.service. May 17 00:33:54.277160 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:33:54.277418 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:33:54.286352 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:33:54.286632 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:33:54.295418 systemd-timesyncd[1152]: Contacted time server 169.254.169.254:123 (169.254.169.254). May 17 00:33:54.295503 systemd-timesyncd[1152]: Initial clock synchronization to Sat 2025-05-17 00:33:54.656933 UTC. May 17 00:33:54.296099 systemd[1]: Started systemd-timesyncd.service. May 17 00:33:54.305563 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:33:54.305802 systemd[1]: Finished modprobe@loop.service. May 17 00:33:54.315204 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. May 17 00:33:54.315477 systemd[1]: Finished oem-gce-enable-oslogin.service. May 17 00:33:54.325230 systemd[1]: Reached target network.target. May 17 00:33:54.333714 systemd[1]: Reached target nss-lookup.target. May 17 00:33:54.342727 systemd[1]: Reached target time-set.target. May 17 00:33:54.351698 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:33:54.351938 systemd[1]: Reached target sysinit.target. May 17 00:33:54.360842 systemd[1]: Started motdgen.path. May 17 00:33:54.367766 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 17 00:33:54.378009 systemd[1]: Started logrotate.timer. May 17 00:33:54.385838 systemd[1]: Started mdadm.timer. May 17 00:33:54.392740 systemd[1]: Started systemd-tmpfiles-clean.timer. May 17 00:33:54.401659 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 17 00:33:54.401951 systemd[1]: Reached target paths.target. May 17 00:33:54.408682 systemd[1]: Reached target timers.target. May 17 00:33:54.416592 systemd[1]: Listening on dbus.socket. May 17 00:33:54.425504 systemd[1]: Starting docker.socket... May 17 00:33:54.436841 systemd[1]: Listening on sshd.socket. May 17 00:33:54.443778 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:33:54.444103 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:33:54.447031 systemd[1]: Listening on docker.socket. May 17 00:33:54.457086 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 17 00:33:54.457386 systemd[1]: Reached target sockets.target. May 17 00:33:54.465617 systemd[1]: Reached target basic.target. May 17 00:33:54.472704 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 17 00:33:54.473019 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 17 00:33:54.474944 systemd[1]: Starting containerd.service... May 17 00:33:54.484176 systemd[1]: Starting coreos-metadata-sshkeys@core.service... May 17 00:33:54.494552 systemd[1]: Starting dbus.service... May 17 00:33:54.504933 systemd[1]: Starting enable-oem-cloudinit.service... May 17 00:33:54.513728 systemd[1]: Starting extend-filesystems.service... May 17 00:33:54.520522 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 17 00:33:54.523015 systemd[1]: Starting modprobe@drm.service... May 17 00:33:54.533074 jq[1179]: false May 17 00:33:54.532645 systemd[1]: Starting motdgen.service... May 17 00:33:54.542051 systemd[1]: Starting prepare-helm.service... May 17 00:33:54.551594 systemd[1]: Starting ssh-key-proc-cmdline.service... May 17 00:33:54.560658 systemd[1]: Starting sshd-keygen.service... May 17 00:33:54.569658 systemd[1]: Starting systemd-networkd-wait-online.service... May 17 00:33:54.578503 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:33:54.578794 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionSecurity=!tpm2). May 17 00:33:54.579656 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 17 00:33:54.581273 systemd[1]: Starting update-engine.service... May 17 00:33:54.591003 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 17 00:33:54.596397 extend-filesystems[1180]: Found loop1 May 17 00:33:54.623593 extend-filesystems[1180]: Found sda May 17 00:33:54.623593 extend-filesystems[1180]: Found sda1 May 17 00:33:54.623593 extend-filesystems[1180]: Found sda2 May 17 00:33:54.623593 extend-filesystems[1180]: Found sda3 May 17 00:33:54.623593 extend-filesystems[1180]: Found usr May 17 00:33:54.623593 extend-filesystems[1180]: Found sda4 May 17 00:33:54.623593 extend-filesystems[1180]: Found sda6 May 17 00:33:54.623593 extend-filesystems[1180]: Found sda7 May 17 00:33:54.623593 extend-filesystems[1180]: Found sda9 May 17 00:33:54.623593 extend-filesystems[1180]: Checking size of /dev/sda9 May 17 00:33:54.814412 kernel: EXT4-fs (sda9): resizing filesystem from 1617920 to 2538491 blocks May 17 00:33:54.814594 jq[1201]: true May 17 00:33:54.605158 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 17 00:33:54.730713 dbus-daemon[1178]: [system] SELinux support is enabled May 17 00:33:54.815398 update_engine[1200]: I0517 00:33:54.761935 1200 main.cc:92] Flatcar Update Engine starting May 17 00:33:54.815398 update_engine[1200]: I0517 00:33:54.773816 1200 update_check_scheduler.cc:74] Next update check in 6m27s May 17 00:33:54.817291 extend-filesystems[1180]: Resized partition /dev/sda9 May 17 00:33:54.849596 kernel: EXT4-fs (sda9): resized filesystem to 2538491 May 17 00:33:54.605473 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 17 00:33:54.750401 dbus-daemon[1178]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.0' (uid=244 pid=1016 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") May 17 00:33:54.858472 extend-filesystems[1213]: resize2fs 1.46.5 (30-Dec-2021) May 17 00:33:54.874845 tar[1206]: linux-amd64/LICENSE May 17 00:33:54.874845 tar[1206]: linux-amd64/helm May 17 00:33:54.606326 systemd[1]: modprobe@drm.service: Deactivated successfully. May 17 00:33:54.759882 dbus-daemon[1178]: [system] Successfully activated service 'org.freedesktop.systemd1' May 17 00:33:54.875669 extend-filesystems[1213]: Filesystem at /dev/sda9 is mounted on /; on-line resizing required May 17 00:33:54.875669 extend-filesystems[1213]: old_desc_blocks = 1, new_desc_blocks = 2 May 17 00:33:54.875669 extend-filesystems[1213]: The filesystem on /dev/sda9 is now 2538491 (4k) blocks long. May 17 00:33:54.926598 jq[1211]: true May 17 00:33:54.608276 systemd[1]: Finished modprobe@drm.service. May 17 00:33:54.927224 extend-filesystems[1180]: Resized filesystem in /dev/sda9 May 17 00:33:54.948416 kernel: loop2: detected capacity change from 0 to 2097152 May 17 00:33:54.948475 coreos-metadata[1177]: May 17 00:33:54.886 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/sshKeys: Attempt #1 May 17 00:33:54.948475 coreos-metadata[1177]: May 17 00:33:54.899 INFO Fetch failed with 404: resource not found May 17 00:33:54.948475 coreos-metadata[1177]: May 17 00:33:54.899 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/ssh-keys: Attempt #1 May 17 00:33:54.948475 coreos-metadata[1177]: May 17 00:33:54.900 INFO Fetch successful May 17 00:33:54.948475 coreos-metadata[1177]: May 17 00:33:54.900 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/block-project-ssh-keys: Attempt #1 May 17 00:33:54.948475 coreos-metadata[1177]: May 17 00:33:54.908 INFO Fetch failed with 404: resource not found May 17 00:33:54.948475 coreos-metadata[1177]: May 17 00:33:54.908 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/sshKeys: Attempt #1 May 17 00:33:54.948475 coreos-metadata[1177]: May 17 00:33:54.908 INFO Fetch failed with 404: resource not found May 17 00:33:54.948475 coreos-metadata[1177]: May 17 00:33:54.908 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/ssh-keys: Attempt #1 May 17 00:33:54.948475 coreos-metadata[1177]: May 17 00:33:54.909 INFO Fetch successful May 17 00:33:54.618898 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 17 00:33:54.619183 systemd[1]: Finished ssh-key-proc-cmdline.service. May 17 00:33:54.631738 systemd[1]: Finished systemd-networkd-wait-online.service. May 17 00:33:54.648398 systemd[1]: motdgen.service: Deactivated successfully. May 17 00:33:54.648643 systemd[1]: Finished motdgen.service. May 17 00:33:54.660885 systemd[1]: Reached target network-online.target. May 17 00:33:54.951894 bash[1245]: Updated "/home/core/.ssh/authorized_keys" May 17 00:33:54.670340 systemd[1]: Starting kubelet.service... May 17 00:33:54.952253 mkfs.ext4[1229]: mke2fs 1.46.5 (30-Dec-2021) May 17 00:33:54.952253 mkfs.ext4[1229]: Discarding device blocks: 0/262144\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008 \u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008done May 17 00:33:54.952253 mkfs.ext4[1229]: Creating filesystem with 262144 4k blocks and 65536 inodes May 17 00:33:54.952253 mkfs.ext4[1229]: Filesystem UUID: 60697039-802d-4124-b3e2-415dae71837f May 17 00:33:54.952253 mkfs.ext4[1229]: Superblock backups stored on blocks: May 17 00:33:54.952253 mkfs.ext4[1229]: 32768, 98304, 163840, 229376 May 17 00:33:54.952253 mkfs.ext4[1229]: Allocating group tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done May 17 00:33:54.952253 mkfs.ext4[1229]: Writing inode tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done May 17 00:33:54.952253 mkfs.ext4[1229]: Creating journal (8192 blocks): done May 17 00:33:54.952253 mkfs.ext4[1229]: Writing superblocks and filesystem accounting information: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done May 17 00:33:54.693821 systemd[1]: Starting oem-gce.service... May 17 00:33:54.722633 systemd[1]: Starting systemd-logind.service... May 17 00:33:54.730827 systemd[1]: Finished ensure-sysext.service. May 17 00:33:54.739754 systemd[1]: Started dbus.service. May 17 00:33:54.758464 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 17 00:33:54.954317 umount[1246]: umount: /var/lib/flatcar-oem-gce.img: not mounted. May 17 00:33:54.758530 systemd[1]: Reached target system-config.target. May 17 00:33:54.779631 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 17 00:33:54.954863 update-ssh-keys[1249]: Updated "/home/core/.ssh/authorized_keys" May 17 00:33:54.779674 systemd[1]: Reached target user-config.target. May 17 00:33:54.798163 systemd[1]: Started update-engine.service. May 17 00:33:54.831467 systemd[1]: Started locksmithd.service. May 17 00:33:54.856223 systemd[1]: Starting systemd-hostnamed.service... May 17 00:33:54.879747 systemd[1]: extend-filesystems.service: Deactivated successfully. May 17 00:33:54.880179 systemd[1]: Finished extend-filesystems.service. May 17 00:33:54.911789 unknown[1177]: wrote ssh authorized keys file for user: core May 17 00:33:54.941131 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 17 00:33:54.972676 kernel: EXT4-fs (loop2): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 17 00:33:54.959086 systemd[1]: Finished coreos-metadata-sshkeys@core.service. May 17 00:33:55.002120 env[1212]: time="2025-05-17T00:33:55.001528962Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 17 00:33:55.159925 systemd-logind[1221]: Watching system buttons on /dev/input/event1 (Power Button) May 17 00:33:55.164956 systemd-logind[1221]: Watching system buttons on /dev/input/event2 (Sleep Button) May 17 00:33:55.165205 systemd-logind[1221]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) May 17 00:33:55.167811 systemd-logind[1221]: New seat seat0. May 17 00:33:55.180115 systemd[1]: Started systemd-logind.service. May 17 00:33:55.207713 env[1212]: time="2025-05-17T00:33:55.207648390Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 17 00:33:55.239905 env[1212]: time="2025-05-17T00:33:55.239834124Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 17 00:33:55.245831 env[1212]: time="2025-05-17T00:33:55.245745156Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.182-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 17 00:33:55.246144 env[1212]: time="2025-05-17T00:33:55.246088217Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 17 00:33:55.247966 env[1212]: time="2025-05-17T00:33:55.247914773Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 17 00:33:55.248520 env[1212]: time="2025-05-17T00:33:55.248484645Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 17 00:33:55.248701 env[1212]: time="2025-05-17T00:33:55.248671364Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 17 00:33:55.248860 env[1212]: time="2025-05-17T00:33:55.248833253Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 17 00:33:55.249956 env[1212]: time="2025-05-17T00:33:55.249923545Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 17 00:33:55.252813 env[1212]: time="2025-05-17T00:33:55.252778222Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 17 00:33:55.256485 env[1212]: time="2025-05-17T00:33:55.256427419Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 17 00:33:55.258859 env[1212]: time="2025-05-17T00:33:55.258820853Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 17 00:33:55.259202 env[1212]: time="2025-05-17T00:33:55.259119179Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 17 00:33:55.259386 env[1212]: time="2025-05-17T00:33:55.259346798Z" level=info msg="metadata content store policy set" policy=shared May 17 00:33:55.279781 env[1212]: time="2025-05-17T00:33:55.279717122Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 17 00:33:55.280021 env[1212]: time="2025-05-17T00:33:55.279994462Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 17 00:33:55.280174 env[1212]: time="2025-05-17T00:33:55.280148937Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 17 00:33:55.280495 env[1212]: time="2025-05-17T00:33:55.280468566Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 17 00:33:55.280644 env[1212]: time="2025-05-17T00:33:55.280620267Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 17 00:33:55.280806 env[1212]: time="2025-05-17T00:33:55.280782786Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 17 00:33:55.280939 env[1212]: time="2025-05-17T00:33:55.280915987Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 17 00:33:55.281079 env[1212]: time="2025-05-17T00:33:55.281055238Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 17 00:33:55.281219 env[1212]: time="2025-05-17T00:33:55.281196457Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 17 00:33:55.281353 env[1212]: time="2025-05-17T00:33:55.281330371Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 17 00:33:55.281503 env[1212]: time="2025-05-17T00:33:55.281479329Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 17 00:33:55.281653 env[1212]: time="2025-05-17T00:33:55.281630065Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 17 00:33:55.282004 env[1212]: time="2025-05-17T00:33:55.281968330Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 17 00:33:55.282320 env[1212]: time="2025-05-17T00:33:55.282294922Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 17 00:33:55.283162 env[1212]: time="2025-05-17T00:33:55.283131223Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 17 00:33:55.283352 env[1212]: time="2025-05-17T00:33:55.283325099Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 17 00:33:55.283516 env[1212]: time="2025-05-17T00:33:55.283491007Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 17 00:33:55.283758 env[1212]: time="2025-05-17T00:33:55.283733463Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 17 00:33:55.283963 env[1212]: time="2025-05-17T00:33:55.283938208Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 17 00:33:55.284106 env[1212]: time="2025-05-17T00:33:55.284082151Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 17 00:33:55.284242 env[1212]: time="2025-05-17T00:33:55.284218566Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 17 00:33:55.284425 env[1212]: time="2025-05-17T00:33:55.284361644Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 17 00:33:55.284575 env[1212]: time="2025-05-17T00:33:55.284550576Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 17 00:33:55.287246 env[1212]: time="2025-05-17T00:33:55.287194970Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 17 00:33:55.287468 env[1212]: time="2025-05-17T00:33:55.287440185Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 17 00:33:55.287713 env[1212]: time="2025-05-17T00:33:55.287684867Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 17 00:33:55.290773 env[1212]: time="2025-05-17T00:33:55.290724812Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 17 00:33:55.290976 env[1212]: time="2025-05-17T00:33:55.290947123Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 17 00:33:55.291135 env[1212]: time="2025-05-17T00:33:55.291110300Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 17 00:33:55.291503 env[1212]: time="2025-05-17T00:33:55.291470084Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 17 00:33:55.291686 env[1212]: time="2025-05-17T00:33:55.291655521Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 17 00:33:55.291823 env[1212]: time="2025-05-17T00:33:55.291798851Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 17 00:33:55.291975 env[1212]: time="2025-05-17T00:33:55.291949344Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 17 00:33:55.293585 env[1212]: time="2025-05-17T00:33:55.293505075Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 17 00:33:55.295046 env[1212]: time="2025-05-17T00:33:55.294912993Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 17 00:33:55.298991 env[1212]: time="2025-05-17T00:33:55.295298548Z" level=info msg="Connect containerd service" May 17 00:33:55.298991 env[1212]: time="2025-05-17T00:33:55.295366058Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 17 00:33:55.298991 env[1212]: time="2025-05-17T00:33:55.297484440Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 17 00:33:55.298991 env[1212]: time="2025-05-17T00:33:55.297645445Z" level=info msg="Start subscribing containerd event" May 17 00:33:55.298991 env[1212]: time="2025-05-17T00:33:55.297718838Z" level=info msg="Start recovering state" May 17 00:33:55.298991 env[1212]: time="2025-05-17T00:33:55.297815070Z" level=info msg="Start event monitor" May 17 00:33:55.298991 env[1212]: time="2025-05-17T00:33:55.297839992Z" level=info msg="Start snapshots syncer" May 17 00:33:55.298991 env[1212]: time="2025-05-17T00:33:55.297867673Z" level=info msg="Start cni network conf syncer for default" May 17 00:33:55.298991 env[1212]: time="2025-05-17T00:33:55.297885291Z" level=info msg="Start streaming server" May 17 00:33:55.300159 env[1212]: time="2025-05-17T00:33:55.300125542Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 17 00:33:55.315190 env[1212]: time="2025-05-17T00:33:55.315144287Z" level=info msg=serving... address=/run/containerd/containerd.sock May 17 00:33:55.315665 systemd[1]: Started containerd.service. May 17 00:33:55.316210 env[1212]: time="2025-05-17T00:33:55.316165612Z" level=info msg="containerd successfully booted in 0.358199s" May 17 00:33:55.348484 dbus-daemon[1178]: [system] Successfully activated service 'org.freedesktop.hostname1' May 17 00:33:55.348714 systemd[1]: Started systemd-hostnamed.service. May 17 00:33:55.349855 dbus-daemon[1178]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1240 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") May 17 00:33:55.363095 systemd[1]: Starting polkit.service... May 17 00:33:55.422308 polkitd[1258]: Started polkitd version 121 May 17 00:33:55.449675 polkitd[1258]: Loading rules from directory /etc/polkit-1/rules.d May 17 00:33:55.449795 polkitd[1258]: Loading rules from directory /usr/share/polkit-1/rules.d May 17 00:33:55.453027 polkitd[1258]: Finished loading, compiling and executing 2 rules May 17 00:33:55.453742 dbus-daemon[1178]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' May 17 00:33:55.454009 systemd[1]: Started polkit.service. May 17 00:33:55.454818 polkitd[1258]: Acquired the name org.freedesktop.PolicyKit1 on the system bus May 17 00:33:55.475483 systemd-hostnamed[1240]: Hostname set to (transient) May 17 00:33:55.477833 systemd-resolved[1148]: System hostname changed to 'ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758'. May 17 00:33:56.502984 tar[1206]: linux-amd64/README.md May 17 00:33:56.523972 systemd[1]: Finished prepare-helm.service. May 17 00:33:57.333040 sshd_keygen[1204]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 17 00:33:57.362372 systemd[1]: Started kubelet.service. May 17 00:33:57.405218 systemd[1]: Finished sshd-keygen.service. May 17 00:33:57.416044 systemd[1]: Starting issuegen.service... May 17 00:33:57.432262 systemd[1]: issuegen.service: Deactivated successfully. May 17 00:33:57.432611 systemd[1]: Finished issuegen.service. May 17 00:33:57.444340 systemd[1]: Starting systemd-user-sessions.service... May 17 00:33:57.460462 systemd[1]: Finished systemd-user-sessions.service. May 17 00:33:57.471665 systemd[1]: Started getty@tty1.service. May 17 00:33:57.482230 systemd[1]: Started serial-getty@ttyS0.service. May 17 00:33:57.489566 systemd[1]: Reached target getty.target. May 17 00:33:57.573249 locksmithd[1236]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 17 00:33:58.439997 kubelet[1277]: E0517 00:33:58.439933 1277 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:33:58.442357 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:33:58.442665 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:33:58.443071 systemd[1]: kubelet.service: Consumed 1.491s CPU time. May 17 00:34:00.760130 systemd[1]: var-lib-flatcar\x2doem\x2dgce.mount: Deactivated successfully. May 17 00:34:02.798421 kernel: loop2: detected capacity change from 0 to 2097152 May 17 00:34:02.822457 systemd-nspawn[1292]: Spawning container oem-gce on /var/lib/flatcar-oem-gce.img. May 17 00:34:02.822457 systemd-nspawn[1292]: Press ^] three times within 1s to kill container. May 17 00:34:02.840446 kernel: EXT4-fs (loop2): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 17 00:34:02.927600 systemd[1]: Started oem-gce.service. May 17 00:34:02.928117 systemd[1]: Reached target multi-user.target. May 17 00:34:02.930370 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 17 00:34:02.941576 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 17 00:34:02.941776 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 17 00:34:02.942003 systemd[1]: Startup finished in 1.028s (kernel) + 7.956s (initrd) + 16.169s (userspace) = 25.154s. May 17 00:34:03.003726 systemd-nspawn[1292]: + '[' -e /etc/default/instance_configs.cfg.template ']' May 17 00:34:03.003940 systemd-nspawn[1292]: + echo -e '[InstanceSetup]\nset_host_keys = false' May 17 00:34:03.003940 systemd-nspawn[1292]: + /usr/bin/google_instance_setup May 17 00:34:03.678031 instance-setup[1299]: INFO Running google_set_multiqueue. May 17 00:34:03.693847 instance-setup[1299]: INFO Set channels for eth0 to 2. May 17 00:34:03.697731 instance-setup[1299]: INFO Setting /proc/irq/31/smp_affinity_list to 0 for device virtio1. May 17 00:34:03.699147 instance-setup[1299]: INFO /proc/irq/31/smp_affinity_list: real affinity 0 May 17 00:34:03.699640 instance-setup[1299]: INFO Setting /proc/irq/32/smp_affinity_list to 0 for device virtio1. May 17 00:34:03.701163 instance-setup[1299]: INFO /proc/irq/32/smp_affinity_list: real affinity 0 May 17 00:34:03.701550 instance-setup[1299]: INFO Setting /proc/irq/33/smp_affinity_list to 1 for device virtio1. May 17 00:34:03.702938 instance-setup[1299]: INFO /proc/irq/33/smp_affinity_list: real affinity 1 May 17 00:34:03.703426 instance-setup[1299]: INFO Setting /proc/irq/34/smp_affinity_list to 1 for device virtio1. May 17 00:34:03.704889 instance-setup[1299]: INFO /proc/irq/34/smp_affinity_list: real affinity 1 May 17 00:34:03.716365 instance-setup[1299]: INFO Queue 0 XPS=1 for /sys/class/net/eth0/queues/tx-0/xps_cpus May 17 00:34:03.716797 instance-setup[1299]: INFO Queue 1 XPS=2 for /sys/class/net/eth0/queues/tx-1/xps_cpus May 17 00:34:03.758903 systemd-nspawn[1292]: + /usr/bin/google_metadata_script_runner --script-type startup May 17 00:34:04.099769 startup-script[1330]: INFO Starting startup scripts. May 17 00:34:04.112907 startup-script[1330]: INFO No startup scripts found in metadata. May 17 00:34:04.113073 startup-script[1330]: INFO Finished running startup scripts. May 17 00:34:04.148092 systemd-nspawn[1292]: + trap 'stopping=1 ; kill "${daemon_pids[@]}" || :' SIGTERM May 17 00:34:04.148092 systemd-nspawn[1292]: + daemon_pids=() May 17 00:34:04.148836 systemd-nspawn[1292]: + for d in accounts clock_skew network May 17 00:34:04.148836 systemd-nspawn[1292]: + daemon_pids+=($!) May 17 00:34:04.148836 systemd-nspawn[1292]: + for d in accounts clock_skew network May 17 00:34:04.149056 systemd-nspawn[1292]: + daemon_pids+=($!) May 17 00:34:04.149169 systemd-nspawn[1292]: + for d in accounts clock_skew network May 17 00:34:04.149373 systemd-nspawn[1292]: + daemon_pids+=($!) May 17 00:34:04.149514 systemd-nspawn[1292]: + NOTIFY_SOCKET=/run/systemd/notify May 17 00:34:04.149514 systemd-nspawn[1292]: + /usr/bin/systemd-notify --ready May 17 00:34:04.150216 systemd-nspawn[1292]: + /usr/bin/google_network_daemon May 17 00:34:04.150583 systemd-nspawn[1292]: + /usr/bin/google_clock_skew_daemon May 17 00:34:04.150958 systemd-nspawn[1292]: + /usr/bin/google_accounts_daemon May 17 00:34:04.223762 systemd[1]: Created slice system-sshd.slice. May 17 00:34:04.227620 systemd[1]: Started sshd@0-10.128.0.24:22-139.178.89.65:60762.service. May 17 00:34:04.231252 systemd-nspawn[1292]: + wait -n 36 37 38 May 17 00:34:04.573584 sshd[1338]: Accepted publickey for core from 139.178.89.65 port 60762 ssh2: RSA SHA256:jyE3lnafiBGDGJK6dHnApyF/jgfCnjVgkPORJQqM9Ps May 17 00:34:04.577763 sshd[1338]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:34:04.600491 systemd[1]: Created slice user-500.slice. May 17 00:34:04.603094 systemd[1]: Starting user-runtime-dir@500.service... May 17 00:34:04.612278 systemd-logind[1221]: New session 1 of user core. May 17 00:34:04.623116 systemd[1]: Finished user-runtime-dir@500.service. May 17 00:34:04.627171 systemd[1]: Starting user@500.service... May 17 00:34:04.648143 (systemd)[1341]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 17 00:34:04.867209 systemd[1341]: Queued start job for default target default.target. May 17 00:34:04.869701 systemd[1341]: Reached target paths.target. May 17 00:34:04.869742 systemd[1341]: Reached target sockets.target. May 17 00:34:04.869768 systemd[1341]: Reached target timers.target. May 17 00:34:04.869793 systemd[1341]: Reached target basic.target. May 17 00:34:04.869965 systemd[1]: Started user@500.service. May 17 00:34:04.871633 systemd[1]: Started session-1.scope. May 17 00:34:04.875261 systemd[1341]: Reached target default.target. May 17 00:34:04.876440 systemd[1341]: Startup finished in 209ms. May 17 00:34:04.949711 google-networking[1335]: INFO Starting Google Networking daemon. May 17 00:34:05.042795 google-clock-skew[1334]: INFO Starting Google Clock Skew daemon. May 17 00:34:05.063913 google-clock-skew[1334]: INFO Clock drift token has changed: 0. May 17 00:34:05.075688 google-clock-skew[1334]: WARNING Failed to sync system time with hardware clock. May 17 00:34:05.075972 systemd-nspawn[1292]: hwclock: Cannot access the Hardware Clock via any known method. May 17 00:34:05.075972 systemd-nspawn[1292]: hwclock: Use the --verbose option to see the details of our search for an access method. May 17 00:34:05.101612 systemd[1]: Started sshd@1-10.128.0.24:22-139.178.89.65:60768.service. May 17 00:34:05.188306 groupadd[1360]: group added to /etc/group: name=google-sudoers, GID=1000 May 17 00:34:05.192137 groupadd[1360]: group added to /etc/gshadow: name=google-sudoers May 17 00:34:05.197074 groupadd[1360]: new group: name=google-sudoers, GID=1000 May 17 00:34:05.211586 google-accounts[1333]: INFO Starting Google Accounts daemon. May 17 00:34:05.239477 google-accounts[1333]: WARNING OS Login not installed. May 17 00:34:05.240793 google-accounts[1333]: INFO Creating a new user account for 0. May 17 00:34:05.248384 systemd-nspawn[1292]: useradd: invalid user name '0': use --badname to ignore May 17 00:34:05.249114 google-accounts[1333]: WARNING Could not create user 0. Command '['useradd', '-m', '-s', '/bin/bash', '-p', '*', '0']' returned non-zero exit status 3.. May 17 00:34:05.429979 sshd[1358]: Accepted publickey for core from 139.178.89.65 port 60768 ssh2: RSA SHA256:jyE3lnafiBGDGJK6dHnApyF/jgfCnjVgkPORJQqM9Ps May 17 00:34:05.432031 sshd[1358]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:34:05.439107 systemd[1]: Started session-2.scope. May 17 00:34:05.440224 systemd-logind[1221]: New session 2 of user core. May 17 00:34:05.648216 sshd[1358]: pam_unix(sshd:session): session closed for user core May 17 00:34:05.652565 systemd[1]: sshd@1-10.128.0.24:22-139.178.89.65:60768.service: Deactivated successfully. May 17 00:34:05.653745 systemd[1]: session-2.scope: Deactivated successfully. May 17 00:34:05.654707 systemd-logind[1221]: Session 2 logged out. Waiting for processes to exit. May 17 00:34:05.655928 systemd-logind[1221]: Removed session 2. May 17 00:34:05.696037 systemd[1]: Started sshd@2-10.128.0.24:22-139.178.89.65:60784.service. May 17 00:34:05.988234 sshd[1374]: Accepted publickey for core from 139.178.89.65 port 60784 ssh2: RSA SHA256:jyE3lnafiBGDGJK6dHnApyF/jgfCnjVgkPORJQqM9Ps May 17 00:34:05.990152 sshd[1374]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:34:05.996937 systemd-logind[1221]: New session 3 of user core. May 17 00:34:05.997720 systemd[1]: Started session-3.scope. May 17 00:34:06.200243 sshd[1374]: pam_unix(sshd:session): session closed for user core May 17 00:34:06.204609 systemd[1]: sshd@2-10.128.0.24:22-139.178.89.65:60784.service: Deactivated successfully. May 17 00:34:06.205678 systemd[1]: session-3.scope: Deactivated successfully. May 17 00:34:06.206567 systemd-logind[1221]: Session 3 logged out. Waiting for processes to exit. May 17 00:34:06.207863 systemd-logind[1221]: Removed session 3. May 17 00:34:06.246197 systemd[1]: Started sshd@3-10.128.0.24:22-139.178.89.65:60798.service. May 17 00:34:06.531461 sshd[1380]: Accepted publickey for core from 139.178.89.65 port 60798 ssh2: RSA SHA256:jyE3lnafiBGDGJK6dHnApyF/jgfCnjVgkPORJQqM9Ps May 17 00:34:06.533548 sshd[1380]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:34:06.539687 systemd-logind[1221]: New session 4 of user core. May 17 00:34:06.540480 systemd[1]: Started session-4.scope. May 17 00:34:06.747945 sshd[1380]: pam_unix(sshd:session): session closed for user core May 17 00:34:06.752227 systemd[1]: sshd@3-10.128.0.24:22-139.178.89.65:60798.service: Deactivated successfully. May 17 00:34:06.753284 systemd[1]: session-4.scope: Deactivated successfully. May 17 00:34:06.754122 systemd-logind[1221]: Session 4 logged out. Waiting for processes to exit. May 17 00:34:06.755539 systemd-logind[1221]: Removed session 4. May 17 00:34:06.795335 systemd[1]: Started sshd@4-10.128.0.24:22-139.178.89.65:38034.service. May 17 00:34:07.086875 sshd[1386]: Accepted publickey for core from 139.178.89.65 port 38034 ssh2: RSA SHA256:jyE3lnafiBGDGJK6dHnApyF/jgfCnjVgkPORJQqM9Ps May 17 00:34:07.088868 sshd[1386]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:34:07.095728 systemd[1]: Started session-5.scope. May 17 00:34:07.096557 systemd-logind[1221]: New session 5 of user core. May 17 00:34:07.287282 sudo[1389]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 17 00:34:07.287759 sudo[1389]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:34:07.297679 dbus-daemon[1178]: \xd0-\x8a\x8b\xbdU: received setenforce notice (enforcing=-1708956128) May 17 00:34:07.300190 sudo[1389]: pam_unix(sudo:session): session closed for user root May 17 00:34:07.345516 sshd[1386]: pam_unix(sshd:session): session closed for user core May 17 00:34:07.350678 systemd[1]: sshd@4-10.128.0.24:22-139.178.89.65:38034.service: Deactivated successfully. May 17 00:34:07.351843 systemd[1]: session-5.scope: Deactivated successfully. May 17 00:34:07.352737 systemd-logind[1221]: Session 5 logged out. Waiting for processes to exit. May 17 00:34:07.354060 systemd-logind[1221]: Removed session 5. May 17 00:34:07.392826 systemd[1]: Started sshd@5-10.128.0.24:22-139.178.89.65:38046.service. May 17 00:34:07.685206 sshd[1393]: Accepted publickey for core from 139.178.89.65 port 38046 ssh2: RSA SHA256:jyE3lnafiBGDGJK6dHnApyF/jgfCnjVgkPORJQqM9Ps May 17 00:34:07.687648 sshd[1393]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:34:07.694165 systemd-logind[1221]: New session 6 of user core. May 17 00:34:07.694904 systemd[1]: Started session-6.scope. May 17 00:34:07.866270 sudo[1397]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 17 00:34:07.866729 sudo[1397]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:34:07.871139 sudo[1397]: pam_unix(sudo:session): session closed for user root May 17 00:34:07.884018 sudo[1396]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 17 00:34:07.884455 sudo[1396]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:34:07.897535 systemd[1]: Stopping audit-rules.service... May 17 00:34:07.898000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 17 00:34:07.900593 auditctl[1400]: No rules May 17 00:34:07.905030 kernel: kauditd_printk_skb: 202 callbacks suppressed May 17 00:34:07.905133 kernel: audit: type=1305 audit(1747442047.898:183): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 17 00:34:07.905632 systemd[1]: audit-rules.service: Deactivated successfully. May 17 00:34:07.905889 systemd[1]: Stopped audit-rules.service. May 17 00:34:07.912494 systemd[1]: Starting audit-rules.service... May 17 00:34:07.898000 audit[1400]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdef43d970 a2=420 a3=0 items=0 ppid=1 pid=1400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:07.946797 augenrules[1417]: No rules May 17 00:34:07.948149 systemd[1]: Finished audit-rules.service. May 17 00:34:07.898000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 17 00:34:07.955177 sudo[1396]: pam_unix(sudo:session): session closed for user root May 17 00:34:07.962617 kernel: audit: type=1300 audit(1747442047.898:183): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdef43d970 a2=420 a3=0 items=0 ppid=1 pid=1400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:07.962725 kernel: audit: type=1327 audit(1747442047.898:183): proctitle=2F7362696E2F617564697463746C002D44 May 17 00:34:07.962761 kernel: audit: type=1131 audit(1747442047.904:184): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:07.904000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:07.948000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:08.006758 kernel: audit: type=1130 audit(1747442047.948:185): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:08.006932 kernel: audit: type=1106 audit(1747442047.955:186): pid=1396 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:34:07.955000 audit[1396]: USER_END pid=1396 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:34:08.008708 sshd[1393]: pam_unix(sshd:session): session closed for user core May 17 00:34:08.015928 systemd-logind[1221]: Session 6 logged out. Waiting for processes to exit. May 17 00:34:08.018750 systemd[1]: sshd@5-10.128.0.24:22-139.178.89.65:38046.service: Deactivated successfully. May 17 00:34:08.019868 systemd[1]: session-6.scope: Deactivated successfully. May 17 00:34:08.022096 systemd-logind[1221]: Removed session 6. May 17 00:34:07.955000 audit[1396]: CRED_DISP pid=1396 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:34:08.050552 systemd[1]: Started sshd@6-10.128.0.24:22-139.178.89.65:38062.service. May 17 00:34:08.055591 kernel: audit: type=1104 audit(1747442047.955:187): pid=1396 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:34:08.088478 kernel: audit: type=1106 audit(1747442048.011:188): pid=1393 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:34:08.011000 audit[1393]: USER_END pid=1393 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:34:08.011000 audit[1393]: CRED_DISP pid=1393 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:34:08.017000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.128.0.24:22-139.178.89.65:38046 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:08.137425 kernel: audit: type=1104 audit(1747442048.011:189): pid=1393 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:34:08.137580 kernel: audit: type=1131 audit(1747442048.017:190): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.128.0.24:22-139.178.89.65:38046 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:08.050000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.24:22-139.178.89.65:38062 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:08.339000 audit[1423]: USER_ACCT pid=1423 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:34:08.340930 sshd[1423]: Accepted publickey for core from 139.178.89.65 port 38062 ssh2: RSA SHA256:jyE3lnafiBGDGJK6dHnApyF/jgfCnjVgkPORJQqM9Ps May 17 00:34:08.340000 audit[1423]: CRED_ACQ pid=1423 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:34:08.341000 audit[1423]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc4c803850 a2=3 a3=0 items=0 ppid=1 pid=1423 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:08.341000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:34:08.342912 sshd[1423]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:34:08.349720 systemd[1]: Started session-7.scope. May 17 00:34:08.350321 systemd-logind[1221]: New session 7 of user core. May 17 00:34:08.356000 audit[1423]: USER_START pid=1423 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:34:08.359000 audit[1425]: CRED_ACQ pid=1425 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:34:08.518000 audit[1426]: USER_ACCT pid=1426 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:34:08.519879 sudo[1426]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 17 00:34:08.518000 audit[1426]: CRED_REFR pid=1426 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:34:08.520322 sudo[1426]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:34:08.521492 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 17 00:34:08.520000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:08.520000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:08.521911 systemd[1]: Stopped kubelet.service. May 17 00:34:08.522003 systemd[1]: kubelet.service: Consumed 1.491s CPU time. May 17 00:34:08.523000 audit[1426]: USER_START pid=1426 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:34:08.526608 systemd[1]: Starting kubelet.service... May 17 00:34:08.571324 systemd[1]: Starting docker.service... May 17 00:34:08.646810 env[1438]: time="2025-05-17T00:34:08.645516040Z" level=info msg="Starting up" May 17 00:34:08.648330 env[1438]: time="2025-05-17T00:34:08.648272994Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 17 00:34:08.648330 env[1438]: time="2025-05-17T00:34:08.648303211Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 17 00:34:08.648542 env[1438]: time="2025-05-17T00:34:08.648341624Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 17 00:34:08.648542 env[1438]: time="2025-05-17T00:34:08.648359558Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 17 00:34:08.650556 env[1438]: time="2025-05-17T00:34:08.650512656Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 17 00:34:08.650556 env[1438]: time="2025-05-17T00:34:08.650534509Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 17 00:34:08.650729 env[1438]: time="2025-05-17T00:34:08.650558503Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 17 00:34:08.650729 env[1438]: time="2025-05-17T00:34:08.650575561Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 17 00:34:08.664600 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport2015206158-merged.mount: Deactivated successfully. May 17 00:34:08.873958 systemd[1]: Started kubelet.service. May 17 00:34:08.873000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:08.878347 env[1438]: time="2025-05-17T00:34:08.878304365Z" level=info msg="Loading containers: start." May 17 00:34:08.956241 kubelet[1449]: E0517 00:34:08.955340 1449 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:34:08.961000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 17 00:34:08.961228 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:34:08.961458 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:34:08.991000 audit[1478]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1478 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:08.991000 audit[1478]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffc3a805360 a2=0 a3=7ffc3a80534c items=0 ppid=1438 pid=1478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:08.991000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 May 17 00:34:08.993000 audit[1480]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1480 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:08.993000 audit[1480]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffdeb56bd80 a2=0 a3=7ffdeb56bd6c items=0 ppid=1438 pid=1480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:08.993000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 May 17 00:34:08.996000 audit[1482]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1482 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:08.996000 audit[1482]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffeec33d2c0 a2=0 a3=7ffeec33d2ac items=0 ppid=1438 pid=1482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:08.996000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 17 00:34:08.999000 audit[1484]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1484 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:08.999000 audit[1484]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffe95134a40 a2=0 a3=7ffe95134a2c items=0 ppid=1438 pid=1484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:08.999000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 17 00:34:09.003000 audit[1486]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1486 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:09.003000 audit[1486]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc935e4890 a2=0 a3=7ffc935e487c items=0 ppid=1438 pid=1486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:09.003000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E May 17 00:34:09.025000 audit[1491]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1491 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:09.025000 audit[1491]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdb4092ee0 a2=0 a3=7ffdb4092ecc items=0 ppid=1438 pid=1491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:09.025000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E May 17 00:34:09.036000 audit[1493]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1493 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:09.036000 audit[1493]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff933e8c50 a2=0 a3=7fff933e8c3c items=0 ppid=1438 pid=1493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:09.036000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 May 17 00:34:09.039000 audit[1495]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1495 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:09.039000 audit[1495]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffd444f5280 a2=0 a3=7ffd444f526c items=0 ppid=1438 pid=1495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:09.039000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E May 17 00:34:09.042000 audit[1497]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1497 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:09.042000 audit[1497]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffc8c0b6eb0 a2=0 a3=7ffc8c0b6e9c items=0 ppid=1438 pid=1497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:09.042000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 17 00:34:09.058000 audit[1501]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1501 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:09.058000 audit[1501]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffdff105fd0 a2=0 a3=7ffdff105fbc items=0 ppid=1438 pid=1501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:09.058000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 17 00:34:09.063000 audit[1502]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1502 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:09.063000 audit[1502]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffcd62f96c0 a2=0 a3=7ffcd62f96ac items=0 ppid=1438 pid=1502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:09.063000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 17 00:34:09.081426 kernel: Initializing XFRM netlink socket May 17 00:34:09.126875 env[1438]: time="2025-05-17T00:34:09.126828566Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" May 17 00:34:09.160000 audit[1510]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1510 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:09.160000 audit[1510]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7fff2a403480 a2=0 a3=7fff2a40346c items=0 ppid=1438 pid=1510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:09.160000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 May 17 00:34:09.174000 audit[1513]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1513 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:09.174000 audit[1513]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7fff19d6ecb0 a2=0 a3=7fff19d6ec9c items=0 ppid=1438 pid=1513 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:09.174000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E May 17 00:34:09.179000 audit[1516]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1516 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:09.179000 audit[1516]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffd03081270 a2=0 a3=7ffd0308125c items=0 ppid=1438 pid=1516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:09.179000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 May 17 00:34:09.183000 audit[1518]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1518 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:09.183000 audit[1518]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fff76f83fa0 a2=0 a3=7fff76f83f8c items=0 ppid=1438 pid=1518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:09.183000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 May 17 00:34:09.187000 audit[1520]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1520 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:09.187000 audit[1520]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffcac6654a0 a2=0 a3=7ffcac66548c items=0 ppid=1438 pid=1520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:09.187000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 May 17 00:34:09.189000 audit[1522]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1522 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:09.189000 audit[1522]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7fffdb489d10 a2=0 a3=7fffdb489cfc items=0 ppid=1438 pid=1522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:09.189000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 May 17 00:34:09.192000 audit[1524]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1524 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:09.192000 audit[1524]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffcfc778280 a2=0 a3=7ffcfc77826c items=0 ppid=1438 pid=1524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:09.192000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 May 17 00:34:09.206000 audit[1527]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1527 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:09.206000 audit[1527]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffe55e52d90 a2=0 a3=7ffe55e52d7c items=0 ppid=1438 pid=1527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:09.206000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 May 17 00:34:09.210000 audit[1529]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1529 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:09.210000 audit[1529]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffc398f4c90 a2=0 a3=7ffc398f4c7c items=0 ppid=1438 pid=1529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:09.210000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 17 00:34:09.213000 audit[1531]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1531 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:09.213000 audit[1531]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffc63d568f0 a2=0 a3=7ffc63d568dc items=0 ppid=1438 pid=1531 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:09.213000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 17 00:34:09.216000 audit[1533]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1533 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:09.216000 audit[1533]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff4265c5d0 a2=0 a3=7fff4265c5bc items=0 ppid=1438 pid=1533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:09.216000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 May 17 00:34:09.217950 systemd-networkd[1016]: docker0: Link UP May 17 00:34:09.231000 audit[1537]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1537 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:09.231000 audit[1537]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff843689e0 a2=0 a3=7fff843689cc items=0 ppid=1438 pid=1537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:09.231000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 17 00:34:09.236000 audit[1538]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1538 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:09.236000 audit[1538]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffcef1534d0 a2=0 a3=7ffcef1534bc items=0 ppid=1438 pid=1538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:09.236000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 17 00:34:09.237740 env[1438]: time="2025-05-17T00:34:09.237692313Z" level=info msg="Loading containers: done." May 17 00:34:09.254624 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck3015441095-merged.mount: Deactivated successfully. May 17 00:34:09.264537 env[1438]: time="2025-05-17T00:34:09.264476800Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 May 17 00:34:09.264806 env[1438]: time="2025-05-17T00:34:09.264775949Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 May 17 00:34:09.264961 env[1438]: time="2025-05-17T00:34:09.264924609Z" level=info msg="Daemon has completed initialization" May 17 00:34:09.290222 systemd[1]: Started docker.service. May 17 00:34:09.289000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:09.300701 env[1438]: time="2025-05-17T00:34:09.300626576Z" level=info msg="API listen on /run/docker.sock" May 17 00:34:10.354816 env[1212]: time="2025-05-17T00:34:10.354748605Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.32.5\"" May 17 00:34:10.832281 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1318955898.mount: Deactivated successfully. May 17 00:34:12.532556 env[1212]: time="2025-05-17T00:34:12.532461690Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.32.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:12.535513 env[1212]: time="2025-05-17T00:34:12.535461294Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:495c5ce47cf7c8b58655ef50d0f0a9b43c5ae18492059dc9af4c9aacae82a5a4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:12.538127 env[1212]: time="2025-05-17T00:34:12.538083012Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.32.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:12.540635 env[1212]: time="2025-05-17T00:34:12.540593478Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:0bee1bf751fe06009678c0cde7545443ba3a8d2edf71cea4c69cbb5774b9bf47,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:12.541660 env[1212]: time="2025-05-17T00:34:12.541606722Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.32.5\" returns image reference \"sha256:495c5ce47cf7c8b58655ef50d0f0a9b43c5ae18492059dc9af4c9aacae82a5a4\"" May 17 00:34:12.542831 env[1212]: time="2025-05-17T00:34:12.542796797Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.32.5\"" May 17 00:34:14.208196 env[1212]: time="2025-05-17T00:34:14.208115569Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.32.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:14.210866 env[1212]: time="2025-05-17T00:34:14.210814116Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:85dcaf69f000132c34fa34452e0fd8444bdf360b593fe06b1103680f6ecc7e00,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:14.213517 env[1212]: time="2025-05-17T00:34:14.213460487Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.32.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:14.221276 env[1212]: time="2025-05-17T00:34:14.221219335Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:79bcf2f5e614c336c02dcea9dfcdf485d7297aed6a21239a99c87f7164f9baca,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:14.222394 env[1212]: time="2025-05-17T00:34:14.222291324Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.32.5\" returns image reference \"sha256:85dcaf69f000132c34fa34452e0fd8444bdf360b593fe06b1103680f6ecc7e00\"" May 17 00:34:14.224114 env[1212]: time="2025-05-17T00:34:14.224063635Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.32.5\"" May 17 00:34:15.675996 env[1212]: time="2025-05-17T00:34:15.675923383Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.32.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:15.679030 env[1212]: time="2025-05-17T00:34:15.678970143Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2729fb488407e634105c62238a45a599db1692680526e20844060a7a8197b45a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:15.681661 env[1212]: time="2025-05-17T00:34:15.681621750Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.32.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:15.683929 env[1212]: time="2025-05-17T00:34:15.683889294Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:f0f39d8b9808c407cacb3a46a5a9ce4d4a4a7cf3b674ba4bd221f5bc90051d2a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:15.684921 env[1212]: time="2025-05-17T00:34:15.684869101Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.32.5\" returns image reference \"sha256:2729fb488407e634105c62238a45a599db1692680526e20844060a7a8197b45a\"" May 17 00:34:15.685778 env[1212]: time="2025-05-17T00:34:15.685744098Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.5\"" May 17 00:34:16.787243 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1984047885.mount: Deactivated successfully. May 17 00:34:17.576226 env[1212]: time="2025-05-17T00:34:17.576149674Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.32.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:17.579020 env[1212]: time="2025-05-17T00:34:17.578943382Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f532b7356fac4d7c4e4f6763bb5a15a43e3bb740c9fb26c85b906a4d971f2363,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:17.581020 env[1212]: time="2025-05-17T00:34:17.580955529Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.32.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:17.587627 env[1212]: time="2025-05-17T00:34:17.587583240Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:9dc6553459c3319525ba4090a780db1a133d5dee68c08e07f9b9d6ba83b42a0b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:17.588569 env[1212]: time="2025-05-17T00:34:17.588517071Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.5\" returns image reference \"sha256:f532b7356fac4d7c4e4f6763bb5a15a43e3bb740c9fb26c85b906a4d971f2363\"" May 17 00:34:17.589412 env[1212]: time="2025-05-17T00:34:17.589356241Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\"" May 17 00:34:17.982207 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3719060992.mount: Deactivated successfully. May 17 00:34:19.056191 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. May 17 00:34:19.056557 systemd[1]: Stopped kubelet.service. May 17 00:34:19.055000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:19.064043 kernel: kauditd_printk_skb: 88 callbacks suppressed May 17 00:34:19.064175 kernel: audit: type=1130 audit(1747442059.055:229): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:19.086117 systemd[1]: Starting kubelet.service... May 17 00:34:19.055000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:19.110396 kernel: audit: type=1131 audit(1747442059.055:230): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:19.409000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:19.409679 systemd[1]: Started kubelet.service. May 17 00:34:19.432408 kernel: audit: type=1130 audit(1747442059.409:231): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:19.439429 env[1212]: time="2025-05-17T00:34:19.438823460Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:19.443976 env[1212]: time="2025-05-17T00:34:19.443903826Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:19.450401 env[1212]: time="2025-05-17T00:34:19.449497135Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:19.452628 env[1212]: time="2025-05-17T00:34:19.452589257Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:9caabbf6238b189a65d0d6e6ac138de60d6a1c419e5a341fbbb7c78382559c6e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:19.453926 env[1212]: time="2025-05-17T00:34:19.453888049Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\" returns image reference \"sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6\"" May 17 00:34:19.454888 env[1212]: time="2025-05-17T00:34:19.454840489Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" May 17 00:34:19.500383 kubelet[1575]: E0517 00:34:19.500315 1575 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:34:19.501000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 17 00:34:19.502467 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:34:19.502639 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:34:19.525035 kernel: audit: type=1131 audit(1747442059.501:232): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 17 00:34:19.863620 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3166485158.mount: Deactivated successfully. May 17 00:34:19.873929 env[1212]: time="2025-05-17T00:34:19.873860227Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:19.876477 env[1212]: time="2025-05-17T00:34:19.876424545Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:19.878920 env[1212]: time="2025-05-17T00:34:19.878875117Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:19.880997 env[1212]: time="2025-05-17T00:34:19.880955041Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:19.881738 env[1212]: time="2025-05-17T00:34:19.881686316Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136\"" May 17 00:34:19.882415 env[1212]: time="2025-05-17T00:34:19.882361877Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.16-0\"" May 17 00:34:20.302881 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount609268148.mount: Deactivated successfully. May 17 00:34:22.982245 env[1212]: time="2025-05-17T00:34:22.982158085Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.16-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:22.985480 env[1212]: time="2025-05-17T00:34:22.985420451Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:22.988338 env[1212]: time="2025-05-17T00:34:22.988290665Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.16-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:22.991074 env[1212]: time="2025-05-17T00:34:22.991030611Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:c6a9d11cc5c04b114ccdef39a9265eeef818e3d02f5359be035ae784097fdec5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:22.992163 env[1212]: time="2025-05-17T00:34:22.992112616Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.16-0\" returns image reference \"sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc\"" May 17 00:34:25.508883 systemd[1]: systemd-hostnamed.service: Deactivated successfully. May 17 00:34:25.508000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:25.534552 kernel: audit: type=1131 audit(1747442065.508:233): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:25.550000 audit: BPF prog-id=41 op=UNLOAD May 17 00:34:25.565210 kernel: audit: type=1334 audit(1747442065.550:234): prog-id=41 op=UNLOAD May 17 00:34:25.565326 kernel: audit: type=1334 audit(1747442065.550:235): prog-id=40 op=UNLOAD May 17 00:34:25.550000 audit: BPF prog-id=40 op=UNLOAD May 17 00:34:25.550000 audit: BPF prog-id=39 op=UNLOAD May 17 00:34:25.573404 kernel: audit: type=1334 audit(1747442065.550:236): prog-id=39 op=UNLOAD May 17 00:34:26.858198 systemd[1]: Stopped kubelet.service. May 17 00:34:26.883359 kernel: audit: type=1130 audit(1747442066.858:237): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:26.858000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:26.861794 systemd[1]: Starting kubelet.service... May 17 00:34:26.858000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:26.913855 kernel: audit: type=1131 audit(1747442066.858:238): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:26.925759 systemd[1]: Reloading. May 17 00:34:27.056249 /usr/lib/systemd/system-generators/torcx-generator[1629]: time="2025-05-17T00:34:27Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:34:27.056301 /usr/lib/systemd/system-generators/torcx-generator[1629]: time="2025-05-17T00:34:27Z" level=info msg="torcx already run" May 17 00:34:27.154293 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:34:27.154320 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:34:27.180668 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:34:27.315102 kernel: audit: type=1400 audit(1747442067.291:239): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.291000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.348470 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 17 00:34:27.348674 kernel: audit: type=1400 audit(1747442067.291:240): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.348720 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 May 17 00:34:27.291000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.291000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.291000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.291000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.291000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.291000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.291000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.291000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.314000 audit: BPF prog-id=43 op=LOAD May 17 00:34:27.314000 audit: BPF prog-id=24 op=UNLOAD May 17 00:34:27.316000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.316000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.316000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.316000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.316000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.316000 audit: BPF prog-id=44 op=LOAD May 17 00:34:27.316000 audit: BPF prog-id=35 op=UNLOAD May 17 00:34:27.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.317000 audit: BPF prog-id=45 op=LOAD May 17 00:34:27.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.317000 audit: BPF prog-id=46 op=LOAD May 17 00:34:27.317000 audit: BPF prog-id=36 op=UNLOAD May 17 00:34:27.317000 audit: BPF prog-id=37 op=UNLOAD May 17 00:34:27.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.318000 audit: BPF prog-id=47 op=LOAD May 17 00:34:27.318000 audit: BPF prog-id=38 op=UNLOAD May 17 00:34:27.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.354000 audit: BPF prog-id=48 op=LOAD May 17 00:34:27.354000 audit: BPF prog-id=33 op=UNLOAD May 17 00:34:27.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.373000 audit: BPF prog-id=49 op=LOAD May 17 00:34:27.373000 audit: BPF prog-id=25 op=UNLOAD May 17 00:34:27.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.374000 audit: BPF prog-id=50 op=LOAD May 17 00:34:27.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.374000 audit: BPF prog-id=51 op=LOAD May 17 00:34:27.374000 audit: BPF prog-id=26 op=UNLOAD May 17 00:34:27.374000 audit: BPF prog-id=27 op=UNLOAD May 17 00:34:27.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.375000 audit: BPF prog-id=52 op=LOAD May 17 00:34:27.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.375000 audit: BPF prog-id=53 op=LOAD May 17 00:34:27.375000 audit: BPF prog-id=28 op=UNLOAD May 17 00:34:27.375000 audit: BPF prog-id=29 op=UNLOAD May 17 00:34:27.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.380000 audit: BPF prog-id=54 op=LOAD May 17 00:34:27.380000 audit: BPF prog-id=30 op=UNLOAD May 17 00:34:27.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.380000 audit: BPF prog-id=55 op=LOAD May 17 00:34:27.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.380000 audit: BPF prog-id=56 op=LOAD May 17 00:34:27.380000 audit: BPF prog-id=31 op=UNLOAD May 17 00:34:27.380000 audit: BPF prog-id=32 op=UNLOAD May 17 00:34:27.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:27.381000 audit: BPF prog-id=57 op=LOAD May 17 00:34:27.381000 audit: BPF prog-id=34 op=UNLOAD May 17 00:34:27.500739 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM May 17 00:34:27.501197 systemd[1]: kubelet.service: Failed with result 'signal'. May 17 00:34:27.502056 systemd[1]: Stopped kubelet.service. May 17 00:34:27.500000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 17 00:34:27.507745 systemd[1]: Starting kubelet.service... May 17 00:34:28.431000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:28.430621 systemd[1]: Started kubelet.service. May 17 00:34:28.499891 kubelet[1674]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:34:28.500302 kubelet[1674]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. May 17 00:34:28.500404 kubelet[1674]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:34:28.500599 kubelet[1674]: I0517 00:34:28.500569 1674 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 17 00:34:29.007830 kubelet[1674]: I0517 00:34:29.007768 1674 server.go:520] "Kubelet version" kubeletVersion="v1.32.4" May 17 00:34:29.007830 kubelet[1674]: I0517 00:34:29.007807 1674 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 17 00:34:29.008268 kubelet[1674]: I0517 00:34:29.008226 1674 server.go:954] "Client rotation is on, will bootstrap in background" May 17 00:34:29.061051 kubelet[1674]: E0517 00:34:29.060994 1674 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://10.128.0.24:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.128.0.24:6443: connect: connection refused" logger="UnhandledError" May 17 00:34:29.066506 kubelet[1674]: I0517 00:34:29.066461 1674 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 17 00:34:29.081863 kubelet[1674]: E0517 00:34:29.081802 1674 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 17 00:34:29.082130 kubelet[1674]: I0517 00:34:29.082085 1674 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 17 00:34:29.085951 kubelet[1674]: I0517 00:34:29.085920 1674 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 17 00:34:29.087832 kubelet[1674]: I0517 00:34:29.087765 1674 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 17 00:34:29.088148 kubelet[1674]: I0517 00:34:29.087818 1674 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 17 00:34:29.088148 kubelet[1674]: I0517 00:34:29.088139 1674 topology_manager.go:138] "Creating topology manager with none policy" May 17 00:34:29.088487 kubelet[1674]: I0517 00:34:29.088159 1674 container_manager_linux.go:304] "Creating device plugin manager" May 17 00:34:29.088487 kubelet[1674]: I0517 00:34:29.088334 1674 state_mem.go:36] "Initialized new in-memory state store" May 17 00:34:29.095019 kubelet[1674]: I0517 00:34:29.094976 1674 kubelet.go:446] "Attempting to sync node with API server" May 17 00:34:29.095172 kubelet[1674]: I0517 00:34:29.095034 1674 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" May 17 00:34:29.095172 kubelet[1674]: I0517 00:34:29.095099 1674 kubelet.go:352] "Adding apiserver pod source" May 17 00:34:29.095172 kubelet[1674]: I0517 00:34:29.095120 1674 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 17 00:34:29.115876 kubelet[1674]: W0517 00:34:29.115794 1674 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.128.0.24:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.128.0.24:6443: connect: connection refused May 17 00:34:29.116037 kubelet[1674]: E0517 00:34:29.115880 1674 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.128.0.24:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.128.0.24:6443: connect: connection refused" logger="UnhandledError" May 17 00:34:29.123026 kubelet[1674]: W0517 00:34:29.122943 1674 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.128.0.24:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-7-nightly-20250516-2100-689093e84be69a409758&limit=500&resourceVersion=0": dial tcp 10.128.0.24:6443: connect: connection refused May 17 00:34:29.123026 kubelet[1674]: E0517 00:34:29.123018 1674 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.128.0.24:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-7-nightly-20250516-2100-689093e84be69a409758&limit=500&resourceVersion=0\": dial tcp 10.128.0.24:6443: connect: connection refused" logger="UnhandledError" May 17 00:34:29.124977 kubelet[1674]: I0517 00:34:29.124936 1674 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 17 00:34:29.125758 kubelet[1674]: I0517 00:34:29.125710 1674 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 17 00:34:29.127010 kubelet[1674]: W0517 00:34:29.126962 1674 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 17 00:34:29.136895 kubelet[1674]: I0517 00:34:29.136853 1674 watchdog_linux.go:99] "Systemd watchdog is not enabled" May 17 00:34:29.137052 kubelet[1674]: I0517 00:34:29.136914 1674 server.go:1287] "Started kubelet" May 17 00:34:29.137222 kubelet[1674]: I0517 00:34:29.137165 1674 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 May 17 00:34:29.138648 kubelet[1674]: I0517 00:34:29.138590 1674 server.go:479] "Adding debug handlers to kubelet server" May 17 00:34:29.140000 audit[1674]: AVC avc: denied { mac_admin } for pid=1674 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:29.140000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:34:29.140000 audit[1674]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0009aba40 a1=c00064f320 a2=c0009aba10 a3=25 items=0 ppid=1 pid=1674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:29.140000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:34:29.140000 audit[1674]: AVC avc: denied { mac_admin } for pid=1674 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:29.140000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:34:29.140000 audit[1674]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b6ee40 a1=c00064f338 a2=c0009abad0 a3=25 items=0 ppid=1 pid=1674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:29.140000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:34:29.142607 kubelet[1674]: I0517 00:34:29.141640 1674 kubelet.go:1507] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" May 17 00:34:29.142607 kubelet[1674]: I0517 00:34:29.141697 1674 kubelet.go:1511] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" May 17 00:34:29.142607 kubelet[1674]: I0517 00:34:29.141778 1674 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 17 00:34:29.145762 kubelet[1674]: I0517 00:34:29.145678 1674 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 17 00:34:29.146052 kubelet[1674]: I0517 00:34:29.146025 1674 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 17 00:34:29.146000 audit[1686]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1686 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:29.146000 audit[1686]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fffdeda31b0 a2=0 a3=7fffdeda319c items=0 ppid=1674 pid=1686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:29.146000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 17 00:34:29.147000 audit[1687]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1687 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:29.147000 audit[1687]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffebd8ba560 a2=0 a3=7ffebd8ba54c items=0 ppid=1674 pid=1687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:29.147000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 17 00:34:29.150235 kubelet[1674]: E0517 00:34:29.146509 1674 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.128.0.24:6443/api/v1/namespaces/default/events\": dial tcp 10.128.0.24:6443: connect: connection refused" event="&Event{ObjectMeta:{ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758.1840294db47a2daf default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758,UID:ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758,},FirstTimestamp:2025-05-17 00:34:29.136879023 +0000 UTC m=+0.698316851,LastTimestamp:2025-05-17 00:34:29.136879023 +0000 UTC m=+0.698316851,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758,}" May 17 00:34:29.151590 kubelet[1674]: I0517 00:34:29.151547 1674 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 17 00:34:29.154949 kubelet[1674]: E0517 00:34:29.154903 1674 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758\" not found" May 17 00:34:29.155159 kubelet[1674]: I0517 00:34:29.155139 1674 volume_manager.go:297] "Starting Kubelet Volume Manager" May 17 00:34:29.155557 kubelet[1674]: I0517 00:34:29.155534 1674 desired_state_of_world_populator.go:150] "Desired state populator starts to run" May 17 00:34:29.155729 kubelet[1674]: I0517 00:34:29.155713 1674 reconciler.go:26] "Reconciler: start to sync state" May 17 00:34:29.156300 kubelet[1674]: E0517 00:34:29.156264 1674 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.24:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758?timeout=10s\": dial tcp 10.128.0.24:6443: connect: connection refused" interval="200ms" May 17 00:34:29.156666 kubelet[1674]: I0517 00:34:29.156643 1674 factory.go:221] Registration of the systemd container factory successfully May 17 00:34:29.156880 kubelet[1674]: I0517 00:34:29.156856 1674 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 17 00:34:29.156000 audit[1689]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1689 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:29.156000 audit[1689]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffcf44dfcc0 a2=0 a3=7ffcf44dfcac items=0 ppid=1674 pid=1689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:29.156000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:34:29.160483 kubelet[1674]: W0517 00:34:29.160428 1674 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.128.0.24:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.24:6443: connect: connection refused May 17 00:34:29.160675 kubelet[1674]: E0517 00:34:29.160646 1674 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.128.0.24:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.128.0.24:6443: connect: connection refused" logger="UnhandledError" May 17 00:34:29.162856 kubelet[1674]: E0517 00:34:29.162825 1674 kubelet.go:1555] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 17 00:34:29.163039 kubelet[1674]: I0517 00:34:29.163013 1674 factory.go:221] Registration of the containerd container factory successfully May 17 00:34:29.162000 audit[1691]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1691 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:29.162000 audit[1691]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff9fab4650 a2=0 a3=7fff9fab463c items=0 ppid=1674 pid=1691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:29.162000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:34:29.186000 audit[1697]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1697 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:29.186000 audit[1697]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7fff53c7d2b0 a2=0 a3=7fff53c7d29c items=0 ppid=1674 pid=1697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:29.186000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 17 00:34:29.188346 kubelet[1674]: I0517 00:34:29.188291 1674 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 17 00:34:29.189000 audit[1699]: NETFILTER_CFG table=mangle:31 family=2 entries=1 op=nft_register_chain pid=1699 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:29.189000 audit[1699]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd63882ce0 a2=0 a3=7ffd63882ccc items=0 ppid=1674 pid=1699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:29.189000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 17 00:34:29.191000 audit[1702]: NETFILTER_CFG table=nat:32 family=2 entries=1 op=nft_register_chain pid=1702 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:29.191000 audit[1702]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffed9a16b10 a2=0 a3=7ffed9a16afc items=0 ppid=1674 pid=1702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:29.191000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 17 00:34:29.192000 audit[1698]: NETFILTER_CFG table=mangle:33 family=10 entries=2 op=nft_register_chain pid=1698 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:34:29.192000 audit[1698]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fffb850ac40 a2=0 a3=7fffb850ac2c items=0 ppid=1674 pid=1698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:29.194199 kubelet[1674]: I0517 00:34:29.194164 1674 cpu_manager.go:221] "Starting CPU manager" policy="none" May 17 00:34:29.194395 kubelet[1674]: I0517 00:34:29.194349 1674 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" May 17 00:34:29.194550 kubelet[1674]: I0517 00:34:29.194533 1674 state_mem.go:36] "Initialized new in-memory state store" May 17 00:34:29.193000 audit[1703]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_chain pid=1703 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:29.193000 audit[1703]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdcc0f4580 a2=0 a3=7ffdcc0f456c items=0 ppid=1674 pid=1703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:29.193000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 17 00:34:29.192000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 17 00:34:29.195640 kubelet[1674]: I0517 00:34:29.195611 1674 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 17 00:34:29.195791 kubelet[1674]: I0517 00:34:29.195649 1674 status_manager.go:227] "Starting to sync pod status with apiserver" May 17 00:34:29.195791 kubelet[1674]: I0517 00:34:29.195675 1674 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." May 17 00:34:29.195791 kubelet[1674]: I0517 00:34:29.195687 1674 kubelet.go:2382] "Starting kubelet main sync loop" May 17 00:34:29.195987 kubelet[1674]: E0517 00:34:29.195777 1674 kubelet.go:2406] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 17 00:34:29.196776 kubelet[1674]: W0517 00:34:29.196750 1674 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.128.0.24:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.24:6443: connect: connection refused May 17 00:34:29.196982 kubelet[1674]: E0517 00:34:29.196945 1674 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.128.0.24:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.128.0.24:6443: connect: connection refused" logger="UnhandledError" May 17 00:34:29.197752 kubelet[1674]: I0517 00:34:29.197722 1674 policy_none.go:49] "None policy: Start" May 17 00:34:29.197898 kubelet[1674]: I0517 00:34:29.197881 1674 memory_manager.go:186] "Starting memorymanager" policy="None" May 17 00:34:29.198032 kubelet[1674]: I0517 00:34:29.198016 1674 state_mem.go:35] "Initializing new in-memory state store" May 17 00:34:29.197000 audit[1704]: NETFILTER_CFG table=mangle:35 family=10 entries=1 op=nft_register_chain pid=1704 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:34:29.197000 audit[1704]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe11915130 a2=0 a3=7ffe1191511c items=0 ppid=1674 pid=1704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:29.197000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 17 00:34:29.199000 audit[1705]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1705 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:34:29.199000 audit[1705]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffe74ba3600 a2=0 a3=7ffe74ba35ec items=0 ppid=1674 pid=1705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:29.199000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 17 00:34:29.201000 audit[1706]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1706 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:34:29.201000 audit[1706]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fffb71efc50 a2=0 a3=7fffb71efc3c items=0 ppid=1674 pid=1706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:29.201000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 17 00:34:29.206515 systemd[1]: Created slice kubepods.slice. May 17 00:34:29.213411 systemd[1]: Created slice kubepods-burstable.slice. May 17 00:34:29.217646 systemd[1]: Created slice kubepods-besteffort.slice. May 17 00:34:29.224479 kubelet[1674]: I0517 00:34:29.224449 1674 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 17 00:34:29.223000 audit[1674]: AVC avc: denied { mac_admin } for pid=1674 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:29.223000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:34:29.223000 audit[1674]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00053ae40 a1=c0009359e0 a2=c00053ae10 a3=25 items=0 ppid=1 pid=1674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:29.223000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:34:29.226228 kubelet[1674]: I0517 00:34:29.225526 1674 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" May 17 00:34:29.226228 kubelet[1674]: I0517 00:34:29.225853 1674 eviction_manager.go:189] "Eviction manager: starting control loop" May 17 00:34:29.226228 kubelet[1674]: I0517 00:34:29.225879 1674 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 17 00:34:29.226496 kubelet[1674]: I0517 00:34:29.226414 1674 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 17 00:34:29.228809 kubelet[1674]: E0517 00:34:29.228357 1674 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" May 17 00:34:29.228809 kubelet[1674]: E0517 00:34:29.228455 1674 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758\" not found" May 17 00:34:29.318540 systemd[1]: Created slice kubepods-burstable-pod5c06a9179720893c473a0731bd86d4ab.slice. May 17 00:34:29.330797 kubelet[1674]: I0517 00:34:29.330312 1674 kubelet_node_status.go:75] "Attempting to register node" node="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:34:29.332751 kubelet[1674]: E0517 00:34:29.331241 1674 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.128.0.24:6443/api/v1/nodes\": dial tcp 10.128.0.24:6443: connect: connection refused" node="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:34:29.332751 kubelet[1674]: E0517 00:34:29.332400 1674 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758\" not found" node="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:34:29.336493 systemd[1]: Created slice kubepods-burstable-podb3b3a677cb1d111b6f065099f3c1f8f9.slice. May 17 00:34:29.339510 kubelet[1674]: E0517 00:34:29.339456 1674 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758\" not found" node="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:34:29.342554 systemd[1]: Created slice kubepods-burstable-pod270d6e3ddc87617a4aaba39231191d4d.slice. May 17 00:34:29.344950 kubelet[1674]: E0517 00:34:29.344917 1674 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758\" not found" node="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:34:29.357240 kubelet[1674]: I0517 00:34:29.357184 1674 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/5c06a9179720893c473a0731bd86d4ab-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758\" (UID: \"5c06a9179720893c473a0731bd86d4ab\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:34:29.357402 kubelet[1674]: I0517 00:34:29.357256 1674 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/270d6e3ddc87617a4aaba39231191d4d-ca-certs\") pod \"kube-apiserver-ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758\" (UID: \"270d6e3ddc87617a4aaba39231191d4d\") " pod="kube-system/kube-apiserver-ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:34:29.357402 kubelet[1674]: I0517 00:34:29.357307 1674 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/270d6e3ddc87617a4aaba39231191d4d-k8s-certs\") pod \"kube-apiserver-ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758\" (UID: \"270d6e3ddc87617a4aaba39231191d4d\") " pod="kube-system/kube-apiserver-ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:34:29.357402 kubelet[1674]: I0517 00:34:29.357343 1674 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/270d6e3ddc87617a4aaba39231191d4d-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758\" (UID: \"270d6e3ddc87617a4aaba39231191d4d\") " pod="kube-system/kube-apiserver-ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:34:29.357597 kubelet[1674]: I0517 00:34:29.357404 1674 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/5c06a9179720893c473a0731bd86d4ab-k8s-certs\") pod \"kube-controller-manager-ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758\" (UID: \"5c06a9179720893c473a0731bd86d4ab\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:34:29.357597 kubelet[1674]: I0517 00:34:29.357433 1674 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/5c06a9179720893c473a0731bd86d4ab-kubeconfig\") pod \"kube-controller-manager-ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758\" (UID: \"5c06a9179720893c473a0731bd86d4ab\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:34:29.357597 kubelet[1674]: I0517 00:34:29.357525 1674 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/b3b3a677cb1d111b6f065099f3c1f8f9-kubeconfig\") pod \"kube-scheduler-ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758\" (UID: \"b3b3a677cb1d111b6f065099f3c1f8f9\") " pod="kube-system/kube-scheduler-ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:34:29.357766 kubelet[1674]: I0517 00:34:29.357598 1674 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/5c06a9179720893c473a0731bd86d4ab-ca-certs\") pod \"kube-controller-manager-ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758\" (UID: \"5c06a9179720893c473a0731bd86d4ab\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:34:29.357766 kubelet[1674]: I0517 00:34:29.357653 1674 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/5c06a9179720893c473a0731bd86d4ab-flexvolume-dir\") pod \"kube-controller-manager-ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758\" (UID: \"5c06a9179720893c473a0731bd86d4ab\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:34:29.358194 kubelet[1674]: E0517 00:34:29.358155 1674 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.24:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758?timeout=10s\": dial tcp 10.128.0.24:6443: connect: connection refused" interval="400ms" May 17 00:34:29.536178 kubelet[1674]: I0517 00:34:29.536136 1674 kubelet_node_status.go:75] "Attempting to register node" node="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:34:29.536773 kubelet[1674]: E0517 00:34:29.536582 1674 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.128.0.24:6443/api/v1/nodes\": dial tcp 10.128.0.24:6443: connect: connection refused" node="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:34:29.638577 env[1212]: time="2025-05-17T00:34:29.634570116Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758,Uid:5c06a9179720893c473a0731bd86d4ab,Namespace:kube-system,Attempt:0,}" May 17 00:34:29.642526 env[1212]: time="2025-05-17T00:34:29.642478855Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758,Uid:b3b3a677cb1d111b6f065099f3c1f8f9,Namespace:kube-system,Attempt:0,}" May 17 00:34:29.646460 env[1212]: time="2025-05-17T00:34:29.646405018Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758,Uid:270d6e3ddc87617a4aaba39231191d4d,Namespace:kube-system,Attempt:0,}" May 17 00:34:29.759768 kubelet[1674]: E0517 00:34:29.759685 1674 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.24:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758?timeout=10s\": dial tcp 10.128.0.24:6443: connect: connection refused" interval="800ms" May 17 00:34:29.944296 kubelet[1674]: I0517 00:34:29.943725 1674 kubelet_node_status.go:75] "Attempting to register node" node="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:34:29.944296 kubelet[1674]: E0517 00:34:29.944188 1674 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.128.0.24:6443/api/v1/nodes\": dial tcp 10.128.0.24:6443: connect: connection refused" node="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:34:29.958261 kubelet[1674]: W0517 00:34:29.958160 1674 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.128.0.24:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.128.0.24:6443: connect: connection refused May 17 00:34:29.958261 kubelet[1674]: E0517 00:34:29.958254 1674 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.128.0.24:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.128.0.24:6443: connect: connection refused" logger="UnhandledError" May 17 00:34:29.975357 kubelet[1674]: W0517 00:34:29.975274 1674 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.128.0.24:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-7-nightly-20250516-2100-689093e84be69a409758&limit=500&resourceVersion=0": dial tcp 10.128.0.24:6443: connect: connection refused May 17 00:34:29.975597 kubelet[1674]: E0517 00:34:29.975397 1674 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.128.0.24:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-7-nightly-20250516-2100-689093e84be69a409758&limit=500&resourceVersion=0\": dial tcp 10.128.0.24:6443: connect: connection refused" logger="UnhandledError" May 17 00:34:30.004709 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1016344773.mount: Deactivated successfully. May 17 00:34:30.010573 env[1212]: time="2025-05-17T00:34:30.010517309Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:30.011757 env[1212]: time="2025-05-17T00:34:30.011709983Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:30.014145 env[1212]: time="2025-05-17T00:34:30.014096396Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:30.017856 env[1212]: time="2025-05-17T00:34:30.017801247Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:30.019116 env[1212]: time="2025-05-17T00:34:30.019064108Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:30.020622 env[1212]: time="2025-05-17T00:34:30.020576290Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:30.023107 env[1212]: time="2025-05-17T00:34:30.023053748Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:30.025647 env[1212]: time="2025-05-17T00:34:30.025599645Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:30.028200 env[1212]: time="2025-05-17T00:34:30.028149276Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:30.030662 env[1212]: time="2025-05-17T00:34:30.030614088Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:30.031669 env[1212]: time="2025-05-17T00:34:30.031620640Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:30.032890 env[1212]: time="2025-05-17T00:34:30.032537514Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:30.062025 env[1212]: time="2025-05-17T00:34:30.061764184Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:34:30.062025 env[1212]: time="2025-05-17T00:34:30.061815523Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:34:30.062025 env[1212]: time="2025-05-17T00:34:30.061834224Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:34:30.062515 env[1212]: time="2025-05-17T00:34:30.062450670Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/fbeb1b95602ae26ee6827c1a7cdf176417d3233cfd5acccf9d6110d442f12816 pid=1715 runtime=io.containerd.runc.v2 May 17 00:34:30.105753 env[1212]: time="2025-05-17T00:34:30.105642106Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:34:30.106194 env[1212]: time="2025-05-17T00:34:30.106148529Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:34:30.106429 env[1212]: time="2025-05-17T00:34:30.106356634Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:34:30.106950 env[1212]: time="2025-05-17T00:34:30.106911328Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bbca4a099cc3821212e19ba36c1a3daeab20d8fe39d533b7ccc9486070a8921a pid=1736 runtime=io.containerd.runc.v2 May 17 00:34:30.117385 systemd[1]: Started cri-containerd-fbeb1b95602ae26ee6827c1a7cdf176417d3233cfd5acccf9d6110d442f12816.scope. May 17 00:34:30.146118 systemd[1]: Started cri-containerd-bbca4a099cc3821212e19ba36c1a3daeab20d8fe39d533b7ccc9486070a8921a.scope. May 17 00:34:30.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.162000 audit: BPF prog-id=58 op=LOAD May 17 00:34:30.164417 env[1212]: time="2025-05-17T00:34:30.162271900Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:34:30.164417 env[1212]: time="2025-05-17T00:34:30.162346615Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:34:30.164417 env[1212]: time="2025-05-17T00:34:30.162405704Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:34:30.164417 env[1212]: time="2025-05-17T00:34:30.162630930Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5753827ed16c4ce72ef36b8ff0c833016c5634efe1bb2dde9a960c52e79376e4 pid=1759 runtime=io.containerd.runc.v2 May 17 00:34:30.163000 audit[1727]: AVC avc: denied { bpf } for pid=1727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.163000 audit[1727]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1715 pid=1727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:30.163000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662656231623935363032616532366565363832376331613763646631 May 17 00:34:30.163000 audit[1727]: AVC avc: denied { perfmon } for pid=1727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.163000 audit[1727]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1715 pid=1727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:30.163000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662656231623935363032616532366565363832376331613763646631 May 17 00:34:30.163000 audit[1727]: AVC avc: denied { bpf } for pid=1727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.163000 audit[1727]: AVC avc: denied { bpf } for pid=1727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.163000 audit[1727]: AVC avc: denied { bpf } for pid=1727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.163000 audit[1727]: AVC avc: denied { perfmon } for pid=1727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.163000 audit[1727]: AVC avc: denied { perfmon } for pid=1727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.163000 audit[1727]: AVC avc: denied { perfmon } for pid=1727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.163000 audit[1727]: AVC avc: denied { perfmon } for pid=1727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.163000 audit[1727]: AVC avc: denied { perfmon } for pid=1727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.163000 audit[1727]: AVC avc: denied { bpf } for pid=1727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.163000 audit[1727]: AVC avc: denied { bpf } for pid=1727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.163000 audit: BPF prog-id=59 op=LOAD May 17 00:34:30.163000 audit[1727]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0001a8620 items=0 ppid=1715 pid=1727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:30.163000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662656231623935363032616532366565363832376331613763646631 May 17 00:34:30.163000 audit[1727]: AVC avc: denied { bpf } for pid=1727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.163000 audit[1727]: AVC avc: denied { bpf } for pid=1727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.163000 audit[1727]: AVC avc: denied { perfmon } for pid=1727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.163000 audit[1727]: AVC avc: denied { perfmon } for pid=1727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.163000 audit[1727]: AVC avc: denied { perfmon } for pid=1727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.163000 audit[1727]: AVC avc: denied { perfmon } for pid=1727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.163000 audit[1727]: AVC avc: denied { perfmon } for pid=1727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.163000 audit[1727]: AVC avc: denied { bpf } for pid=1727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.163000 audit[1727]: AVC avc: denied { bpf } for pid=1727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.163000 audit: BPF prog-id=60 op=LOAD May 17 00:34:30.163000 audit[1727]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0001a8668 items=0 ppid=1715 pid=1727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:30.163000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662656231623935363032616532366565363832376331613763646631 May 17 00:34:30.163000 audit: BPF prog-id=60 op=UNLOAD May 17 00:34:30.163000 audit: BPF prog-id=59 op=UNLOAD May 17 00:34:30.163000 audit[1727]: AVC avc: denied { bpf } for pid=1727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.163000 audit[1727]: AVC avc: denied { bpf } for pid=1727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.163000 audit[1727]: AVC avc: denied { bpf } for pid=1727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.163000 audit[1727]: AVC avc: denied { perfmon } for pid=1727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.163000 audit[1727]: AVC avc: denied { perfmon } for pid=1727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.163000 audit[1727]: AVC avc: denied { perfmon } for pid=1727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.163000 audit[1727]: AVC avc: denied { perfmon } for pid=1727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.163000 audit[1727]: AVC avc: denied { perfmon } for pid=1727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.163000 audit[1727]: AVC avc: denied { bpf } for pid=1727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.163000 audit[1727]: AVC avc: denied { bpf } for pid=1727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.163000 audit: BPF prog-id=61 op=LOAD May 17 00:34:30.163000 audit[1727]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0001a8a78 items=0 ppid=1715 pid=1727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:30.163000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662656231623935363032616532366565363832376331613763646631 May 17 00:34:30.201402 systemd[1]: Started cri-containerd-5753827ed16c4ce72ef36b8ff0c833016c5634efe1bb2dde9a960c52e79376e4.scope. May 17 00:34:30.238400 kubelet[1674]: W0517 00:34:30.236962 1674 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.128.0.24:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.24:6443: connect: connection refused May 17 00:34:30.238400 kubelet[1674]: E0517 00:34:30.237075 1674 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.128.0.24:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.128.0.24:6443: connect: connection refused" logger="UnhandledError" May 17 00:34:30.246171 env[1212]: time="2025-05-17T00:34:30.246103131Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758,Uid:270d6e3ddc87617a4aaba39231191d4d,Namespace:kube-system,Attempt:0,} returns sandbox id \"fbeb1b95602ae26ee6827c1a7cdf176417d3233cfd5acccf9d6110d442f12816\"" May 17 00:34:30.252839 kubelet[1674]: E0517 00:34:30.252765 1674 kubelet_pods.go:555] "Hostname for pod was too long, truncated it" podName="kube-apiserver-ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" hostnameMaxLen=63 truncatedHostname="kube-apiserver-ci-3510-3-7-nightly-20250516-2100-689093e84be69a" May 17 00:34:30.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.253000 audit: BPF prog-id=62 op=LOAD May 17 00:34:30.254000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.254000 audit[1786]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1759 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:30.254000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537353338323765643136633463653732656633366238666630633833 May 17 00:34:30.254000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.254000 audit[1786]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1759 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:30.254000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537353338323765643136633463653732656633366238666630633833 May 17 00:34:30.254000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.254000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.254000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.254000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.254000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.254000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.254000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.254000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.254000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.254000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.254000 audit: BPF prog-id=63 op=LOAD May 17 00:34:30.254000 audit[1786]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000257ce0 items=0 ppid=1759 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:30.254000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537353338323765643136633463653732656633366238666630633833 May 17 00:34:30.255000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.255000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.255000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.255000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.255000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.255000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.255000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.255000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.255000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.255000 audit: BPF prog-id=64 op=LOAD May 17 00:34:30.255000 audit[1786]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000257d28 items=0 ppid=1759 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:30.255000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537353338323765643136633463653732656633366238666630633833 May 17 00:34:30.255000 audit: BPF prog-id=64 op=UNLOAD May 17 00:34:30.255000 audit: BPF prog-id=63 op=UNLOAD May 17 00:34:30.255000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.255000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.255000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.255000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.255000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.255000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.255000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.255000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.255000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.255000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.255000 audit: BPF prog-id=65 op=LOAD May 17 00:34:30.255000 audit[1786]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000358138 items=0 ppid=1759 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:30.255000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537353338323765643136633463653732656633366238666630633833 May 17 00:34:30.259512 env[1212]: time="2025-05-17T00:34:30.258346507Z" level=info msg="CreateContainer within sandbox \"fbeb1b95602ae26ee6827c1a7cdf176417d3233cfd5acccf9d6110d442f12816\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" May 17 00:34:30.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.261000 audit: BPF prog-id=66 op=LOAD May 17 00:34:30.263000 audit[1760]: AVC avc: denied { bpf } for pid=1760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.263000 audit[1760]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1736 pid=1760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:30.263000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262636134613039396363333832313231326531396261333663316133 May 17 00:34:30.263000 audit[1760]: AVC avc: denied { perfmon } for pid=1760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.263000 audit[1760]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1736 pid=1760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:30.263000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262636134613039396363333832313231326531396261333663316133 May 17 00:34:30.263000 audit[1760]: AVC avc: denied { bpf } for pid=1760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.263000 audit[1760]: AVC avc: denied { bpf } for pid=1760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.263000 audit[1760]: AVC avc: denied { bpf } for pid=1760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.263000 audit[1760]: AVC avc: denied { perfmon } for pid=1760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.263000 audit[1760]: AVC avc: denied { perfmon } for pid=1760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.263000 audit[1760]: AVC avc: denied { perfmon } for pid=1760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.263000 audit[1760]: AVC avc: denied { perfmon } for pid=1760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.263000 audit[1760]: AVC avc: denied { perfmon } for pid=1760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.263000 audit[1760]: AVC avc: denied { bpf } for pid=1760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.263000 audit[1760]: AVC avc: denied { bpf } for pid=1760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.263000 audit: BPF prog-id=67 op=LOAD May 17 00:34:30.263000 audit[1760]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000331e20 items=0 ppid=1736 pid=1760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:30.263000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262636134613039396363333832313231326531396261333663316133 May 17 00:34:30.265000 audit[1760]: AVC avc: denied { bpf } for pid=1760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.265000 audit[1760]: AVC avc: denied { bpf } for pid=1760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.265000 audit[1760]: AVC avc: denied { perfmon } for pid=1760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.265000 audit[1760]: AVC avc: denied { perfmon } for pid=1760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.265000 audit[1760]: AVC avc: denied { perfmon } for pid=1760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.265000 audit[1760]: AVC avc: denied { perfmon } for pid=1760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.265000 audit[1760]: AVC avc: denied { perfmon } for pid=1760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.265000 audit[1760]: AVC avc: denied { bpf } for pid=1760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.265000 audit[1760]: AVC avc: denied { bpf } for pid=1760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.265000 audit: BPF prog-id=68 op=LOAD May 17 00:34:30.265000 audit[1760]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000331e68 items=0 ppid=1736 pid=1760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:30.265000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262636134613039396363333832313231326531396261333663316133 May 17 00:34:30.266000 audit: BPF prog-id=68 op=UNLOAD May 17 00:34:30.266000 audit: BPF prog-id=67 op=UNLOAD May 17 00:34:30.266000 audit[1760]: AVC avc: denied { bpf } for pid=1760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.266000 audit[1760]: AVC avc: denied { bpf } for pid=1760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.266000 audit[1760]: AVC avc: denied { bpf } for pid=1760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.266000 audit[1760]: AVC avc: denied { perfmon } for pid=1760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.266000 audit[1760]: AVC avc: denied { perfmon } for pid=1760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.266000 audit[1760]: AVC avc: denied { perfmon } for pid=1760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.266000 audit[1760]: AVC avc: denied { perfmon } for pid=1760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.266000 audit[1760]: AVC avc: denied { perfmon } for pid=1760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.266000 audit[1760]: AVC avc: denied { bpf } for pid=1760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.266000 audit[1760]: AVC avc: denied { bpf } for pid=1760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.266000 audit: BPF prog-id=69 op=LOAD May 17 00:34:30.266000 audit[1760]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003b0278 items=0 ppid=1736 pid=1760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:30.266000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262636134613039396363333832313231326531396261333663316133 May 17 00:34:30.290680 env[1212]: time="2025-05-17T00:34:30.290605815Z" level=info msg="CreateContainer within sandbox \"fbeb1b95602ae26ee6827c1a7cdf176417d3233cfd5acccf9d6110d442f12816\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"f415d3dd76559fb89be61aa41718b78738f19ae028bb9afc99e961ea65394f50\"" May 17 00:34:30.291762 env[1212]: time="2025-05-17T00:34:30.291720824Z" level=info msg="StartContainer for \"f415d3dd76559fb89be61aa41718b78738f19ae028bb9afc99e961ea65394f50\"" May 17 00:34:30.324476 env[1212]: time="2025-05-17T00:34:30.324326718Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758,Uid:5c06a9179720893c473a0731bd86d4ab,Namespace:kube-system,Attempt:0,} returns sandbox id \"5753827ed16c4ce72ef36b8ff0c833016c5634efe1bb2dde9a960c52e79376e4\"" May 17 00:34:30.326832 kubelet[1674]: E0517 00:34:30.326469 1674 kubelet_pods.go:555] "Hostname for pod was too long, truncated it" podName="kube-controller-manager-ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" hostnameMaxLen=63 truncatedHostname="kube-controller-manager-ci-3510-3-7-nightly-20250516-2100-68909" May 17 00:34:30.328406 env[1212]: time="2025-05-17T00:34:30.328342170Z" level=info msg="CreateContainer within sandbox \"5753827ed16c4ce72ef36b8ff0c833016c5634efe1bb2dde9a960c52e79376e4\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" May 17 00:34:30.340326 systemd[1]: Started cri-containerd-f415d3dd76559fb89be61aa41718b78738f19ae028bb9afc99e961ea65394f50.scope. May 17 00:34:30.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.368000 audit: BPF prog-id=70 op=LOAD May 17 00:34:30.369000 audit[1832]: AVC avc: denied { bpf } for pid=1832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.369000 audit[1832]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1715 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:30.369000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634313564336464373635353966623839626536316161343137313862 May 17 00:34:30.369000 audit[1832]: AVC avc: denied { perfmon } for pid=1832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.369000 audit[1832]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1715 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:30.369000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634313564336464373635353966623839626536316161343137313862 May 17 00:34:30.369000 audit[1832]: AVC avc: denied { bpf } for pid=1832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.369000 audit[1832]: AVC avc: denied { bpf } for pid=1832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.369000 audit[1832]: AVC avc: denied { bpf } for pid=1832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.369000 audit[1832]: AVC avc: denied { perfmon } for pid=1832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.369000 audit[1832]: AVC avc: denied { perfmon } for pid=1832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.369000 audit[1832]: AVC avc: denied { perfmon } for pid=1832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.369000 audit[1832]: AVC avc: denied { perfmon } for pid=1832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.369000 audit[1832]: AVC avc: denied { perfmon } for pid=1832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.369000 audit[1832]: AVC avc: denied { bpf } for pid=1832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.369000 audit[1832]: AVC avc: denied { bpf } for pid=1832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.369000 audit: BPF prog-id=71 op=LOAD May 17 00:34:30.369000 audit[1832]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000025270 items=0 ppid=1715 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:30.369000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634313564336464373635353966623839626536316161343137313862 May 17 00:34:30.369000 audit[1832]: AVC avc: denied { bpf } for pid=1832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.369000 audit[1832]: AVC avc: denied { bpf } for pid=1832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.369000 audit[1832]: AVC avc: denied { perfmon } for pid=1832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.369000 audit[1832]: AVC avc: denied { perfmon } for pid=1832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.369000 audit[1832]: AVC avc: denied { perfmon } for pid=1832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.369000 audit[1832]: AVC avc: denied { perfmon } for pid=1832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.369000 audit[1832]: AVC avc: denied { perfmon } for pid=1832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.369000 audit[1832]: AVC avc: denied { bpf } for pid=1832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.369000 audit[1832]: AVC avc: denied { bpf } for pid=1832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.369000 audit: BPF prog-id=72 op=LOAD May 17 00:34:30.369000 audit[1832]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0000252b8 items=0 ppid=1715 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:30.369000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634313564336464373635353966623839626536316161343137313862 May 17 00:34:30.369000 audit: BPF prog-id=72 op=UNLOAD May 17 00:34:30.369000 audit: BPF prog-id=71 op=UNLOAD May 17 00:34:30.369000 audit[1832]: AVC avc: denied { bpf } for pid=1832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.369000 audit[1832]: AVC avc: denied { bpf } for pid=1832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.369000 audit[1832]: AVC avc: denied { bpf } for pid=1832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.369000 audit[1832]: AVC avc: denied { perfmon } for pid=1832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.369000 audit[1832]: AVC avc: denied { perfmon } for pid=1832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.369000 audit[1832]: AVC avc: denied { perfmon } for pid=1832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.369000 audit[1832]: AVC avc: denied { perfmon } for pid=1832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.369000 audit[1832]: AVC avc: denied { perfmon } for pid=1832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.369000 audit[1832]: AVC avc: denied { bpf } for pid=1832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.369000 audit[1832]: AVC avc: denied { bpf } for pid=1832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.369000 audit: BPF prog-id=73 op=LOAD May 17 00:34:30.369000 audit[1832]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0000256c8 items=0 ppid=1715 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:30.369000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634313564336464373635353966623839626536316161343137313862 May 17 00:34:30.377628 env[1212]: time="2025-05-17T00:34:30.377567519Z" level=info msg="CreateContainer within sandbox \"5753827ed16c4ce72ef36b8ff0c833016c5634efe1bb2dde9a960c52e79376e4\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"b64c38f1ccaa9543513d4326a4f9aee0c0489ac85ca88124a79d787800086abd\"" May 17 00:34:30.378292 env[1212]: time="2025-05-17T00:34:30.378253681Z" level=info msg="StartContainer for \"b64c38f1ccaa9543513d4326a4f9aee0c0489ac85ca88124a79d787800086abd\"" May 17 00:34:30.381686 env[1212]: time="2025-05-17T00:34:30.381642112Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758,Uid:b3b3a677cb1d111b6f065099f3c1f8f9,Namespace:kube-system,Attempt:0,} returns sandbox id \"bbca4a099cc3821212e19ba36c1a3daeab20d8fe39d533b7ccc9486070a8921a\"" May 17 00:34:30.385560 kubelet[1674]: E0517 00:34:30.385506 1674 kubelet_pods.go:555] "Hostname for pod was too long, truncated it" podName="kube-scheduler-ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" hostnameMaxLen=63 truncatedHostname="kube-scheduler-ci-3510-3-7-nightly-20250516-2100-689093e84be69a" May 17 00:34:30.388924 env[1212]: time="2025-05-17T00:34:30.388882477Z" level=info msg="CreateContainer within sandbox \"bbca4a099cc3821212e19ba36c1a3daeab20d8fe39d533b7ccc9486070a8921a\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" May 17 00:34:30.406064 env[1212]: time="2025-05-17T00:34:30.405998505Z" level=info msg="CreateContainer within sandbox \"bbca4a099cc3821212e19ba36c1a3daeab20d8fe39d533b7ccc9486070a8921a\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"6ee4334ec6f5284dc5885dfea5fe378c002b4f1249980385377057f091c494a1\"" May 17 00:34:30.407620 env[1212]: time="2025-05-17T00:34:30.407574592Z" level=info msg="StartContainer for \"6ee4334ec6f5284dc5885dfea5fe378c002b4f1249980385377057f091c494a1\"" May 17 00:34:30.420198 systemd[1]: Started cri-containerd-b64c38f1ccaa9543513d4326a4f9aee0c0489ac85ca88124a79d787800086abd.scope. May 17 00:34:30.461000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.461000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.461000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.461000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.461000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.461000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.461000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.461000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.461000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.464228 env[1212]: time="2025-05-17T00:34:30.464180371Z" level=info msg="StartContainer for \"f415d3dd76559fb89be61aa41718b78738f19ae028bb9afc99e961ea65394f50\" returns successfully" May 17 00:34:30.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.465000 audit: BPF prog-id=74 op=LOAD May 17 00:34:30.468000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.468000 audit[1867]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1759 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:30.468000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236346333386631636361613935343335313364343332366134663961 May 17 00:34:30.468000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.468000 audit[1867]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1759 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:30.468000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236346333386631636361613935343335313364343332366134663961 May 17 00:34:30.472000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.472000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.472000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.472000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.472000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.472000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.472000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.472000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.472000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.472000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.472000 audit: BPF prog-id=75 op=LOAD May 17 00:34:30.472000 audit[1867]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003253f0 items=0 ppid=1759 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:30.472000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236346333386631636361613935343335313364343332366134663961 May 17 00:34:30.472000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.472000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.472000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.472000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.472000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.472000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.472000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.472000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.472000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.472000 audit: BPF prog-id=76 op=LOAD May 17 00:34:30.472000 audit[1867]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000325438 items=0 ppid=1759 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:30.472000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236346333386631636361613935343335313364343332366134663961 May 17 00:34:30.472000 audit: BPF prog-id=76 op=UNLOAD May 17 00:34:30.472000 audit: BPF prog-id=75 op=UNLOAD May 17 00:34:30.472000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.472000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.472000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.472000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.472000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.472000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.472000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.472000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.472000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.472000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.472000 audit: BPF prog-id=77 op=LOAD May 17 00:34:30.472000 audit[1867]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000325848 items=0 ppid=1759 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:30.472000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236346333386631636361613935343335313364343332366134663961 May 17 00:34:30.483077 systemd[1]: Started cri-containerd-6ee4334ec6f5284dc5885dfea5fe378c002b4f1249980385377057f091c494a1.scope. May 17 00:34:30.523000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.529758 kernel: kauditd_printk_skb: 505 callbacks suppressed May 17 00:34:30.529841 kernel: audit: type=1400 audit(1747442070.523:517): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.550455 kernel: audit: type=1400 audit(1747442070.523:518): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.523000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.571555 kubelet[1674]: E0517 00:34:30.571490 1674 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.24:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758?timeout=10s\": dial tcp 10.128.0.24:6443: connect: connection refused" interval="1.6s" May 17 00:34:30.523000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.594810 kernel: audit: type=1400 audit(1747442070.523:519): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.594970 kernel: audit: type=1400 audit(1747442070.523:520): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.523000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.523000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.637552 kernel: audit: type=1400 audit(1747442070.523:521): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.523000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.661387 kernel: audit: type=1400 audit(1747442070.523:522): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.523000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.688569 kernel: audit: type=1400 audit(1747442070.523:523): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.523000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.711426 kernel: audit: type=1400 audit(1747442070.523:524): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.716241 env[1212]: time="2025-05-17T00:34:30.716116076Z" level=info msg="StartContainer for \"b64c38f1ccaa9543513d4326a4f9aee0c0489ac85ca88124a79d787800086abd\" returns successfully" May 17 00:34:30.523000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.740217 kubelet[1674]: W0517 00:34:30.723701 1674 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.128.0.24:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.24:6443: connect: connection refused May 17 00:34:30.740217 kubelet[1674]: E0517 00:34:30.723796 1674 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.128.0.24:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.128.0.24:6443: connect: connection refused" logger="UnhandledError" May 17 00:34:30.740405 kernel: audit: type=1400 audit(1747442070.523:525): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.765049 kubelet[1674]: I0517 00:34:30.749909 1674 kubelet_node_status.go:75] "Attempting to register node" node="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:34:30.765049 kubelet[1674]: E0517 00:34:30.750416 1674 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.128.0.24:6443/api/v1/nodes\": dial tcp 10.128.0.24:6443: connect: connection refused" node="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:34:30.765407 kernel: audit: type=1400 audit(1747442070.570:526): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.570000 audit: BPF prog-id=78 op=LOAD May 17 00:34:30.572000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.572000 audit[1883]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1736 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:30.572000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665653433333465633666353238346463353838356466656135666533 May 17 00:34:30.572000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.572000 audit[1883]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1736 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:30.572000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665653433333465633666353238346463353838356466656135666533 May 17 00:34:30.572000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.572000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.572000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.572000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.572000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.572000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.572000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.572000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.572000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.572000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.572000 audit: BPF prog-id=79 op=LOAD May 17 00:34:30.572000 audit[1883]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00037b420 items=0 ppid=1736 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:30.572000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665653433333465633666353238346463353838356466656135666533 May 17 00:34:30.614000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.614000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.614000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.614000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.614000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.614000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.614000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.614000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.614000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.614000 audit: BPF prog-id=80 op=LOAD May 17 00:34:30.614000 audit[1883]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00037b468 items=0 ppid=1736 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:30.614000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665653433333465633666353238346463353838356466656135666533 May 17 00:34:30.616000 audit: BPF prog-id=80 op=UNLOAD May 17 00:34:30.616000 audit: BPF prog-id=79 op=UNLOAD May 17 00:34:30.616000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.616000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.616000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.616000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.616000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.616000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.616000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.616000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.616000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.616000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:30.616000 audit: BPF prog-id=81 op=LOAD May 17 00:34:30.616000 audit[1883]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00037b878 items=0 ppid=1736 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:30.616000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665653433333465633666353238346463353838356466656135666533 May 17 00:34:30.849682 env[1212]: time="2025-05-17T00:34:30.849619134Z" level=info msg="StartContainer for \"6ee4334ec6f5284dc5885dfea5fe378c002b4f1249980385377057f091c494a1\" returns successfully" May 17 00:34:31.219447 kubelet[1674]: E0517 00:34:31.218680 1674 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758\" not found" node="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:34:31.219447 kubelet[1674]: E0517 00:34:31.219213 1674 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758\" not found" node="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:34:31.220636 kubelet[1674]: E0517 00:34:31.220606 1674 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758\" not found" node="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:34:32.225043 kubelet[1674]: E0517 00:34:32.225001 1674 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758\" not found" node="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:34:32.225971 kubelet[1674]: E0517 00:34:32.225839 1674 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758\" not found" node="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:34:32.357272 kubelet[1674]: I0517 00:34:32.357199 1674 kubelet_node_status.go:75] "Attempting to register node" node="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:34:33.222465 kubelet[1674]: E0517 00:34:33.222427 1674 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758\" not found" node="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:34:33.533000 audit[1887]: AVC avc: denied { watch } for pid=1887 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7337 scontext=system_u:system_r:svirt_lxc_net_t:s0:c34,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:34:33.533000 audit[1887]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c00062c720 a2=fc6 a3=0 items=0 ppid=1759 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c34,c1023 key=(null) May 17 00:34:33.533000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:34:33.533000 audit[1887]: AVC avc: denied { watch } for pid=1887 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7331 scontext=system_u:system_r:svirt_lxc_net_t:s0:c34,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:34:33.533000 audit[1887]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c000756340 a2=fc6 a3=0 items=0 ppid=1759 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c34,c1023 key=(null) May 17 00:34:33.533000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:34:34.251000 audit[1848]: AVC avc: denied { watch } for pid=1848 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7337 scontext=system_u:system_r:svirt_lxc_net_t:s0:c513,c545 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:34:34.251000 audit[1848]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3f a1=c0081b6450 a2=fc6 a3=0 items=0 ppid=1715 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c513,c545 key=(null) May 17 00:34:34.251000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3234002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:34:34.252000 audit[1848]: AVC avc: denied { watch } for pid=1848 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7331 scontext=system_u:system_r:svirt_lxc_net_t:s0:c513,c545 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:34:34.252000 audit[1848]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3f a1=c008cbf2a0 a2=fc6 a3=0 items=0 ppid=1715 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c513,c545 key=(null) May 17 00:34:34.252000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3234002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:34:34.252000 audit[1848]: AVC avc: denied { watch } for pid=1848 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7333 scontext=system_u:system_r:svirt_lxc_net_t:s0:c513,c545 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:34:34.252000 audit[1848]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3f a1=c005e33350 a2=fc6 a3=0 items=0 ppid=1715 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c513,c545 key=(null) May 17 00:34:34.252000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3234002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:34:34.257000 audit[1848]: AVC avc: denied { watch } for pid=1848 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7339 scontext=system_u:system_r:svirt_lxc_net_t:s0:c513,c545 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:34:34.257000 audit[1848]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4c a1=c0081b6720 a2=fc6 a3=0 items=0 ppid=1715 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c513,c545 key=(null) May 17 00:34:34.257000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3234002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:34:34.270000 audit[1848]: AVC avc: denied { watch } for pid=1848 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7331 scontext=system_u:system_r:svirt_lxc_net_t:s0:c513,c545 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:34:34.270000 audit[1848]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4d a1=c00744fd60 a2=fc6 a3=0 items=0 ppid=1715 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c513,c545 key=(null) May 17 00:34:34.270000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3234002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:34:34.271000 audit[1848]: AVC avc: denied { watch } for pid=1848 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7337 scontext=system_u:system_r:svirt_lxc_net_t:s0:c513,c545 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:34:34.271000 audit[1848]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4d a1=c005e33710 a2=fc6 a3=0 items=0 ppid=1715 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c513,c545 key=(null) May 17 00:34:34.271000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3234002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:34:34.511893 kubelet[1674]: E0517 00:34:34.511725 1674 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758\" not found" node="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:34:34.544618 kubelet[1674]: I0517 00:34:34.544572 1674 kubelet_node_status.go:78] "Successfully registered node" node="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:34:34.556208 kubelet[1674]: I0517 00:34:34.556159 1674 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:34:34.564766 kubelet[1674]: E0517 00:34:34.564709 1674 kubelet.go:3196] "Failed creating a mirror pod" err="pods \"kube-controller-manager-ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-controller-manager-ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:34:34.564766 kubelet[1674]: I0517 00:34:34.564741 1674 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:34:34.567478 kubelet[1674]: E0517 00:34:34.567436 1674 kubelet.go:3196] "Failed creating a mirror pod" err="pods \"kube-scheduler-ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-scheduler-ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:34:34.567478 kubelet[1674]: I0517 00:34:34.567464 1674 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:34:34.569547 kubelet[1674]: E0517 00:34:34.569514 1674 kubelet.go:3196] "Failed creating a mirror pod" err="pods \"kube-apiserver-ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-apiserver-ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:34:34.948392 kubelet[1674]: I0517 00:34:34.948304 1674 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:34:34.950986 kubelet[1674]: E0517 00:34:34.950934 1674 kubelet.go:3196] "Failed creating a mirror pod" err="pods \"kube-controller-manager-ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-controller-manager-ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:34:35.099877 kubelet[1674]: I0517 00:34:35.099801 1674 apiserver.go:52] "Watching apiserver" May 17 00:34:35.155920 kubelet[1674]: I0517 00:34:35.155852 1674 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" May 17 00:34:36.422591 systemd[1]: Reloading. May 17 00:34:36.522768 /usr/lib/systemd/system-generators/torcx-generator[1964]: time="2025-05-17T00:34:36Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:34:36.531636 /usr/lib/systemd/system-generators/torcx-generator[1964]: time="2025-05-17T00:34:36Z" level=info msg="torcx already run" May 17 00:34:36.658076 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:34:36.658102 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:34:36.682515 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:34:36.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.822452 kernel: kauditd_printk_skb: 71 callbacks suppressed May 17 00:34:36.822641 kernel: audit: type=1400 audit(1747442076.796:543): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.844393 kernel: audit: type=1400 audit(1747442076.796:544): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.865586 kernel: audit: type=1400 audit(1747442076.796:545): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.907833 kernel: audit: type=1400 audit(1747442076.796:546): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.908013 kernel: audit: type=1400 audit(1747442076.796:547): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.929087 kernel: audit: type=1400 audit(1747442076.796:548): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.929239 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 17 00:34:36.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.955939 kernel: audit: type=1400 audit(1747442076.796:549): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.956055 kernel: audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 May 17 00:34:36.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.983785 kernel: audit: type=1400 audit(1747442076.796:550): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.801000 audit: BPF prog-id=82 op=LOAD May 17 00:34:36.801000 audit: BPF prog-id=74 op=UNLOAD May 17 00:34:36.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.822000 audit: BPF prog-id=83 op=LOAD May 17 00:34:36.822000 audit: BPF prog-id=43 op=UNLOAD May 17 00:34:36.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.864000 audit: BPF prog-id=84 op=LOAD May 17 00:34:36.864000 audit: BPF prog-id=44 op=UNLOAD May 17 00:34:36.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.865000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.865000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.865000 audit: BPF prog-id=85 op=LOAD May 17 00:34:36.865000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.865000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.865000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.886000 audit: BPF prog-id=86 op=LOAD May 17 00:34:36.886000 audit: BPF prog-id=45 op=UNLOAD May 17 00:34:36.886000 audit: BPF prog-id=46 op=UNLOAD May 17 00:34:36.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.907000 audit: BPF prog-id=87 op=LOAD May 17 00:34:36.907000 audit: BPF prog-id=58 op=UNLOAD May 17 00:34:36.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.987000 audit: BPF prog-id=89 op=LOAD May 17 00:34:36.987000 audit: BPF prog-id=48 op=UNLOAD May 17 00:34:36.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.990000 audit: BPF prog-id=90 op=LOAD May 17 00:34:36.990000 audit: BPF prog-id=78 op=UNLOAD May 17 00:34:36.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.992000 audit: BPF prog-id=91 op=LOAD May 17 00:34:36.992000 audit: BPF prog-id=49 op=UNLOAD May 17 00:34:36.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.992000 audit: BPF prog-id=92 op=LOAD May 17 00:34:36.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.992000 audit: BPF prog-id=93 op=LOAD May 17 00:34:36.992000 audit: BPF prog-id=50 op=UNLOAD May 17 00:34:36.992000 audit: BPF prog-id=51 op=UNLOAD May 17 00:34:36.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.993000 audit: BPF prog-id=94 op=LOAD May 17 00:34:36.993000 audit: BPF prog-id=62 op=UNLOAD May 17 00:34:36.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.994000 audit: BPF prog-id=95 op=LOAD May 17 00:34:36.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.995000 audit: BPF prog-id=96 op=LOAD May 17 00:34:36.995000 audit: BPF prog-id=52 op=UNLOAD May 17 00:34:36.995000 audit: BPF prog-id=53 op=UNLOAD May 17 00:34:36.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:36.998000 audit: BPF prog-id=97 op=LOAD May 17 00:34:36.998000 audit: BPF prog-id=66 op=UNLOAD May 17 00:34:37.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:37.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:37.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:37.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:37.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:37.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:37.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:37.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:37.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:37.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:37.000000 audit: BPF prog-id=98 op=LOAD May 17 00:34:37.000000 audit: BPF prog-id=54 op=UNLOAD May 17 00:34:37.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:37.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:37.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:37.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:37.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:37.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:37.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:37.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:37.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:37.000000 audit: BPF prog-id=99 op=LOAD May 17 00:34:37.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:37.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:37.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:37.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:37.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:37.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:37.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:37.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:37.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:37.000000 audit: BPF prog-id=100 op=LOAD May 17 00:34:37.000000 audit: BPF prog-id=55 op=UNLOAD May 17 00:34:37.000000 audit: BPF prog-id=56 op=UNLOAD May 17 00:34:37.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:37.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:37.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:37.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:37.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:37.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:37.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:37.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:37.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:37.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:37.001000 audit: BPF prog-id=101 op=LOAD May 17 00:34:37.001000 audit: BPF prog-id=57 op=UNLOAD May 17 00:34:37.003000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:37.003000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:37.003000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:37.003000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:37.003000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:37.003000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:37.003000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:37.003000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:37.003000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:37.003000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:37.004000 audit: BPF prog-id=102 op=LOAD May 17 00:34:37.004000 audit: BPF prog-id=70 op=UNLOAD May 17 00:34:37.022557 systemd[1]: Stopping kubelet.service... May 17 00:34:37.053939 systemd[1]: kubelet.service: Deactivated successfully. May 17 00:34:37.054301 systemd[1]: Stopped kubelet.service. May 17 00:34:37.054425 systemd[1]: kubelet.service: Consumed 1.171s CPU time. May 17 00:34:37.054000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:37.057060 systemd[1]: Starting kubelet.service... May 17 00:34:37.310445 systemd[1]: Started kubelet.service. May 17 00:34:37.309000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:37.400604 kubelet[2012]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:34:37.400604 kubelet[2012]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. May 17 00:34:37.400604 kubelet[2012]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:34:37.400604 kubelet[2012]: I0517 00:34:37.399768 2012 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 17 00:34:37.414297 kubelet[2012]: I0517 00:34:37.414174 2012 server.go:520] "Kubelet version" kubeletVersion="v1.32.4" May 17 00:34:37.415146 kubelet[2012]: I0517 00:34:37.415017 2012 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 17 00:34:37.415866 kubelet[2012]: I0517 00:34:37.415837 2012 server.go:954] "Client rotation is on, will bootstrap in background" May 17 00:34:37.420193 kubelet[2012]: I0517 00:34:37.420142 2012 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". May 17 00:34:37.424694 kubelet[2012]: I0517 00:34:37.424625 2012 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 17 00:34:37.431342 kubelet[2012]: E0517 00:34:37.430603 2012 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 17 00:34:37.431342 kubelet[2012]: I0517 00:34:37.430639 2012 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 17 00:34:37.434765 kubelet[2012]: I0517 00:34:37.434484 2012 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 17 00:34:37.434938 kubelet[2012]: I0517 00:34:37.434848 2012 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 17 00:34:37.435285 kubelet[2012]: I0517 00:34:37.434881 2012 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 17 00:34:37.435285 kubelet[2012]: I0517 00:34:37.435164 2012 topology_manager.go:138] "Creating topology manager with none policy" May 17 00:34:37.435285 kubelet[2012]: I0517 00:34:37.435180 2012 container_manager_linux.go:304] "Creating device plugin manager" May 17 00:34:37.435285 kubelet[2012]: I0517 00:34:37.435239 2012 state_mem.go:36] "Initialized new in-memory state store" May 17 00:34:37.435680 kubelet[2012]: I0517 00:34:37.435489 2012 kubelet.go:446] "Attempting to sync node with API server" May 17 00:34:37.435680 kubelet[2012]: I0517 00:34:37.435522 2012 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" May 17 00:34:37.435680 kubelet[2012]: I0517 00:34:37.435548 2012 kubelet.go:352] "Adding apiserver pod source" May 17 00:34:37.435680 kubelet[2012]: I0517 00:34:37.435564 2012 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 17 00:34:37.437189 kubelet[2012]: I0517 00:34:37.437012 2012 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 17 00:34:37.437758 kubelet[2012]: I0517 00:34:37.437712 2012 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 17 00:34:37.438250 kubelet[2012]: I0517 00:34:37.438209 2012 watchdog_linux.go:99] "Systemd watchdog is not enabled" May 17 00:34:37.438250 kubelet[2012]: I0517 00:34:37.438252 2012 server.go:1287] "Started kubelet" May 17 00:34:37.443000 audit[2012]: AVC avc: denied { mac_admin } for pid=2012 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:37.443000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:34:37.443000 audit[2012]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b214a0 a1=c000a30bb8 a2=c000b21470 a3=25 items=0 ppid=1 pid=2012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:37.443000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:34:37.443000 audit[2012]: AVC avc: denied { mac_admin } for pid=2012 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:37.443000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:34:37.443000 audit[2012]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c8a100 a1=c000a30bd0 a2=c000b21530 a3=25 items=0 ppid=1 pid=2012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:37.443000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:34:37.445675 kubelet[2012]: I0517 00:34:37.444859 2012 kubelet.go:1507] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" May 17 00:34:37.445675 kubelet[2012]: I0517 00:34:37.444923 2012 kubelet.go:1511] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" May 17 00:34:37.445675 kubelet[2012]: I0517 00:34:37.444969 2012 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 17 00:34:37.458215 kubelet[2012]: I0517 00:34:37.458158 2012 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 May 17 00:34:37.459122 kubelet[2012]: I0517 00:34:37.459052 2012 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 17 00:34:37.460135 kubelet[2012]: I0517 00:34:37.460110 2012 server.go:479] "Adding debug handlers to kubelet server" May 17 00:34:37.484538 kubelet[2012]: I0517 00:34:37.461157 2012 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 17 00:34:37.484829 kubelet[2012]: I0517 00:34:37.461423 2012 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 17 00:34:37.485232 kubelet[2012]: I0517 00:34:37.466010 2012 volume_manager.go:297] "Starting Kubelet Volume Manager" May 17 00:34:37.485972 kubelet[2012]: I0517 00:34:37.466027 2012 desired_state_of_world_populator.go:150] "Desired state populator starts to run" May 17 00:34:37.486121 kubelet[2012]: E0517 00:34:37.466197 2012 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758\" not found" May 17 00:34:37.486594 kubelet[2012]: I0517 00:34:37.486570 2012 reconciler.go:26] "Reconciler: start to sync state" May 17 00:34:37.515511 kubelet[2012]: I0517 00:34:37.515482 2012 factory.go:221] Registration of the systemd container factory successfully May 17 00:34:37.515807 kubelet[2012]: I0517 00:34:37.515764 2012 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 17 00:34:37.525848 kubelet[2012]: E0517 00:34:37.522943 2012 kubelet.go:1555] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 17 00:34:37.532515 kubelet[2012]: I0517 00:34:37.532472 2012 factory.go:221] Registration of the containerd container factory successfully May 17 00:34:37.587353 kubelet[2012]: I0517 00:34:37.584100 2012 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 17 00:34:37.604923 kubelet[2012]: I0517 00:34:37.598471 2012 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 17 00:34:37.605109 kubelet[2012]: I0517 00:34:37.604935 2012 status_manager.go:227] "Starting to sync pod status with apiserver" May 17 00:34:37.605109 kubelet[2012]: I0517 00:34:37.604964 2012 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." May 17 00:34:37.605109 kubelet[2012]: I0517 00:34:37.604974 2012 kubelet.go:2382] "Starting kubelet main sync loop" May 17 00:34:37.605109 kubelet[2012]: E0517 00:34:37.605049 2012 kubelet.go:2406] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 17 00:34:37.661090 kubelet[2012]: I0517 00:34:37.661057 2012 cpu_manager.go:221] "Starting CPU manager" policy="none" May 17 00:34:37.661308 kubelet[2012]: I0517 00:34:37.661289 2012 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" May 17 00:34:37.661480 kubelet[2012]: I0517 00:34:37.661458 2012 state_mem.go:36] "Initialized new in-memory state store" May 17 00:34:37.661911 kubelet[2012]: I0517 00:34:37.661884 2012 state_mem.go:88] "Updated default CPUSet" cpuSet="" May 17 00:34:37.662095 kubelet[2012]: I0517 00:34:37.662057 2012 state_mem.go:96] "Updated CPUSet assignments" assignments={} May 17 00:34:37.662237 kubelet[2012]: I0517 00:34:37.662222 2012 policy_none.go:49] "None policy: Start" May 17 00:34:37.662339 kubelet[2012]: I0517 00:34:37.662325 2012 memory_manager.go:186] "Starting memorymanager" policy="None" May 17 00:34:37.662458 kubelet[2012]: I0517 00:34:37.662443 2012 state_mem.go:35] "Initializing new in-memory state store" May 17 00:34:37.662752 kubelet[2012]: I0517 00:34:37.662735 2012 state_mem.go:75] "Updated machine memory state" May 17 00:34:37.670230 kubelet[2012]: I0517 00:34:37.670195 2012 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 17 00:34:37.668000 audit[2012]: AVC avc: denied { mac_admin } for pid=2012 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:37.668000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:34:37.668000 audit[2012]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000f0ee40 a1=c000169ec0 a2=c000f0ee10 a3=25 items=0 ppid=1 pid=2012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:37.668000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:34:37.670759 kubelet[2012]: I0517 00:34:37.670280 2012 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" May 17 00:34:37.670759 kubelet[2012]: I0517 00:34:37.670537 2012 eviction_manager.go:189] "Eviction manager: starting control loop" May 17 00:34:37.670759 kubelet[2012]: I0517 00:34:37.670563 2012 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 17 00:34:37.672951 kubelet[2012]: I0517 00:34:37.672266 2012 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 17 00:34:37.677461 kubelet[2012]: E0517 00:34:37.676907 2012 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" May 17 00:34:37.705787 kubelet[2012]: I0517 00:34:37.705751 2012 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:34:37.707734 kubelet[2012]: I0517 00:34:37.706226 2012 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:34:37.709268 kubelet[2012]: I0517 00:34:37.706477 2012 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:34:37.717925 kubelet[2012]: W0517 00:34:37.717872 2012 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters] May 17 00:34:37.720041 kubelet[2012]: W0517 00:34:37.720009 2012 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters] May 17 00:34:37.720264 kubelet[2012]: W0517 00:34:37.720243 2012 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters] May 17 00:34:37.789265 kubelet[2012]: I0517 00:34:37.789209 2012 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/270d6e3ddc87617a4aaba39231191d4d-k8s-certs\") pod \"kube-apiserver-ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758\" (UID: \"270d6e3ddc87617a4aaba39231191d4d\") " pod="kube-system/kube-apiserver-ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:34:37.789716 kubelet[2012]: I0517 00:34:37.789629 2012 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/5c06a9179720893c473a0731bd86d4ab-ca-certs\") pod \"kube-controller-manager-ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758\" (UID: \"5c06a9179720893c473a0731bd86d4ab\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:34:37.789917 kubelet[2012]: I0517 00:34:37.789861 2012 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/5c06a9179720893c473a0731bd86d4ab-k8s-certs\") pod \"kube-controller-manager-ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758\" (UID: \"5c06a9179720893c473a0731bd86d4ab\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:34:37.790047 kubelet[2012]: I0517 00:34:37.789937 2012 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/5c06a9179720893c473a0731bd86d4ab-kubeconfig\") pod \"kube-controller-manager-ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758\" (UID: \"5c06a9179720893c473a0731bd86d4ab\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:34:37.790047 kubelet[2012]: I0517 00:34:37.789980 2012 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/5c06a9179720893c473a0731bd86d4ab-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758\" (UID: \"5c06a9179720893c473a0731bd86d4ab\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:34:37.790047 kubelet[2012]: I0517 00:34:37.790024 2012 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/b3b3a677cb1d111b6f065099f3c1f8f9-kubeconfig\") pod \"kube-scheduler-ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758\" (UID: \"b3b3a677cb1d111b6f065099f3c1f8f9\") " pod="kube-system/kube-scheduler-ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:34:37.790217 kubelet[2012]: I0517 00:34:37.790056 2012 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/270d6e3ddc87617a4aaba39231191d4d-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758\" (UID: \"270d6e3ddc87617a4aaba39231191d4d\") " pod="kube-system/kube-apiserver-ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:34:37.790217 kubelet[2012]: I0517 00:34:37.790087 2012 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/5c06a9179720893c473a0731bd86d4ab-flexvolume-dir\") pod \"kube-controller-manager-ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758\" (UID: \"5c06a9179720893c473a0731bd86d4ab\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:34:37.790217 kubelet[2012]: I0517 00:34:37.790124 2012 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/270d6e3ddc87617a4aaba39231191d4d-ca-certs\") pod \"kube-apiserver-ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758\" (UID: \"270d6e3ddc87617a4aaba39231191d4d\") " pod="kube-system/kube-apiserver-ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:34:37.791680 kubelet[2012]: I0517 00:34:37.791647 2012 kubelet_node_status.go:75] "Attempting to register node" node="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:34:37.803990 kubelet[2012]: I0517 00:34:37.803948 2012 kubelet_node_status.go:124] "Node was previously registered" node="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:34:37.804174 kubelet[2012]: I0517 00:34:37.804075 2012 kubelet_node_status.go:78] "Successfully registered node" node="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:34:38.448959 kubelet[2012]: I0517 00:34:38.448914 2012 apiserver.go:52] "Watching apiserver" May 17 00:34:38.487401 kubelet[2012]: I0517 00:34:38.486347 2012 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" May 17 00:34:38.636430 kubelet[2012]: I0517 00:34:38.636342 2012 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" podStartSLOduration=1.636317298 podStartE2EDuration="1.636317298s" podCreationTimestamp="2025-05-17 00:34:37 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:34:38.623629651 +0000 UTC m=+1.304775031" watchObservedRunningTime="2025-05-17 00:34:38.636317298 +0000 UTC m=+1.317462684" May 17 00:34:38.651194 kubelet[2012]: I0517 00:34:38.651119 2012 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" podStartSLOduration=1.651096748 podStartE2EDuration="1.651096748s" podCreationTimestamp="2025-05-17 00:34:37 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:34:38.640025589 +0000 UTC m=+1.321170975" watchObservedRunningTime="2025-05-17 00:34:38.651096748 +0000 UTC m=+1.332242128" May 17 00:34:38.651500 kubelet[2012]: I0517 00:34:38.651268 2012 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" podStartSLOduration=1.651257076 podStartE2EDuration="1.651257076s" podCreationTimestamp="2025-05-17 00:34:37 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:34:38.650646618 +0000 UTC m=+1.331792002" watchObservedRunningTime="2025-05-17 00:34:38.651257076 +0000 UTC m=+1.332402463" May 17 00:34:39.790329 update_engine[1200]: I0517 00:34:39.789448 1200 update_attempter.cc:509] Updating boot flags... May 17 00:34:40.500000 audit[1887]: AVC avc: denied { watch } for pid=1887 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7331 scontext=system_u:system_r:svirt_lxc_net_t:s0:c34,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:34:40.500000 audit[1887]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000950200 a2=fc6 a3=0 items=0 ppid=1759 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c34,c1023 key=(null) May 17 00:34:40.500000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:34:40.502000 audit[1887]: AVC avc: denied { watch } for pid=1887 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7331 scontext=system_u:system_r:svirt_lxc_net_t:s0:c34,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:34:40.502000 audit[1887]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000950400 a2=fc6 a3=0 items=0 ppid=1759 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c34,c1023 key=(null) May 17 00:34:40.502000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:34:40.503000 audit[1887]: AVC avc: denied { watch } for pid=1887 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7331 scontext=system_u:system_r:svirt_lxc_net_t:s0:c34,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:34:40.503000 audit[1887]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000950420 a2=fc6 a3=0 items=0 ppid=1759 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c34,c1023 key=(null) May 17 00:34:40.503000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:34:40.504000 audit[1887]: AVC avc: denied { watch } for pid=1887 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7331 scontext=system_u:system_r:svirt_lxc_net_t:s0:c34,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:34:40.504000 audit[1887]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000ad7080 a2=fc6 a3=0 items=0 ppid=1759 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c34,c1023 key=(null) May 17 00:34:40.504000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:34:41.952000 audit[1887]: AVC avc: denied { watch } for pid=1887 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c34,c1023 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 17 00:34:41.958590 kernel: kauditd_printk_skb: 274 callbacks suppressed May 17 00:34:41.958745 kernel: audit: type=1400 audit(1747442081.952:789): avc: denied { watch } for pid=1887 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c34,c1023 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 17 00:34:41.952000 audit[1887]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000672340 a2=fc6 a3=0 items=0 ppid=1759 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c34,c1023 key=(null) May 17 00:34:42.020944 kernel: audit: type=1300 audit(1747442081.952:789): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000672340 a2=fc6 a3=0 items=0 ppid=1759 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c34,c1023 key=(null) May 17 00:34:42.021138 kernel: audit: type=1327 audit(1747442081.952:789): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:34:41.952000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:34:43.122163 kubelet[2012]: I0517 00:34:43.122119 2012 kuberuntime_manager.go:1702] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" May 17 00:34:43.122867 kubelet[2012]: I0517 00:34:43.122819 2012 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" May 17 00:34:43.122959 env[1212]: time="2025-05-17T00:34:43.122584537Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 17 00:34:44.097907 systemd[1]: Created slice kubepods-besteffort-poddc636132_466f_41ca_a178_7d6fe492447b.slice. May 17 00:34:44.134695 kubelet[2012]: I0517 00:34:44.134623 2012 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/dc636132-466f-41ca-a178-7d6fe492447b-xtables-lock\") pod \"kube-proxy-bdcfx\" (UID: \"dc636132-466f-41ca-a178-7d6fe492447b\") " pod="kube-system/kube-proxy-bdcfx" May 17 00:34:44.134695 kubelet[2012]: I0517 00:34:44.134696 2012 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/dc636132-466f-41ca-a178-7d6fe492447b-kube-proxy\") pod \"kube-proxy-bdcfx\" (UID: \"dc636132-466f-41ca-a178-7d6fe492447b\") " pod="kube-system/kube-proxy-bdcfx" May 17 00:34:44.135344 kubelet[2012]: I0517 00:34:44.134752 2012 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/dc636132-466f-41ca-a178-7d6fe492447b-lib-modules\") pod \"kube-proxy-bdcfx\" (UID: \"dc636132-466f-41ca-a178-7d6fe492447b\") " pod="kube-system/kube-proxy-bdcfx" May 17 00:34:44.135344 kubelet[2012]: I0517 00:34:44.134785 2012 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-j46l7\" (UniqueName: \"kubernetes.io/projected/dc636132-466f-41ca-a178-7d6fe492447b-kube-api-access-j46l7\") pod \"kube-proxy-bdcfx\" (UID: \"dc636132-466f-41ca-a178-7d6fe492447b\") " pod="kube-system/kube-proxy-bdcfx" May 17 00:34:44.215036 systemd[1]: Created slice kubepods-besteffort-podb3099fb5_49bb_48d3_a27b_a6fbcd4c4b2f.slice. May 17 00:34:44.235378 kubelet[2012]: I0517 00:34:44.235311 2012 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/b3099fb5-49bb-48d3-a27b-a6fbcd4c4b2f-var-lib-calico\") pod \"tigera-operator-844669ff44-vngs6\" (UID: \"b3099fb5-49bb-48d3-a27b-a6fbcd4c4b2f\") " pod="tigera-operator/tigera-operator-844669ff44-vngs6" May 17 00:34:44.237031 kubelet[2012]: I0517 00:34:44.236991 2012 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gfx46\" (UniqueName: \"kubernetes.io/projected/b3099fb5-49bb-48d3-a27b-a6fbcd4c4b2f-kube-api-access-gfx46\") pod \"tigera-operator-844669ff44-vngs6\" (UID: \"b3099fb5-49bb-48d3-a27b-a6fbcd4c4b2f\") " pod="tigera-operator/tigera-operator-844669ff44-vngs6" May 17 00:34:44.253902 kubelet[2012]: I0517 00:34:44.253859 2012 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" May 17 00:34:44.408617 env[1212]: time="2025-05-17T00:34:44.408442135Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-bdcfx,Uid:dc636132-466f-41ca-a178-7d6fe492447b,Namespace:kube-system,Attempt:0,}" May 17 00:34:44.435547 env[1212]: time="2025-05-17T00:34:44.435440957Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:34:44.435547 env[1212]: time="2025-05-17T00:34:44.435489580Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:34:44.435868 env[1212]: time="2025-05-17T00:34:44.435508508Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:34:44.436067 env[1212]: time="2025-05-17T00:34:44.435916283Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f36ab7022df2745d03887e8e468445d1045df85ded91fa920dc5b7b9ee6f59a6 pid=2082 runtime=io.containerd.runc.v2 May 17 00:34:44.463272 systemd[1]: Started cri-containerd-f36ab7022df2745d03887e8e468445d1045df85ded91fa920dc5b7b9ee6f59a6.scope. May 17 00:34:44.481000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.504539 kernel: audit: type=1400 audit(1747442084.481:790): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.481000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.526292 env[1212]: time="2025-05-17T00:34:44.526234650Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-844669ff44-vngs6,Uid:b3099fb5-49bb-48d3-a27b-a6fbcd4c4b2f,Namespace:tigera-operator,Attempt:0,}" May 17 00:34:44.528461 kernel: audit: type=1400 audit(1747442084.481:791): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.528614 kernel: audit: type=1400 audit(1747442084.481:792): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.481000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.570397 kernel: audit: type=1400 audit(1747442084.481:793): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.481000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.570668 env[1212]: time="2025-05-17T00:34:44.562617395Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-bdcfx,Uid:dc636132-466f-41ca-a178-7d6fe492447b,Namespace:kube-system,Attempt:0,} returns sandbox id \"f36ab7022df2745d03887e8e468445d1045df85ded91fa920dc5b7b9ee6f59a6\"" May 17 00:34:44.481000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.582630 env[1212]: time="2025-05-17T00:34:44.579022420Z" level=info msg="CreateContainer within sandbox \"f36ab7022df2745d03887e8e468445d1045df85ded91fa920dc5b7b9ee6f59a6\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 17 00:34:44.481000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.593785 kernel: audit: type=1400 audit(1747442084.481:794): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.593909 kernel: audit: type=1400 audit(1747442084.481:795): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.481000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.635088 kernel: audit: type=1400 audit(1747442084.481:796): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.481000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.481000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.502000 audit: BPF prog-id=103 op=LOAD May 17 00:34:44.503000 audit[2092]: AVC avc: denied { bpf } for pid=2092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.503000 audit[2092]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2082 pid=2092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:44.503000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633366162373032326466323734356430333838376538653436383434 May 17 00:34:44.503000 audit[2092]: AVC avc: denied { perfmon } for pid=2092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.503000 audit[2092]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2082 pid=2092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:44.503000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633366162373032326466323734356430333838376538653436383434 May 17 00:34:44.503000 audit[2092]: AVC avc: denied { bpf } for pid=2092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.503000 audit[2092]: AVC avc: denied { bpf } for pid=2092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.503000 audit[2092]: AVC avc: denied { bpf } for pid=2092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.503000 audit[2092]: AVC avc: denied { perfmon } for pid=2092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.503000 audit[2092]: AVC avc: denied { perfmon } for pid=2092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.503000 audit[2092]: AVC avc: denied { perfmon } for pid=2092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.503000 audit[2092]: AVC avc: denied { perfmon } for pid=2092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.503000 audit[2092]: AVC avc: denied { perfmon } for pid=2092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.503000 audit[2092]: AVC avc: denied { bpf } for pid=2092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.503000 audit[2092]: AVC avc: denied { bpf } for pid=2092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.503000 audit: BPF prog-id=104 op=LOAD May 17 00:34:44.503000 audit[2092]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002118e0 items=0 ppid=2082 pid=2092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:44.503000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633366162373032326466323734356430333838376538653436383434 May 17 00:34:44.504000 audit[2092]: AVC avc: denied { bpf } for pid=2092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.504000 audit[2092]: AVC avc: denied { bpf } for pid=2092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.504000 audit[2092]: AVC avc: denied { perfmon } for pid=2092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.504000 audit[2092]: AVC avc: denied { perfmon } for pid=2092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.504000 audit[2092]: AVC avc: denied { perfmon } for pid=2092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.504000 audit[2092]: AVC avc: denied { perfmon } for pid=2092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.504000 audit[2092]: AVC avc: denied { perfmon } for pid=2092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.504000 audit[2092]: AVC avc: denied { bpf } for pid=2092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.504000 audit[2092]: AVC avc: denied { bpf } for pid=2092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.504000 audit: BPF prog-id=105 op=LOAD May 17 00:34:44.504000 audit[2092]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000211928 items=0 ppid=2082 pid=2092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:44.504000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633366162373032326466323734356430333838376538653436383434 May 17 00:34:44.504000 audit: BPF prog-id=105 op=UNLOAD May 17 00:34:44.504000 audit: BPF prog-id=104 op=UNLOAD May 17 00:34:44.504000 audit[2092]: AVC avc: denied { bpf } for pid=2092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.504000 audit[2092]: AVC avc: denied { bpf } for pid=2092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.504000 audit[2092]: AVC avc: denied { bpf } for pid=2092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.504000 audit[2092]: AVC avc: denied { perfmon } for pid=2092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.504000 audit[2092]: AVC avc: denied { perfmon } for pid=2092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.504000 audit[2092]: AVC avc: denied { perfmon } for pid=2092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.504000 audit[2092]: AVC avc: denied { perfmon } for pid=2092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.504000 audit[2092]: AVC avc: denied { perfmon } for pid=2092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.504000 audit[2092]: AVC avc: denied { bpf } for pid=2092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.504000 audit[2092]: AVC avc: denied { bpf } for pid=2092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.504000 audit: BPF prog-id=106 op=LOAD May 17 00:34:44.504000 audit[2092]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000211d38 items=0 ppid=2082 pid=2092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:44.504000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633366162373032326466323734356430333838376538653436383434 May 17 00:34:44.643678 env[1212]: time="2025-05-17T00:34:44.643574437Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:34:44.643678 env[1212]: time="2025-05-17T00:34:44.643626547Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:34:44.643678 env[1212]: time="2025-05-17T00:34:44.643645196Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:34:44.644234 env[1212]: time="2025-05-17T00:34:44.644159547Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a7ec6033bcb8d10e6f0fec3d133e9b60623276e93638dd1b0548074bddb5e92d pid=2125 runtime=io.containerd.runc.v2 May 17 00:34:44.669622 systemd[1]: Started cri-containerd-a7ec6033bcb8d10e6f0fec3d133e9b60623276e93638dd1b0548074bddb5e92d.scope. May 17 00:34:44.682172 env[1212]: time="2025-05-17T00:34:44.681894134Z" level=info msg="CreateContainer within sandbox \"f36ab7022df2745d03887e8e468445d1045df85ded91fa920dc5b7b9ee6f59a6\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"90f6619bb16cce143aa09859a978eb8e25a2c11b67196de7d2327b1a679c0d27\"" May 17 00:34:44.684412 env[1212]: time="2025-05-17T00:34:44.684355312Z" level=info msg="StartContainer for \"90f6619bb16cce143aa09859a978eb8e25a2c11b67196de7d2327b1a679c0d27\"" May 17 00:34:44.718414 systemd[1]: Started cri-containerd-90f6619bb16cce143aa09859a978eb8e25a2c11b67196de7d2327b1a679c0d27.scope. May 17 00:34:44.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.722000 audit: BPF prog-id=107 op=LOAD May 17 00:34:44.722000 audit[2136]: AVC avc: denied { bpf } for pid=2136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.722000 audit[2136]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2125 pid=2136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:44.722000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137656336303333626362386431306536663066656333643133336539 May 17 00:34:44.722000 audit[2136]: AVC avc: denied { perfmon } for pid=2136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.722000 audit[2136]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2125 pid=2136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:44.722000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137656336303333626362386431306536663066656333643133336539 May 17 00:34:44.722000 audit[2136]: AVC avc: denied { bpf } for pid=2136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.722000 audit[2136]: AVC avc: denied { bpf } for pid=2136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.722000 audit[2136]: AVC avc: denied { bpf } for pid=2136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.722000 audit[2136]: AVC avc: denied { perfmon } for pid=2136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.722000 audit[2136]: AVC avc: denied { perfmon } for pid=2136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.722000 audit[2136]: AVC avc: denied { perfmon } for pid=2136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.722000 audit[2136]: AVC avc: denied { perfmon } for pid=2136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.722000 audit[2136]: AVC avc: denied { perfmon } for pid=2136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.722000 audit[2136]: AVC avc: denied { bpf } for pid=2136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.722000 audit[2136]: AVC avc: denied { bpf } for pid=2136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.722000 audit: BPF prog-id=108 op=LOAD May 17 00:34:44.722000 audit[2136]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002a7be0 items=0 ppid=2125 pid=2136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:44.722000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137656336303333626362386431306536663066656333643133336539 May 17 00:34:44.722000 audit[2136]: AVC avc: denied { bpf } for pid=2136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.722000 audit[2136]: AVC avc: denied { bpf } for pid=2136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.722000 audit[2136]: AVC avc: denied { perfmon } for pid=2136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.722000 audit[2136]: AVC avc: denied { perfmon } for pid=2136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.722000 audit[2136]: AVC avc: denied { perfmon } for pid=2136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.722000 audit[2136]: AVC avc: denied { perfmon } for pid=2136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.722000 audit[2136]: AVC avc: denied { perfmon } for pid=2136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.722000 audit[2136]: AVC avc: denied { bpf } for pid=2136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.722000 audit[2136]: AVC avc: denied { bpf } for pid=2136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.722000 audit: BPF prog-id=109 op=LOAD May 17 00:34:44.722000 audit[2136]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002a7c28 items=0 ppid=2125 pid=2136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:44.722000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137656336303333626362386431306536663066656333643133336539 May 17 00:34:44.722000 audit: BPF prog-id=109 op=UNLOAD May 17 00:34:44.722000 audit: BPF prog-id=108 op=UNLOAD May 17 00:34:44.722000 audit[2136]: AVC avc: denied { bpf } for pid=2136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.722000 audit[2136]: AVC avc: denied { bpf } for pid=2136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.722000 audit[2136]: AVC avc: denied { bpf } for pid=2136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.722000 audit[2136]: AVC avc: denied { perfmon } for pid=2136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.722000 audit[2136]: AVC avc: denied { perfmon } for pid=2136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.722000 audit[2136]: AVC avc: denied { perfmon } for pid=2136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.722000 audit[2136]: AVC avc: denied { perfmon } for pid=2136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.722000 audit[2136]: AVC avc: denied { perfmon } for pid=2136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.722000 audit[2136]: AVC avc: denied { bpf } for pid=2136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.722000 audit[2136]: AVC avc: denied { bpf } for pid=2136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.722000 audit: BPF prog-id=110 op=LOAD May 17 00:34:44.722000 audit[2136]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00031e038 items=0 ppid=2125 pid=2136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:44.722000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137656336303333626362386431306536663066656333643133336539 May 17 00:34:44.755000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.755000 audit[2155]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f03a3a58e18 items=0 ppid=2082 pid=2155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:44.755000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930663636313962623136636365313433616130393835396139373865 May 17 00:34:44.755000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.755000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.755000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.755000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.755000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.755000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.755000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.755000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.755000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.755000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.755000 audit: BPF prog-id=111 op=LOAD May 17 00:34:44.755000 audit[2155]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000987b8 items=0 ppid=2082 pid=2155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:44.755000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930663636313962623136636365313433616130393835396139373865 May 17 00:34:44.755000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.755000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.755000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.755000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.755000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.755000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.755000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.755000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.755000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.755000 audit: BPF prog-id=112 op=LOAD May 17 00:34:44.755000 audit[2155]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000098808 items=0 ppid=2082 pid=2155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:44.755000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930663636313962623136636365313433616130393835396139373865 May 17 00:34:44.755000 audit: BPF prog-id=112 op=UNLOAD May 17 00:34:44.755000 audit: BPF prog-id=111 op=UNLOAD May 17 00:34:44.755000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.755000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.755000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.755000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.755000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.755000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.755000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.755000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.755000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.755000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:44.755000 audit: BPF prog-id=113 op=LOAD May 17 00:34:44.755000 audit[2155]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000098898 items=0 ppid=2082 pid=2155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:44.755000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930663636313962623136636365313433616130393835396139373865 May 17 00:34:44.783215 env[1212]: time="2025-05-17T00:34:44.783129458Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-844669ff44-vngs6,Uid:b3099fb5-49bb-48d3-a27b-a6fbcd4c4b2f,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"a7ec6033bcb8d10e6f0fec3d133e9b60623276e93638dd1b0548074bddb5e92d\"" May 17 00:34:44.789410 env[1212]: time="2025-05-17T00:34:44.789351473Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.0\"" May 17 00:34:44.806695 env[1212]: time="2025-05-17T00:34:44.806630675Z" level=info msg="StartContainer for \"90f6619bb16cce143aa09859a978eb8e25a2c11b67196de7d2327b1a679c0d27\" returns successfully" May 17 00:34:44.949000 audit[2228]: NETFILTER_CFG table=mangle:38 family=10 entries=1 op=nft_register_chain pid=2228 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:34:44.949000 audit[2227]: NETFILTER_CFG table=mangle:39 family=2 entries=1 op=nft_register_chain pid=2227 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:44.949000 audit[2228]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe0e5ae1d0 a2=0 a3=7ffe0e5ae1bc items=0 ppid=2172 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:44.949000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 17 00:34:44.953000 audit[2230]: NETFILTER_CFG table=nat:40 family=10 entries=1 op=nft_register_chain pid=2230 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:34:44.953000 audit[2230]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe862c6360 a2=0 a3=7ffe862c634c items=0 ppid=2172 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:44.953000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 17 00:34:44.956000 audit[2231]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=2231 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:34:44.956000 audit[2231]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd37569320 a2=0 a3=7ffd3756930c items=0 ppid=2172 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:44.956000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 17 00:34:44.949000 audit[2227]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdd5cbca20 a2=0 a3=7ffdd5cbca0c items=0 ppid=2172 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:44.949000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 17 00:34:44.958000 audit[2232]: NETFILTER_CFG table=nat:42 family=2 entries=1 op=nft_register_chain pid=2232 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:44.958000 audit[2232]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff1f3861c0 a2=0 a3=7fff1f3861ac items=0 ppid=2172 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:44.958000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 17 00:34:44.962000 audit[2233]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=2233 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:44.962000 audit[2233]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc40f6dac0 a2=0 a3=7ffc40f6daac items=0 ppid=2172 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:44.962000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 17 00:34:45.064000 audit[2234]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2234 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:45.064000 audit[2234]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff02c9b260 a2=0 a3=7fff02c9b24c items=0 ppid=2172 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:45.064000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 17 00:34:45.068000 audit[2236]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2236 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:45.068000 audit[2236]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff38dfc070 a2=0 a3=7fff38dfc05c items=0 ppid=2172 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:45.068000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 17 00:34:45.073000 audit[2239]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2239 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:45.073000 audit[2239]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc7064be00 a2=0 a3=7ffc7064bdec items=0 ppid=2172 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:45.073000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 17 00:34:45.075000 audit[2240]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2240 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:45.075000 audit[2240]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdd475b230 a2=0 a3=7ffdd475b21c items=0 ppid=2172 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:45.075000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 17 00:34:45.078000 audit[2242]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2242 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:45.078000 audit[2242]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcacb91a90 a2=0 a3=7ffcacb91a7c items=0 ppid=2172 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:45.078000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 17 00:34:45.080000 audit[2243]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2243 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:45.080000 audit[2243]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe0f09ffc0 a2=0 a3=7ffe0f09ffac items=0 ppid=2172 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:45.080000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 17 00:34:45.085000 audit[2245]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2245 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:45.085000 audit[2245]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd79433ac0 a2=0 a3=7ffd79433aac items=0 ppid=2172 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:45.085000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 17 00:34:45.090000 audit[2248]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2248 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:45.090000 audit[2248]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffcb80dd0f0 a2=0 a3=7ffcb80dd0dc items=0 ppid=2172 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:45.090000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 17 00:34:45.092000 audit[2249]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2249 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:45.092000 audit[2249]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcf9761c40 a2=0 a3=7ffcf9761c2c items=0 ppid=2172 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:45.092000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 17 00:34:45.096000 audit[2251]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2251 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:45.096000 audit[2251]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc45c038b0 a2=0 a3=7ffc45c0389c items=0 ppid=2172 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:45.096000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 17 00:34:45.098000 audit[2252]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2252 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:45.098000 audit[2252]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdde260b90 a2=0 a3=7ffdde260b7c items=0 ppid=2172 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:45.098000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 17 00:34:45.102000 audit[2254]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2254 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:45.102000 audit[2254]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcb44eb780 a2=0 a3=7ffcb44eb76c items=0 ppid=2172 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:45.102000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 00:34:45.108000 audit[2257]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2257 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:45.108000 audit[2257]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff6322c650 a2=0 a3=7fff6322c63c items=0 ppid=2172 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:45.108000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 00:34:45.114000 audit[2260]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2260 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:45.114000 audit[2260]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff39b80d50 a2=0 a3=7fff39b80d3c items=0 ppid=2172 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:45.114000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 17 00:34:45.116000 audit[2261]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2261 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:45.116000 audit[2261]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd233cf320 a2=0 a3=7ffd233cf30c items=0 ppid=2172 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:45.116000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 17 00:34:45.122000 audit[2263]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2263 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:45.122000 audit[2263]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7fffd3513f90 a2=0 a3=7fffd3513f7c items=0 ppid=2172 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:45.122000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:34:45.128000 audit[2266]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2266 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:45.128000 audit[2266]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff1d0cd570 a2=0 a3=7fff1d0cd55c items=0 ppid=2172 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:45.128000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:34:45.130000 audit[2267]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2267 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:45.130000 audit[2267]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc5a84af30 a2=0 a3=7ffc5a84af1c items=0 ppid=2172 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:45.130000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 17 00:34:45.134000 audit[2269]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2269 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:45.134000 audit[2269]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffc65d81c40 a2=0 a3=7ffc65d81c2c items=0 ppid=2172 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:45.134000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 17 00:34:45.168000 audit[2275]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2275 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:45.168000 audit[2275]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffe0a7baf60 a2=0 a3=7ffe0a7baf4c items=0 ppid=2172 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:45.168000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:45.180000 audit[2275]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2275 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:45.180000 audit[2275]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffe0a7baf60 a2=0 a3=7ffe0a7baf4c items=0 ppid=2172 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:45.180000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:45.182000 audit[2280]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2280 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:34:45.182000 audit[2280]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe1eb9e380 a2=0 a3=7ffe1eb9e36c items=0 ppid=2172 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:45.182000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 17 00:34:45.187000 audit[2282]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2282 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:34:45.187000 audit[2282]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff6c428ec0 a2=0 a3=7fff6c428eac items=0 ppid=2172 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:45.187000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 17 00:34:45.199000 audit[2285]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2285 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:34:45.199000 audit[2285]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffcc1bddb60 a2=0 a3=7ffcc1bddb4c items=0 ppid=2172 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:45.199000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 17 00:34:45.204000 audit[2286]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2286 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:34:45.204000 audit[2286]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe64955700 a2=0 a3=7ffe649556ec items=0 ppid=2172 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:45.204000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 17 00:34:45.210000 audit[2288]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2288 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:34:45.210000 audit[2288]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff295786c0 a2=0 a3=7fff295786ac items=0 ppid=2172 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:45.210000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 17 00:34:45.213000 audit[2289]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2289 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:34:45.213000 audit[2289]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffeeb6c4d0 a2=0 a3=7fffeeb6c4bc items=0 ppid=2172 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:45.213000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 17 00:34:45.218000 audit[2291]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2291 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:34:45.218000 audit[2291]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff483fd8c0 a2=0 a3=7fff483fd8ac items=0 ppid=2172 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:45.218000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 17 00:34:45.225000 audit[2294]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2294 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:34:45.225000 audit[2294]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffe2ce4a100 a2=0 a3=7ffe2ce4a0ec items=0 ppid=2172 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:45.225000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 17 00:34:45.227000 audit[2295]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2295 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:34:45.227000 audit[2295]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffac057050 a2=0 a3=7fffac05703c items=0 ppid=2172 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:45.227000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 17 00:34:45.231000 audit[2297]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2297 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:34:45.231000 audit[2297]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff2ffb66b0 a2=0 a3=7fff2ffb669c items=0 ppid=2172 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:45.231000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 17 00:34:45.232000 audit[2298]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2298 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:34:45.232000 audit[2298]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff7c538530 a2=0 a3=7fff7c53851c items=0 ppid=2172 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:45.232000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 17 00:34:45.236000 audit[2300]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2300 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:34:45.236000 audit[2300]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe3f037610 a2=0 a3=7ffe3f0375fc items=0 ppid=2172 pid=2300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:45.236000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 00:34:45.241000 audit[2303]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2303 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:34:45.241000 audit[2303]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd3ab9dc80 a2=0 a3=7ffd3ab9dc6c items=0 ppid=2172 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:45.241000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 17 00:34:45.248000 audit[2306]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2306 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:34:45.248000 audit[2306]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe5396dde0 a2=0 a3=7ffe5396ddcc items=0 ppid=2172 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:45.248000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 17 00:34:45.250000 audit[2307]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2307 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:34:45.250000 audit[2307]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd431829f0 a2=0 a3=7ffd431829dc items=0 ppid=2172 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:45.250000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 17 00:34:45.264000 audit[2309]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2309 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:34:45.264000 audit[2309]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffcf79b77f0 a2=0 a3=7ffcf79b77dc items=0 ppid=2172 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:45.264000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:34:45.272000 audit[2312]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2312 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:34:45.272000 audit[2312]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff6cab4080 a2=0 a3=7fff6cab406c items=0 ppid=2172 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:45.272000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:34:45.275000 audit[2313]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2313 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:34:45.275000 audit[2313]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc325d2e50 a2=0 a3=7ffc325d2e3c items=0 ppid=2172 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:45.275000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 17 00:34:45.278000 audit[2315]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2315 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:34:45.278000 audit[2315]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffd195fa700 a2=0 a3=7ffd195fa6ec items=0 ppid=2172 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:45.278000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 17 00:34:45.280000 audit[2316]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2316 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:34:45.280000 audit[2316]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc5e4239f0 a2=0 a3=7ffc5e4239dc items=0 ppid=2172 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:45.280000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 17 00:34:45.285000 audit[2318]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2318 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:34:45.285000 audit[2318]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdce68abb0 a2=0 a3=7ffdce68ab9c items=0 ppid=2172 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:45.285000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:34:45.291000 audit[2321]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2321 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:34:45.291000 audit[2321]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd1cfe6b40 a2=0 a3=7ffd1cfe6b2c items=0 ppid=2172 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:45.291000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:34:45.296000 audit[2323]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2323 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 17 00:34:45.296000 audit[2323]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7fffd79dea60 a2=0 a3=7fffd79dea4c items=0 ppid=2172 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:45.296000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:45.297000 audit[2323]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2323 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 17 00:34:45.297000 audit[2323]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7fffd79dea60 a2=0 a3=7fffd79dea4c items=0 ppid=2172 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:45.297000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:45.671417 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2261950859.mount: Deactivated successfully. May 17 00:34:46.984654 env[1212]: time="2025-05-17T00:34:46.984580794Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.38.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:46.987496 env[1212]: time="2025-05-17T00:34:46.987446205Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5e43c1322619406528ff596056dfeb70cb8d20c5c00439feb752a7725302e033,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:46.989932 env[1212]: time="2025-05-17T00:34:46.989886555Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.38.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:46.992182 env[1212]: time="2025-05-17T00:34:46.992142576Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:e0a34b265aebce1a2db906d8dad99190706e8bf3910cae626b9c2eb6bbb21775,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:46.992892 env[1212]: time="2025-05-17T00:34:46.992841764Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.0\" returns image reference \"sha256:5e43c1322619406528ff596056dfeb70cb8d20c5c00439feb752a7725302e033\"" May 17 00:34:46.996094 env[1212]: time="2025-05-17T00:34:46.996044976Z" level=info msg="CreateContainer within sandbox \"a7ec6033bcb8d10e6f0fec3d133e9b60623276e93638dd1b0548074bddb5e92d\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" May 17 00:34:47.024172 env[1212]: time="2025-05-17T00:34:47.024096358Z" level=info msg="CreateContainer within sandbox \"a7ec6033bcb8d10e6f0fec3d133e9b60623276e93638dd1b0548074bddb5e92d\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"63e33356be08c87c003476e4fafef9f9ab46d2e2b04203331c24368dde71ea1d\"" May 17 00:34:47.027051 env[1212]: time="2025-05-17T00:34:47.025098167Z" level=info msg="StartContainer for \"63e33356be08c87c003476e4fafef9f9ab46d2e2b04203331c24368dde71ea1d\"" May 17 00:34:47.066001 systemd[1]: Started cri-containerd-63e33356be08c87c003476e4fafef9f9ab46d2e2b04203331c24368dde71ea1d.scope. May 17 00:34:47.109169 kernel: kauditd_printk_skb: 303 callbacks suppressed May 17 00:34:47.109337 kernel: audit: type=1400 audit(1747442087.081:883): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.081000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.081000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.130494 kernel: audit: type=1400 audit(1747442087.081:884): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.081000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.151426 kernel: audit: type=1400 audit(1747442087.081:885): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.081000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.081000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.197996 kernel: audit: type=1400 audit(1747442087.081:886): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.198137 kernel: audit: type=1400 audit(1747442087.081:887): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.198174 kernel: audit: type=1400 audit(1747442087.081:888): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.081000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.081000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.235981 kernel: audit: type=1400 audit(1747442087.081:889): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.236249 kernel: audit: type=1400 audit(1747442087.081:890): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.081000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.260876 kernel: audit: type=1400 audit(1747442087.081:891): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.081000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.107000 audit: BPF prog-id=114 op=LOAD May 17 00:34:47.300598 kernel: audit: type=1400 audit(1747442087.107:892): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.108000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.108000 audit[2331]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2125 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:47.108000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633653333333536626530386338376330303334373665346661666566 May 17 00:34:47.108000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.108000 audit[2331]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2125 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:47.108000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633653333333536626530386338376330303334373665346661666566 May 17 00:34:47.108000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.108000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.108000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.108000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.108000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.108000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.108000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.108000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.108000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.108000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.108000 audit: BPF prog-id=115 op=LOAD May 17 00:34:47.108000 audit[2331]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001be590 items=0 ppid=2125 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:47.108000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633653333333536626530386338376330303334373665346661666566 May 17 00:34:47.129000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.129000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.129000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.129000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.129000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.129000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.129000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.129000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.129000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.129000 audit: BPF prog-id=116 op=LOAD May 17 00:34:47.129000 audit[2331]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001be5d8 items=0 ppid=2125 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:47.129000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633653333333536626530386338376330303334373665346661666566 May 17 00:34:47.129000 audit: BPF prog-id=116 op=UNLOAD May 17 00:34:47.129000 audit: BPF prog-id=115 op=UNLOAD May 17 00:34:47.129000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.129000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.129000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.129000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.129000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.129000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.129000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.129000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.129000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.129000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.129000 audit: BPF prog-id=117 op=LOAD May 17 00:34:47.129000 audit[2331]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001be9e8 items=0 ppid=2125 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:47.129000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633653333333536626530386338376330303334373665346661666566 May 17 00:34:47.304692 env[1212]: time="2025-05-17T00:34:47.304645715Z" level=info msg="StartContainer for \"63e33356be08c87c003476e4fafef9f9ab46d2e2b04203331c24368dde71ea1d\" returns successfully" May 17 00:34:47.308142 kubelet[2012]: I0517 00:34:47.308051 2012 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-bdcfx" podStartSLOduration=3.308025321 podStartE2EDuration="3.308025321s" podCreationTimestamp="2025-05-17 00:34:44 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:34:45.678524363 +0000 UTC m=+8.359669742" watchObservedRunningTime="2025-05-17 00:34:47.308025321 +0000 UTC m=+9.989170757" May 17 00:34:52.428754 sudo[1426]: pam_unix(sudo:session): session closed for user root May 17 00:34:52.457454 kernel: kauditd_printk_skb: 47 callbacks suppressed May 17 00:34:52.457656 kernel: audit: type=1106 audit(1747442092.427:901): pid=1426 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:34:52.427000 audit[1426]: USER_END pid=1426 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:34:52.427000 audit[1426]: CRED_DISP pid=1426 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:34:52.491524 kernel: audit: type=1104 audit(1747442092.427:902): pid=1426 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:34:52.499522 sshd[1423]: pam_unix(sshd:session): session closed for user core May 17 00:34:52.502000 audit[1423]: USER_END pid=1423 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:34:52.506974 systemd[1]: sshd@6-10.128.0.24:22-139.178.89.65:38062.service: Deactivated successfully. May 17 00:34:52.508194 systemd[1]: session-7.scope: Deactivated successfully. May 17 00:34:52.508410 systemd[1]: session-7.scope: Consumed 6.590s CPU time. May 17 00:34:52.520650 systemd-logind[1221]: Session 7 logged out. Waiting for processes to exit. May 17 00:34:52.537712 kernel: audit: type=1106 audit(1747442092.502:903): pid=1423 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:34:52.522198 systemd-logind[1221]: Removed session 7. May 17 00:34:52.503000 audit[1423]: CRED_DISP pid=1423 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:34:52.586444 kernel: audit: type=1104 audit(1747442092.503:904): pid=1423 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:34:52.586614 kernel: audit: type=1131 audit(1747442092.505:905): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.24:22-139.178.89.65:38062 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:52.505000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.24:22-139.178.89.65:38062 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:54.466000 audit[2408]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2408 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:54.484408 kernel: audit: type=1325 audit(1747442094.466:906): table=filter:89 family=2 entries=15 op=nft_register_rule pid=2408 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:54.466000 audit[2408]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffef5114a10 a2=0 a3=7ffef51149fc items=0 ppid=2172 pid=2408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:54.523400 kernel: audit: type=1300 audit(1747442094.466:906): arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffef5114a10 a2=0 a3=7ffef51149fc items=0 ppid=2172 pid=2408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:54.466000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:54.540393 kernel: audit: type=1327 audit(1747442094.466:906): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:54.486000 audit[2408]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2408 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:54.558389 kernel: audit: type=1325 audit(1747442094.486:907): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2408 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:54.486000 audit[2408]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffef5114a10 a2=0 a3=0 items=0 ppid=2172 pid=2408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:54.591388 kernel: audit: type=1300 audit(1747442094.486:907): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffef5114a10 a2=0 a3=0 items=0 ppid=2172 pid=2408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:54.486000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:54.596000 audit[2410]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2410 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:54.596000 audit[2410]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffe0eab8780 a2=0 a3=7ffe0eab876c items=0 ppid=2172 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:54.596000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:54.599000 audit[2410]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2410 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:54.599000 audit[2410]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe0eab8780 a2=0 a3=0 items=0 ppid=2172 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:54.599000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:57.559467 kernel: kauditd_printk_skb: 7 callbacks suppressed May 17 00:34:57.559725 kernel: audit: type=1325 audit(1747442097.543:910): table=filter:93 family=2 entries=17 op=nft_register_rule pid=2412 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:57.543000 audit[2412]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2412 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:57.543000 audit[2412]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffd0173f9e0 a2=0 a3=7ffd0173f9cc items=0 ppid=2172 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:57.599037 kernel: audit: type=1300 audit(1747442097.543:910): arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffd0173f9e0 a2=0 a3=7ffd0173f9cc items=0 ppid=2172 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:57.543000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:57.625407 kernel: audit: type=1327 audit(1747442097.543:910): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:57.611000 audit[2412]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2412 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:57.634459 kubelet[2012]: I0517 00:34:57.634382 2012 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-844669ff44-vngs6" podStartSLOduration=11.425269636 podStartE2EDuration="13.63432649s" podCreationTimestamp="2025-05-17 00:34:44 +0000 UTC" firstStartedPulling="2025-05-17 00:34:44.785471039 +0000 UTC m=+7.466616415" lastFinishedPulling="2025-05-17 00:34:46.994527895 +0000 UTC m=+9.675673269" observedRunningTime="2025-05-17 00:34:47.718164497 +0000 UTC m=+10.399309887" watchObservedRunningTime="2025-05-17 00:34:57.63432649 +0000 UTC m=+20.315471877" May 17 00:34:57.644437 systemd[1]: Created slice kubepods-besteffort-pod057a022e_bf8b_46ce_bfbb_be60666751f3.slice. May 17 00:34:57.645426 kernel: audit: type=1325 audit(1747442097.611:911): table=nat:94 family=2 entries=12 op=nft_register_rule pid=2412 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:57.611000 audit[2412]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd0173f9e0 a2=0 a3=0 items=0 ppid=2172 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:57.693430 kernel: audit: type=1300 audit(1747442097.611:911): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd0173f9e0 a2=0 a3=0 items=0 ppid=2172 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:57.611000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:57.723400 kernel: audit: type=1327 audit(1747442097.611:911): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:57.734000 audit[2414]: NETFILTER_CFG table=filter:95 family=2 entries=18 op=nft_register_rule pid=2414 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:57.749289 kubelet[2012]: I0517 00:34:57.749234 2012 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/057a022e-bf8b-46ce-bfbb-be60666751f3-typha-certs\") pod \"calico-typha-7f944d8c4-cq7qr\" (UID: \"057a022e-bf8b-46ce-bfbb-be60666751f3\") " pod="calico-system/calico-typha-7f944d8c4-cq7qr" May 17 00:34:57.749616 kubelet[2012]: I0517 00:34:57.749581 2012 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/057a022e-bf8b-46ce-bfbb-be60666751f3-tigera-ca-bundle\") pod \"calico-typha-7f944d8c4-cq7qr\" (UID: \"057a022e-bf8b-46ce-bfbb-be60666751f3\") " pod="calico-system/calico-typha-7f944d8c4-cq7qr" May 17 00:34:57.749991 kubelet[2012]: I0517 00:34:57.749953 2012 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mj846\" (UniqueName: \"kubernetes.io/projected/057a022e-bf8b-46ce-bfbb-be60666751f3-kube-api-access-mj846\") pod \"calico-typha-7f944d8c4-cq7qr\" (UID: \"057a022e-bf8b-46ce-bfbb-be60666751f3\") " pod="calico-system/calico-typha-7f944d8c4-cq7qr" May 17 00:34:57.751397 kernel: audit: type=1325 audit(1747442097.734:912): table=filter:95 family=2 entries=18 op=nft_register_rule pid=2414 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:57.734000 audit[2414]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffe50d740b0 a2=0 a3=7ffe50d7409c items=0 ppid=2172 pid=2414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:57.792419 kernel: audit: type=1300 audit(1747442097.734:912): arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffe50d740b0 a2=0 a3=7ffe50d7409c items=0 ppid=2172 pid=2414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:57.734000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:57.819398 kernel: audit: type=1327 audit(1747442097.734:912): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:57.765000 audit[2414]: NETFILTER_CFG table=nat:96 family=2 entries=12 op=nft_register_rule pid=2414 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:57.846407 kernel: audit: type=1325 audit(1747442097.765:913): table=nat:96 family=2 entries=12 op=nft_register_rule pid=2414 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:57.765000 audit[2414]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe50d740b0 a2=0 a3=0 items=0 ppid=2172 pid=2414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:57.765000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:57.954472 env[1212]: time="2025-05-17T00:34:57.954397679Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-7f944d8c4-cq7qr,Uid:057a022e-bf8b-46ce-bfbb-be60666751f3,Namespace:calico-system,Attempt:0,}" May 17 00:34:57.990989 env[1212]: time="2025-05-17T00:34:57.990903211Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:34:57.991187 env[1212]: time="2025-05-17T00:34:57.991006004Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:34:57.991187 env[1212]: time="2025-05-17T00:34:57.991047812Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:34:57.994157 env[1212]: time="2025-05-17T00:34:57.994090583Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ae106dd80b89512dd02a65e826561fd8479d77eb4deb4e3c830f52cc294ede37 pid=2426 runtime=io.containerd.runc.v2 May 17 00:34:58.048076 kubelet[2012]: I0517 00:34:58.047990 2012 status_manager.go:890] "Failed to get status for pod" podUID="502facaf-e418-4a3d-841b-851517f7b083" pod="calico-system/calico-node-nzf4z" err="pods \"calico-node-nzf4z\" is forbidden: User \"system:node:ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758\" cannot get resource \"pods\" in API group \"\" in the namespace \"calico-system\": no relationship found between node 'ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758' and this object" May 17 00:34:58.048768 kubelet[2012]: W0517 00:34:58.048616 2012 reflector.go:569] object-"calico-system"/"node-certs": failed to list *v1.Secret: secrets "node-certs" is forbidden: User "system:node:ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" cannot list resource "secrets" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758' and this object May 17 00:34:58.048768 kubelet[2012]: E0517 00:34:58.048697 2012 reflector.go:166] "Unhandled Error" err="object-\"calico-system\"/\"node-certs\": Failed to watch *v1.Secret: failed to list *v1.Secret: secrets \"node-certs\" is forbidden: User \"system:node:ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758\" cannot list resource \"secrets\" in API group \"\" in the namespace \"calico-system\": no relationship found between node 'ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758' and this object" logger="UnhandledError" May 17 00:34:58.049306 kubelet[2012]: W0517 00:34:58.049218 2012 reflector.go:569] object-"calico-system"/"cni-config": failed to list *v1.ConfigMap: configmaps "cni-config" is forbidden: User "system:node:ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758' and this object May 17 00:34:58.049306 kubelet[2012]: E0517 00:34:58.049261 2012 reflector.go:166] "Unhandled Error" err="object-\"calico-system\"/\"cni-config\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps \"cni-config\" is forbidden: User \"system:node:ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758\" cannot list resource \"configmaps\" in API group \"\" in the namespace \"calico-system\": no relationship found between node 'ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758' and this object" logger="UnhandledError" May 17 00:34:58.054295 kubelet[2012]: I0517 00:34:58.053214 2012 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/502facaf-e418-4a3d-841b-851517f7b083-cni-log-dir\") pod \"calico-node-nzf4z\" (UID: \"502facaf-e418-4a3d-841b-851517f7b083\") " pod="calico-system/calico-node-nzf4z" May 17 00:34:58.054295 kubelet[2012]: I0517 00:34:58.053275 2012 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/502facaf-e418-4a3d-841b-851517f7b083-policysync\") pod \"calico-node-nzf4z\" (UID: \"502facaf-e418-4a3d-841b-851517f7b083\") " pod="calico-system/calico-node-nzf4z" May 17 00:34:58.054295 kubelet[2012]: I0517 00:34:58.053306 2012 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/502facaf-e418-4a3d-841b-851517f7b083-tigera-ca-bundle\") pod \"calico-node-nzf4z\" (UID: \"502facaf-e418-4a3d-841b-851517f7b083\") " pod="calico-system/calico-node-nzf4z" May 17 00:34:58.054295 kubelet[2012]: I0517 00:34:58.053988 2012 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/502facaf-e418-4a3d-841b-851517f7b083-cni-bin-dir\") pod \"calico-node-nzf4z\" (UID: \"502facaf-e418-4a3d-841b-851517f7b083\") " pod="calico-system/calico-node-nzf4z" May 17 00:34:58.054295 kubelet[2012]: I0517 00:34:58.054065 2012 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/502facaf-e418-4a3d-841b-851517f7b083-lib-modules\") pod \"calico-node-nzf4z\" (UID: \"502facaf-e418-4a3d-841b-851517f7b083\") " pod="calico-system/calico-node-nzf4z" May 17 00:34:58.053733 systemd[1]: Started cri-containerd-ae106dd80b89512dd02a65e826561fd8479d77eb4deb4e3c830f52cc294ede37.scope. May 17 00:34:58.054863 kubelet[2012]: I0517 00:34:58.054232 2012 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/502facaf-e418-4a3d-841b-851517f7b083-var-lib-calico\") pod \"calico-node-nzf4z\" (UID: \"502facaf-e418-4a3d-841b-851517f7b083\") " pod="calico-system/calico-node-nzf4z" May 17 00:34:58.054863 kubelet[2012]: I0517 00:34:58.054265 2012 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/502facaf-e418-4a3d-841b-851517f7b083-var-run-calico\") pod \"calico-node-nzf4z\" (UID: \"502facaf-e418-4a3d-841b-851517f7b083\") " pod="calico-system/calico-node-nzf4z" May 17 00:34:58.055506 kubelet[2012]: I0517 00:34:58.055137 2012 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/502facaf-e418-4a3d-841b-851517f7b083-cni-net-dir\") pod \"calico-node-nzf4z\" (UID: \"502facaf-e418-4a3d-841b-851517f7b083\") " pod="calico-system/calico-node-nzf4z" May 17 00:34:58.055506 kubelet[2012]: I0517 00:34:58.055216 2012 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/502facaf-e418-4a3d-841b-851517f7b083-node-certs\") pod \"calico-node-nzf4z\" (UID: \"502facaf-e418-4a3d-841b-851517f7b083\") " pod="calico-system/calico-node-nzf4z" May 17 00:34:58.055506 kubelet[2012]: I0517 00:34:58.055276 2012 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/502facaf-e418-4a3d-841b-851517f7b083-xtables-lock\") pod \"calico-node-nzf4z\" (UID: \"502facaf-e418-4a3d-841b-851517f7b083\") " pod="calico-system/calico-node-nzf4z" May 17 00:34:58.055506 kubelet[2012]: I0517 00:34:58.055339 2012 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qsxpc\" (UniqueName: \"kubernetes.io/projected/502facaf-e418-4a3d-841b-851517f7b083-kube-api-access-qsxpc\") pod \"calico-node-nzf4z\" (UID: \"502facaf-e418-4a3d-841b-851517f7b083\") " pod="calico-system/calico-node-nzf4z" May 17 00:34:58.055506 kubelet[2012]: I0517 00:34:58.055420 2012 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/502facaf-e418-4a3d-841b-851517f7b083-flexvol-driver-host\") pod \"calico-node-nzf4z\" (UID: \"502facaf-e418-4a3d-841b-851517f7b083\") " pod="calico-system/calico-node-nzf4z" May 17 00:34:58.059854 systemd[1]: Created slice kubepods-besteffort-pod502facaf_e418_4a3d_841b_851517f7b083.slice. May 17 00:34:58.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.109000 audit: BPF prog-id=118 op=LOAD May 17 00:34:58.112000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.112000 audit[2437]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2426 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:58.112000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165313036646438306238393531326464303261363565383236353631 May 17 00:34:58.112000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.112000 audit[2437]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2426 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:58.112000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165313036646438306238393531326464303261363565383236353631 May 17 00:34:58.112000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.112000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.112000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.112000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.112000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.112000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.112000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.112000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.112000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.112000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.112000 audit: BPF prog-id=119 op=LOAD May 17 00:34:58.112000 audit[2437]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001d9c90 items=0 ppid=2426 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:58.112000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165313036646438306238393531326464303261363565383236353631 May 17 00:34:58.112000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.112000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.112000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.112000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.112000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.112000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.112000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.112000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.112000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.112000 audit: BPF prog-id=120 op=LOAD May 17 00:34:58.112000 audit[2437]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001d9cd8 items=0 ppid=2426 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:58.112000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165313036646438306238393531326464303261363565383236353631 May 17 00:34:58.112000 audit: BPF prog-id=120 op=UNLOAD May 17 00:34:58.112000 audit: BPF prog-id=119 op=UNLOAD May 17 00:34:58.112000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.112000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.112000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.112000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.112000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.112000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.112000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.112000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.112000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.112000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.112000 audit: BPF prog-id=121 op=LOAD May 17 00:34:58.112000 audit[2437]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003c00e8 items=0 ppid=2426 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:58.112000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165313036646438306238393531326464303261363565383236353631 May 17 00:34:58.158183 kubelet[2012]: E0517 00:34:58.157878 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:58.158183 kubelet[2012]: W0517 00:34:58.157911 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:58.158183 kubelet[2012]: E0517 00:34:58.157971 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:58.158878 kubelet[2012]: E0517 00:34:58.158655 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:58.158878 kubelet[2012]: W0517 00:34:58.158677 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:58.158878 kubelet[2012]: E0517 00:34:58.158699 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:58.159154 kubelet[2012]: E0517 00:34:58.159049 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:58.159154 kubelet[2012]: W0517 00:34:58.159065 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:58.159267 kubelet[2012]: E0517 00:34:58.159182 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:58.159718 kubelet[2012]: E0517 00:34:58.159539 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:58.159718 kubelet[2012]: W0517 00:34:58.159558 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:58.159718 kubelet[2012]: E0517 00:34:58.159595 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:58.159972 kubelet[2012]: E0517 00:34:58.159894 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:58.159972 kubelet[2012]: W0517 00:34:58.159908 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:58.160098 kubelet[2012]: E0517 00:34:58.160026 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:58.160268 kubelet[2012]: E0517 00:34:58.160234 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:58.160268 kubelet[2012]: W0517 00:34:58.160252 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:58.160461 kubelet[2012]: E0517 00:34:58.160444 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:58.160855 kubelet[2012]: E0517 00:34:58.160680 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:58.160855 kubelet[2012]: W0517 00:34:58.160698 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:58.160855 kubelet[2012]: E0517 00:34:58.160732 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:58.162215 kubelet[2012]: E0517 00:34:58.162030 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:58.162215 kubelet[2012]: W0517 00:34:58.162048 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:58.162215 kubelet[2012]: E0517 00:34:58.162085 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:58.162539 kubelet[2012]: E0517 00:34:58.162418 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:58.162539 kubelet[2012]: W0517 00:34:58.162433 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:58.162666 kubelet[2012]: E0517 00:34:58.162547 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:58.162781 kubelet[2012]: E0517 00:34:58.162760 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:58.162781 kubelet[2012]: W0517 00:34:58.162779 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:58.162962 kubelet[2012]: E0517 00:34:58.162898 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:58.163144 kubelet[2012]: E0517 00:34:58.163098 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:58.163144 kubelet[2012]: W0517 00:34:58.163114 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:58.163144 kubelet[2012]: E0517 00:34:58.163136 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:58.163715 kubelet[2012]: E0517 00:34:58.163491 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:58.163715 kubelet[2012]: W0517 00:34:58.163507 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:58.163715 kubelet[2012]: E0517 00:34:58.163530 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:58.163970 kubelet[2012]: E0517 00:34:58.163945 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:58.163970 kubelet[2012]: W0517 00:34:58.163961 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:58.164111 kubelet[2012]: E0517 00:34:58.164083 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:58.164521 kubelet[2012]: E0517 00:34:58.164324 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:58.164521 kubelet[2012]: W0517 00:34:58.164340 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:58.164707 kubelet[2012]: E0517 00:34:58.164529 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:58.164825 kubelet[2012]: E0517 00:34:58.164802 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:58.164825 kubelet[2012]: W0517 00:34:58.164822 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:58.164986 kubelet[2012]: E0517 00:34:58.164845 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:58.165338 kubelet[2012]: E0517 00:34:58.165264 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:58.165338 kubelet[2012]: W0517 00:34:58.165282 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:58.165338 kubelet[2012]: E0517 00:34:58.165305 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:58.166447 kubelet[2012]: E0517 00:34:58.166254 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:58.166447 kubelet[2012]: W0517 00:34:58.166272 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:58.166447 kubelet[2012]: E0517 00:34:58.166329 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:58.186893 kubelet[2012]: E0517 00:34:58.186858 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:58.187129 kubelet[2012]: W0517 00:34:58.187101 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:58.187284 kubelet[2012]: E0517 00:34:58.187260 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:58.190530 kubelet[2012]: E0517 00:34:58.190491 2012 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kpjdk" podUID="9a0b64da-0bec-4455-813d-7708414d174b" May 17 00:34:58.253561 kubelet[2012]: E0517 00:34:58.253524 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:58.253842 kubelet[2012]: W0517 00:34:58.253812 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:58.253990 kubelet[2012]: E0517 00:34:58.253967 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:58.254477 kubelet[2012]: E0517 00:34:58.254454 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:58.254632 kubelet[2012]: W0517 00:34:58.254612 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:58.254769 kubelet[2012]: E0517 00:34:58.254742 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:58.255175 kubelet[2012]: E0517 00:34:58.255156 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:58.255316 kubelet[2012]: W0517 00:34:58.255296 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:58.255464 kubelet[2012]: E0517 00:34:58.255440 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:58.255966 kubelet[2012]: E0517 00:34:58.255946 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:58.256105 kubelet[2012]: W0517 00:34:58.256084 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:58.256246 kubelet[2012]: E0517 00:34:58.256225 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:58.260157 kubelet[2012]: E0517 00:34:58.256674 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:58.260157 kubelet[2012]: W0517 00:34:58.256690 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:58.260157 kubelet[2012]: E0517 00:34:58.256707 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:58.260157 kubelet[2012]: E0517 00:34:58.257095 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:58.260157 kubelet[2012]: W0517 00:34:58.257118 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:58.260157 kubelet[2012]: E0517 00:34:58.257134 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:58.260157 kubelet[2012]: E0517 00:34:58.257468 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:58.260157 kubelet[2012]: W0517 00:34:58.257481 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:58.260157 kubelet[2012]: E0517 00:34:58.257495 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:58.260157 kubelet[2012]: E0517 00:34:58.257799 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:58.260834 kubelet[2012]: W0517 00:34:58.257811 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:58.260834 kubelet[2012]: E0517 00:34:58.257824 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:58.260834 kubelet[2012]: E0517 00:34:58.258154 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:58.260834 kubelet[2012]: W0517 00:34:58.258167 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:58.260834 kubelet[2012]: E0517 00:34:58.258183 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:58.260834 kubelet[2012]: E0517 00:34:58.258464 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:58.260834 kubelet[2012]: W0517 00:34:58.258475 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:58.260834 kubelet[2012]: E0517 00:34:58.258488 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:58.260834 kubelet[2012]: E0517 00:34:58.258729 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:58.260834 kubelet[2012]: W0517 00:34:58.258739 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:58.261361 kubelet[2012]: E0517 00:34:58.258753 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:58.261361 kubelet[2012]: E0517 00:34:58.259024 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:58.261361 kubelet[2012]: W0517 00:34:58.259034 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:58.261361 kubelet[2012]: E0517 00:34:58.259046 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:58.261361 kubelet[2012]: E0517 00:34:58.259305 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:58.261361 kubelet[2012]: W0517 00:34:58.259315 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:58.261361 kubelet[2012]: E0517 00:34:58.259328 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:58.261361 kubelet[2012]: E0517 00:34:58.259565 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:58.261361 kubelet[2012]: W0517 00:34:58.259574 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:58.261361 kubelet[2012]: E0517 00:34:58.259586 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:58.261933 kubelet[2012]: E0517 00:34:58.259830 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:58.261933 kubelet[2012]: W0517 00:34:58.259842 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:58.261933 kubelet[2012]: E0517 00:34:58.259856 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:58.261933 kubelet[2012]: E0517 00:34:58.260105 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:58.261933 kubelet[2012]: W0517 00:34:58.260244 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:58.261933 kubelet[2012]: E0517 00:34:58.260270 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:58.261933 kubelet[2012]: E0517 00:34:58.260760 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:58.261933 kubelet[2012]: W0517 00:34:58.260775 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:58.261933 kubelet[2012]: E0517 00:34:58.260791 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:58.261933 kubelet[2012]: E0517 00:34:58.261096 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:58.262516 kubelet[2012]: W0517 00:34:58.261109 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:58.262516 kubelet[2012]: E0517 00:34:58.261124 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:58.262516 kubelet[2012]: E0517 00:34:58.261396 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:58.262516 kubelet[2012]: W0517 00:34:58.261409 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:58.262516 kubelet[2012]: E0517 00:34:58.261423 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:58.262516 kubelet[2012]: E0517 00:34:58.261830 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:58.262516 kubelet[2012]: W0517 00:34:58.261845 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:58.262516 kubelet[2012]: E0517 00:34:58.261861 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:58.263121 kubelet[2012]: E0517 00:34:58.262531 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:58.263121 kubelet[2012]: W0517 00:34:58.262579 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:58.263121 kubelet[2012]: E0517 00:34:58.262597 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:58.263121 kubelet[2012]: I0517 00:34:58.262674 2012 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/9a0b64da-0bec-4455-813d-7708414d174b-varrun\") pod \"csi-node-driver-kpjdk\" (UID: \"9a0b64da-0bec-4455-813d-7708414d174b\") " pod="calico-system/csi-node-driver-kpjdk" May 17 00:34:58.263349 kubelet[2012]: E0517 00:34:58.263129 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:58.263349 kubelet[2012]: W0517 00:34:58.263177 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:58.263349 kubelet[2012]: E0517 00:34:58.263203 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:58.263349 kubelet[2012]: I0517 00:34:58.263234 2012 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wq5gp\" (UniqueName: \"kubernetes.io/projected/9a0b64da-0bec-4455-813d-7708414d174b-kube-api-access-wq5gp\") pod \"csi-node-driver-kpjdk\" (UID: \"9a0b64da-0bec-4455-813d-7708414d174b\") " pod="calico-system/csi-node-driver-kpjdk" May 17 00:34:58.263603 kubelet[2012]: E0517 00:34:58.263583 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:58.263603 kubelet[2012]: W0517 00:34:58.263598 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:58.263733 kubelet[2012]: E0517 00:34:58.263621 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:58.263733 kubelet[2012]: I0517 00:34:58.263651 2012 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/9a0b64da-0bec-4455-813d-7708414d174b-socket-dir\") pod \"csi-node-driver-kpjdk\" (UID: \"9a0b64da-0bec-4455-813d-7708414d174b\") " pod="calico-system/csi-node-driver-kpjdk" May 17 00:34:58.264092 kubelet[2012]: E0517 00:34:58.264063 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:58.264092 kubelet[2012]: W0517 00:34:58.264089 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:58.264251 kubelet[2012]: E0517 00:34:58.264212 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:58.264321 kubelet[2012]: I0517 00:34:58.264291 2012 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/9a0b64da-0bec-4455-813d-7708414d174b-kubelet-dir\") pod \"csi-node-driver-kpjdk\" (UID: \"9a0b64da-0bec-4455-813d-7708414d174b\") " pod="calico-system/csi-node-driver-kpjdk" May 17 00:34:58.264596 kubelet[2012]: E0517 00:34:58.264570 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:58.264596 kubelet[2012]: W0517 00:34:58.264594 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:58.264764 kubelet[2012]: E0517 00:34:58.264715 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:58.264942 kubelet[2012]: E0517 00:34:58.264912 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:58.265060 kubelet[2012]: W0517 00:34:58.265025 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:58.265236 kubelet[2012]: E0517 00:34:58.265207 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:58.265518 kubelet[2012]: E0517 00:34:58.265493 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:58.265518 kubelet[2012]: W0517 00:34:58.265515 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:58.265674 kubelet[2012]: E0517 00:34:58.265634 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:58.265846 kubelet[2012]: E0517 00:34:58.265825 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:58.265846 kubelet[2012]: W0517 00:34:58.265845 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:58.266001 kubelet[2012]: E0517 00:34:58.265963 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:58.266072 kubelet[2012]: I0517 00:34:58.266020 2012 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/9a0b64da-0bec-4455-813d-7708414d174b-registration-dir\") pod \"csi-node-driver-kpjdk\" (UID: \"9a0b64da-0bec-4455-813d-7708414d174b\") " pod="calico-system/csi-node-driver-kpjdk" May 17 00:34:58.266247 kubelet[2012]: E0517 00:34:58.266224 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:58.266338 kubelet[2012]: W0517 00:34:58.266246 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:58.266338 kubelet[2012]: E0517 00:34:58.266328 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:58.266651 kubelet[2012]: E0517 00:34:58.266627 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:58.266651 kubelet[2012]: W0517 00:34:58.266649 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:58.266799 kubelet[2012]: E0517 00:34:58.266670 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:58.267055 kubelet[2012]: E0517 00:34:58.267031 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:58.267055 kubelet[2012]: W0517 00:34:58.267053 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:58.267212 kubelet[2012]: E0517 00:34:58.267077 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:58.267431 kubelet[2012]: E0517 00:34:58.267403 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:58.267431 kubelet[2012]: W0517 00:34:58.267425 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:58.267582 kubelet[2012]: E0517 00:34:58.267445 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:58.267764 kubelet[2012]: E0517 00:34:58.267740 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:58.267764 kubelet[2012]: W0517 00:34:58.267762 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:58.267910 kubelet[2012]: E0517 00:34:58.267779 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:58.268099 kubelet[2012]: E0517 00:34:58.268076 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:58.268099 kubelet[2012]: W0517 00:34:58.268098 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:58.268240 kubelet[2012]: E0517 00:34:58.268116 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:58.268440 kubelet[2012]: E0517 00:34:58.268418 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:58.268440 kubelet[2012]: W0517 00:34:58.268440 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:58.268606 kubelet[2012]: E0517 00:34:58.268457 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:58.304921 env[1212]: time="2025-05-17T00:34:58.304856169Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-7f944d8c4-cq7qr,Uid:057a022e-bf8b-46ce-bfbb-be60666751f3,Namespace:calico-system,Attempt:0,} returns sandbox id \"ae106dd80b89512dd02a65e826561fd8479d77eb4deb4e3c830f52cc294ede37\"" May 17 00:34:58.307150 env[1212]: time="2025-05-17T00:34:58.307097915Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.0\"" May 17 00:34:58.368485 kubelet[2012]: E0517 00:34:58.368341 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:58.368485 kubelet[2012]: W0517 00:34:58.368397 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:58.368485 kubelet[2012]: E0517 00:34:58.368429 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:58.368889 kubelet[2012]: E0517 00:34:58.368863 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:58.368889 kubelet[2012]: W0517 00:34:58.368889 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:58.369058 kubelet[2012]: E0517 00:34:58.368915 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:58.369315 kubelet[2012]: E0517 00:34:58.369287 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:58.369315 kubelet[2012]: W0517 00:34:58.369313 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:58.369502 kubelet[2012]: E0517 00:34:58.369341 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:58.369733 kubelet[2012]: E0517 00:34:58.369706 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:58.369733 kubelet[2012]: W0517 00:34:58.369731 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:58.369895 kubelet[2012]: E0517 00:34:58.369755 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:58.373720 kubelet[2012]: E0517 00:34:58.373697 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:58.373839 kubelet[2012]: W0517 00:34:58.373750 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:58.373920 kubelet[2012]: E0517 00:34:58.373893 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:58.374186 kubelet[2012]: E0517 00:34:58.374159 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:58.374186 kubelet[2012]: W0517 00:34:58.374186 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:58.374338 kubelet[2012]: E0517 00:34:58.374313 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:58.374589 kubelet[2012]: E0517 00:34:58.374561 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:58.374589 kubelet[2012]: W0517 00:34:58.374587 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:58.374736 kubelet[2012]: E0517 00:34:58.374710 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:58.374933 kubelet[2012]: E0517 00:34:58.374908 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:58.374933 kubelet[2012]: W0517 00:34:58.374932 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:58.375100 kubelet[2012]: E0517 00:34:58.375075 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:58.375399 kubelet[2012]: E0517 00:34:58.375356 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:58.377500 kubelet[2012]: W0517 00:34:58.377468 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:58.377800 kubelet[2012]: E0517 00:34:58.377644 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:58.378506 kubelet[2012]: E0517 00:34:58.378479 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:58.378506 kubelet[2012]: W0517 00:34:58.378504 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:58.378681 kubelet[2012]: E0517 00:34:58.378644 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:58.378894 kubelet[2012]: E0517 00:34:58.378855 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:58.378894 kubelet[2012]: W0517 00:34:58.378877 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:58.379044 kubelet[2012]: E0517 00:34:58.379008 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:58.379280 kubelet[2012]: E0517 00:34:58.379236 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:58.379280 kubelet[2012]: W0517 00:34:58.379258 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:58.379472 kubelet[2012]: E0517 00:34:58.379391 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:58.379610 kubelet[2012]: E0517 00:34:58.379587 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:58.379610 kubelet[2012]: W0517 00:34:58.379609 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:58.379783 kubelet[2012]: E0517 00:34:58.379733 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:58.379962 kubelet[2012]: E0517 00:34:58.379927 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:58.379962 kubelet[2012]: W0517 00:34:58.379948 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:58.380097 kubelet[2012]: E0517 00:34:58.380078 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:58.380297 kubelet[2012]: E0517 00:34:58.380274 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:58.380297 kubelet[2012]: W0517 00:34:58.380297 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:58.383670 kubelet[2012]: E0517 00:34:58.383636 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:58.383966 kubelet[2012]: E0517 00:34:58.383938 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:58.383966 kubelet[2012]: W0517 00:34:58.383964 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:58.384123 kubelet[2012]: E0517 00:34:58.384101 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:58.384384 kubelet[2012]: E0517 00:34:58.384337 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:58.384476 kubelet[2012]: W0517 00:34:58.384360 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:58.384536 kubelet[2012]: E0517 00:34:58.384501 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:58.384759 kubelet[2012]: E0517 00:34:58.384725 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:58.384759 kubelet[2012]: W0517 00:34:58.384747 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:58.384905 kubelet[2012]: E0517 00:34:58.384869 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:58.385108 kubelet[2012]: E0517 00:34:58.385085 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:58.385197 kubelet[2012]: W0517 00:34:58.385109 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:58.385263 kubelet[2012]: E0517 00:34:58.385225 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:58.385654 kubelet[2012]: E0517 00:34:58.385629 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:58.385654 kubelet[2012]: W0517 00:34:58.385651 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:58.385989 kubelet[2012]: E0517 00:34:58.385861 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:58.391493 kubelet[2012]: E0517 00:34:58.391460 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:58.391493 kubelet[2012]: W0517 00:34:58.391490 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:58.391864 kubelet[2012]: E0517 00:34:58.391690 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:58.392038 kubelet[2012]: E0517 00:34:58.392014 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:58.392038 kubelet[2012]: W0517 00:34:58.392038 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:58.392351 kubelet[2012]: E0517 00:34:58.392212 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:58.392467 kubelet[2012]: E0517 00:34:58.392444 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:58.392467 kubelet[2012]: W0517 00:34:58.392458 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:58.392800 kubelet[2012]: E0517 00:34:58.392647 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:58.393038 kubelet[2012]: E0517 00:34:58.393013 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:58.393038 kubelet[2012]: W0517 00:34:58.393036 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:58.393344 kubelet[2012]: E0517 00:34:58.393199 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:58.394485 kubelet[2012]: E0517 00:34:58.394458 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:58.394485 kubelet[2012]: W0517 00:34:58.394482 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:58.394655 kubelet[2012]: E0517 00:34:58.394503 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:58.417427 kubelet[2012]: E0517 00:34:58.417352 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:58.417724 kubelet[2012]: W0517 00:34:58.417692 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:58.417909 kubelet[2012]: E0517 00:34:58.417883 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:58.831000 audit[2540]: NETFILTER_CFG table=filter:97 family=2 entries=20 op=nft_register_rule pid=2540 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:58.831000 audit[2540]: SYSCALL arch=c000003e syscall=46 success=yes exit=8224 a0=3 a1=7ffd135228c0 a2=0 a3=7ffd135228ac items=0 ppid=2172 pid=2540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:58.831000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:58.837000 audit[2540]: NETFILTER_CFG table=nat:98 family=2 entries=12 op=nft_register_rule pid=2540 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:58.837000 audit[2540]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd135228c0 a2=0 a3=0 items=0 ppid=2172 pid=2540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:58.837000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:58.865489 systemd[1]: run-containerd-runc-k8s.io-ae106dd80b89512dd02a65e826561fd8479d77eb4deb4e3c830f52cc294ede37-runc.Swzhkh.mount: Deactivated successfully. May 17 00:34:59.158599 kubelet[2012]: E0517 00:34:59.157855 2012 secret.go:189] Couldn't get secret calico-system/node-certs: failed to sync secret cache: timed out waiting for the condition May 17 00:34:59.158599 kubelet[2012]: E0517 00:34:59.158108 2012 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/502facaf-e418-4a3d-841b-851517f7b083-node-certs podName:502facaf-e418-4a3d-841b-851517f7b083 nodeName:}" failed. No retries permitted until 2025-05-17 00:34:59.658034201 +0000 UTC m=+22.339179582 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "node-certs" (UniqueName: "kubernetes.io/secret/502facaf-e418-4a3d-841b-851517f7b083-node-certs") pod "calico-node-nzf4z" (UID: "502facaf-e418-4a3d-841b-851517f7b083") : failed to sync secret cache: timed out waiting for the condition May 17 00:34:59.180082 kubelet[2012]: E0517 00:34:59.180050 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:59.180082 kubelet[2012]: W0517 00:34:59.180077 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:59.180315 kubelet[2012]: E0517 00:34:59.180206 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:59.281114 kubelet[2012]: E0517 00:34:59.281076 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:59.281114 kubelet[2012]: W0517 00:34:59.281109 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:59.281399 kubelet[2012]: E0517 00:34:59.281157 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:59.290612 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1830082857.mount: Deactivated successfully. May 17 00:34:59.382938 kubelet[2012]: E0517 00:34:59.382757 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:59.382938 kubelet[2012]: W0517 00:34:59.382807 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:59.382938 kubelet[2012]: E0517 00:34:59.382836 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:59.485597 kubelet[2012]: E0517 00:34:59.484553 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:59.485597 kubelet[2012]: W0517 00:34:59.484588 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:59.485597 kubelet[2012]: E0517 00:34:59.484616 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:59.586428 kubelet[2012]: E0517 00:34:59.586390 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:59.586715 kubelet[2012]: W0517 00:34:59.586689 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:59.586844 kubelet[2012]: E0517 00:34:59.586822 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:59.605956 kubelet[2012]: E0517 00:34:59.605901 2012 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kpjdk" podUID="9a0b64da-0bec-4455-813d-7708414d174b" May 17 00:34:59.688478 kubelet[2012]: E0517 00:34:59.688431 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:59.688734 kubelet[2012]: W0517 00:34:59.688707 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:59.688903 kubelet[2012]: E0517 00:34:59.688881 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:59.689475 kubelet[2012]: E0517 00:34:59.689449 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:59.689637 kubelet[2012]: W0517 00:34:59.689617 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:59.689750 kubelet[2012]: E0517 00:34:59.689728 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:59.690178 kubelet[2012]: E0517 00:34:59.690159 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:59.690351 kubelet[2012]: W0517 00:34:59.690330 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:59.690548 kubelet[2012]: E0517 00:34:59.690528 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:59.691001 kubelet[2012]: E0517 00:34:59.690982 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:59.691149 kubelet[2012]: W0517 00:34:59.691131 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:59.691297 kubelet[2012]: E0517 00:34:59.691245 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:59.693311 kubelet[2012]: E0517 00:34:59.693290 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:59.693638 kubelet[2012]: W0517 00:34:59.693475 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:59.695006 kubelet[2012]: E0517 00:34:59.694981 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:59.709168 kubelet[2012]: E0517 00:34:59.709145 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:34:59.709344 kubelet[2012]: W0517 00:34:59.709322 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:34:59.709478 kubelet[2012]: E0517 00:34:59.709458 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:34:59.869506 env[1212]: time="2025-05-17T00:34:59.869448194Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-nzf4z,Uid:502facaf-e418-4a3d-841b-851517f7b083,Namespace:calico-system,Attempt:0,}" May 17 00:34:59.922916 env[1212]: time="2025-05-17T00:34:59.922512711Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:34:59.922916 env[1212]: time="2025-05-17T00:34:59.922572304Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:34:59.922916 env[1212]: time="2025-05-17T00:34:59.922591605Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:34:59.923447 env[1212]: time="2025-05-17T00:34:59.923391087Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bbee6d9105c2ba61b25b43fef4fbd8c25fe2e22c6bea1c16214f50bc58ae2ed9 pid=2561 runtime=io.containerd.runc.v2 May 17 00:34:59.978292 systemd[1]: Started cri-containerd-bbee6d9105c2ba61b25b43fef4fbd8c25fe2e22c6bea1c16214f50bc58ae2ed9.scope. May 17 00:35:00.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:00.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:00.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:00.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:00.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:00.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:00.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:00.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:00.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:00.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:00.048000 audit: BPF prog-id=122 op=LOAD May 17 00:35:00.050000 audit[2571]: AVC avc: denied { bpf } for pid=2571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:00.050000 audit[2571]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2561 pid=2571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:00.050000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262656536643931303563326261363162323562343366656634666264 May 17 00:35:00.052000 audit[2571]: AVC avc: denied { perfmon } for pid=2571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:00.052000 audit[2571]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2561 pid=2571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:00.052000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262656536643931303563326261363162323562343366656634666264 May 17 00:35:00.052000 audit[2571]: AVC avc: denied { bpf } for pid=2571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:00.052000 audit[2571]: AVC avc: denied { bpf } for pid=2571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:00.052000 audit[2571]: AVC avc: denied { bpf } for pid=2571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:00.052000 audit[2571]: AVC avc: denied { perfmon } for pid=2571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:00.052000 audit[2571]: AVC avc: denied { perfmon } for pid=2571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:00.052000 audit[2571]: AVC avc: denied { perfmon } for pid=2571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:00.052000 audit[2571]: AVC avc: denied { perfmon } for pid=2571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:00.052000 audit[2571]: AVC avc: denied { perfmon } for pid=2571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:00.052000 audit[2571]: AVC avc: denied { bpf } for pid=2571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:00.052000 audit[2571]: AVC avc: denied { bpf } for pid=2571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:00.052000 audit: BPF prog-id=123 op=LOAD May 17 00:35:00.052000 audit[2571]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0001ade10 items=0 ppid=2561 pid=2571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:00.052000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262656536643931303563326261363162323562343366656634666264 May 17 00:35:00.053000 audit[2571]: AVC avc: denied { bpf } for pid=2571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:00.053000 audit[2571]: AVC avc: denied { bpf } for pid=2571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:00.053000 audit[2571]: AVC avc: denied { perfmon } for pid=2571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:00.053000 audit[2571]: AVC avc: denied { perfmon } for pid=2571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:00.053000 audit[2571]: AVC avc: denied { perfmon } for pid=2571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:00.053000 audit[2571]: AVC avc: denied { perfmon } for pid=2571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:00.053000 audit[2571]: AVC avc: denied { perfmon } for pid=2571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:00.053000 audit[2571]: AVC avc: denied { bpf } for pid=2571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:00.053000 audit[2571]: AVC avc: denied { bpf } for pid=2571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:00.053000 audit: BPF prog-id=124 op=LOAD May 17 00:35:00.053000 audit[2571]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0001ade58 items=0 ppid=2561 pid=2571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:00.053000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262656536643931303563326261363162323562343366656634666264 May 17 00:35:00.054000 audit: BPF prog-id=124 op=UNLOAD May 17 00:35:00.054000 audit: BPF prog-id=123 op=UNLOAD May 17 00:35:00.054000 audit[2571]: AVC avc: denied { bpf } for pid=2571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:00.054000 audit[2571]: AVC avc: denied { bpf } for pid=2571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:00.054000 audit[2571]: AVC avc: denied { bpf } for pid=2571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:00.054000 audit[2571]: AVC avc: denied { perfmon } for pid=2571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:00.054000 audit[2571]: AVC avc: denied { perfmon } for pid=2571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:00.054000 audit[2571]: AVC avc: denied { perfmon } for pid=2571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:00.054000 audit[2571]: AVC avc: denied { perfmon } for pid=2571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:00.054000 audit[2571]: AVC avc: denied { perfmon } for pid=2571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:00.054000 audit[2571]: AVC avc: denied { bpf } for pid=2571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:00.054000 audit[2571]: AVC avc: denied { bpf } for pid=2571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:00.054000 audit: BPF prog-id=125 op=LOAD May 17 00:35:00.054000 audit[2571]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000230268 items=0 ppid=2561 pid=2571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:00.054000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262656536643931303563326261363162323562343366656634666264 May 17 00:35:00.081097 env[1212]: time="2025-05-17T00:35:00.081037500Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-nzf4z,Uid:502facaf-e418-4a3d-841b-851517f7b083,Namespace:calico-system,Attempt:0,} returns sandbox id \"bbee6d9105c2ba61b25b43fef4fbd8c25fe2e22c6bea1c16214f50bc58ae2ed9\"" May 17 00:35:00.591968 env[1212]: time="2025-05-17T00:35:00.591885291Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:00.594815 env[1212]: time="2025-05-17T00:35:00.594764339Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:71be0570e8645ac646675719e0da6ac33a05810991b31aecc303e7add70933be,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:00.597242 env[1212]: time="2025-05-17T00:35:00.597147385Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:00.599691 env[1212]: time="2025-05-17T00:35:00.599655035Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:d282f6c773c4631b9dc8379eb093c54ca34c7728d55d6509cb45da5e1f5baf8f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:00.600237 env[1212]: time="2025-05-17T00:35:00.600199225Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.0\" returns image reference \"sha256:71be0570e8645ac646675719e0da6ac33a05810991b31aecc303e7add70933be\"" May 17 00:35:00.605014 env[1212]: time="2025-05-17T00:35:00.604948084Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0\"" May 17 00:35:00.629829 env[1212]: time="2025-05-17T00:35:00.629199920Z" level=info msg="CreateContainer within sandbox \"ae106dd80b89512dd02a65e826561fd8479d77eb4deb4e3c830f52cc294ede37\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" May 17 00:35:00.644885 env[1212]: time="2025-05-17T00:35:00.644838611Z" level=info msg="CreateContainer within sandbox \"ae106dd80b89512dd02a65e826561fd8479d77eb4deb4e3c830f52cc294ede37\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"71d81e0293dd75bfd5ae7e04feb55416845b55edd9afc78dc6f0f739be7175e8\"" May 17 00:35:00.645715 env[1212]: time="2025-05-17T00:35:00.645667399Z" level=info msg="StartContainer for \"71d81e0293dd75bfd5ae7e04feb55416845b55edd9afc78dc6f0f739be7175e8\"" May 17 00:35:00.678918 systemd[1]: Started cri-containerd-71d81e0293dd75bfd5ae7e04feb55416845b55edd9afc78dc6f0f739be7175e8.scope. May 17 00:35:00.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:00.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:00.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:00.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:00.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:00.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:00.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:00.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:00.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:00.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:00.701000 audit: BPF prog-id=126 op=LOAD May 17 00:35:00.702000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:00.702000 audit[2603]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2426 pid=2603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:00.702000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731643831653032393364643735626664356165376530346665623535 May 17 00:35:00.702000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:00.702000 audit[2603]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2426 pid=2603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:00.702000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731643831653032393364643735626664356165376530346665623535 May 17 00:35:00.702000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:00.702000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:00.702000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:00.702000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:00.702000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:00.702000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:00.702000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:00.702000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:00.702000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:00.702000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:00.702000 audit: BPF prog-id=127 op=LOAD May 17 00:35:00.702000 audit[2603]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000025450 items=0 ppid=2426 pid=2603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:00.702000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731643831653032393364643735626664356165376530346665623535 May 17 00:35:00.702000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:00.702000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:00.702000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:00.702000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:00.702000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:00.702000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:00.702000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:00.702000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:00.702000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:00.702000 audit: BPF prog-id=128 op=LOAD May 17 00:35:00.702000 audit[2603]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000025498 items=0 ppid=2426 pid=2603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:00.702000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731643831653032393364643735626664356165376530346665623535 May 17 00:35:00.702000 audit: BPF prog-id=128 op=UNLOAD May 17 00:35:00.702000 audit: BPF prog-id=127 op=UNLOAD May 17 00:35:00.702000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:00.702000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:00.702000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:00.702000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:00.702000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:00.702000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:00.702000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:00.702000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:00.702000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:00.702000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:00.702000 audit: BPF prog-id=129 op=LOAD May 17 00:35:00.702000 audit[2603]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0000258a8 items=0 ppid=2426 pid=2603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:00.702000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731643831653032393364643735626664356165376530346665623535 May 17 00:35:00.760220 env[1212]: time="2025-05-17T00:35:00.760159991Z" level=info msg="StartContainer for \"71d81e0293dd75bfd5ae7e04feb55416845b55edd9afc78dc6f0f739be7175e8\" returns successfully" May 17 00:35:01.607174 kubelet[2012]: E0517 00:35:01.607110 2012 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kpjdk" podUID="9a0b64da-0bec-4455-813d-7708414d174b" May 17 00:35:01.748955 env[1212]: time="2025-05-17T00:35:01.748907945Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:01.751332 env[1212]: time="2025-05-17T00:35:01.751288128Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c53606cea03e59dcbfa981dc43a55dff05952895f72576b8389fa00be09ab676,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:01.753273 env[1212]: time="2025-05-17T00:35:01.753232025Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:01.755450 env[1212]: time="2025-05-17T00:35:01.755410010Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:ce76dd87f11d3fd0054c35ad2e0e9f833748d007f77a9bfe859d0ddcb66fcb2c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:01.756600 env[1212]: time="2025-05-17T00:35:01.756548146Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0\" returns image reference \"sha256:c53606cea03e59dcbfa981dc43a55dff05952895f72576b8389fa00be09ab676\"" May 17 00:35:01.760131 env[1212]: time="2025-05-17T00:35:01.760062303Z" level=info msg="CreateContainer within sandbox \"bbee6d9105c2ba61b25b43fef4fbd8c25fe2e22c6bea1c16214f50bc58ae2ed9\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 17 00:35:01.782139 env[1212]: time="2025-05-17T00:35:01.782074228Z" level=info msg="CreateContainer within sandbox \"bbee6d9105c2ba61b25b43fef4fbd8c25fe2e22c6bea1c16214f50bc58ae2ed9\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"d5ccf69f62d015a813c3dabed833614d86e6cd3a80de8a92ea4959278f57b730\"" May 17 00:35:01.785152 env[1212]: time="2025-05-17T00:35:01.783164881Z" level=info msg="StartContainer for \"d5ccf69f62d015a813c3dabed833614d86e6cd3a80de8a92ea4959278f57b730\"" May 17 00:35:01.801409 kubelet[2012]: E0517 00:35:01.799852 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:01.801409 kubelet[2012]: W0517 00:35:01.799882 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:01.801409 kubelet[2012]: E0517 00:35:01.799915 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:01.801409 kubelet[2012]: E0517 00:35:01.800219 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:01.801409 kubelet[2012]: W0517 00:35:01.800231 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:01.801409 kubelet[2012]: E0517 00:35:01.800247 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:01.801409 kubelet[2012]: E0517 00:35:01.800552 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:01.801409 kubelet[2012]: W0517 00:35:01.800569 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:01.801409 kubelet[2012]: E0517 00:35:01.800597 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:01.801409 kubelet[2012]: E0517 00:35:01.800941 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:01.802042 kubelet[2012]: W0517 00:35:01.800954 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:01.802042 kubelet[2012]: E0517 00:35:01.800971 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:01.802042 kubelet[2012]: E0517 00:35:01.801263 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:01.802042 kubelet[2012]: W0517 00:35:01.801275 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:01.802042 kubelet[2012]: E0517 00:35:01.801290 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:01.802577 kubelet[2012]: E0517 00:35:01.802551 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:01.802577 kubelet[2012]: W0517 00:35:01.802575 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:01.802760 kubelet[2012]: E0517 00:35:01.802597 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:01.803105 kubelet[2012]: E0517 00:35:01.803043 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:01.803199 kubelet[2012]: W0517 00:35:01.803105 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:01.803199 kubelet[2012]: E0517 00:35:01.803125 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:01.803755 kubelet[2012]: E0517 00:35:01.803731 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:01.803755 kubelet[2012]: W0517 00:35:01.803753 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:01.803916 kubelet[2012]: E0517 00:35:01.803772 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:01.804148 kubelet[2012]: E0517 00:35:01.804125 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:01.804240 kubelet[2012]: W0517 00:35:01.804160 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:01.804240 kubelet[2012]: E0517 00:35:01.804179 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:01.804621 kubelet[2012]: E0517 00:35:01.804596 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:01.804621 kubelet[2012]: W0517 00:35:01.804621 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:01.804780 kubelet[2012]: E0517 00:35:01.804641 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:01.805029 kubelet[2012]: E0517 00:35:01.804998 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:01.805112 kubelet[2012]: W0517 00:35:01.805035 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:01.805112 kubelet[2012]: E0517 00:35:01.805052 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:01.805489 kubelet[2012]: E0517 00:35:01.805463 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:01.805596 kubelet[2012]: W0517 00:35:01.805489 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:01.805596 kubelet[2012]: E0517 00:35:01.805505 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:01.805906 kubelet[2012]: E0517 00:35:01.805882 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:01.805987 kubelet[2012]: W0517 00:35:01.805908 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:01.805987 kubelet[2012]: E0517 00:35:01.805924 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:01.806248 kubelet[2012]: E0517 00:35:01.806228 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:01.806248 kubelet[2012]: W0517 00:35:01.806247 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:01.806428 kubelet[2012]: E0517 00:35:01.806264 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:01.806644 kubelet[2012]: E0517 00:35:01.806621 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:01.806724 kubelet[2012]: W0517 00:35:01.806643 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:01.806724 kubelet[2012]: E0517 00:35:01.806673 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:01.829686 kubelet[2012]: E0517 00:35:01.826261 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:01.829686 kubelet[2012]: W0517 00:35:01.826290 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:01.829686 kubelet[2012]: E0517 00:35:01.826323 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:01.829686 kubelet[2012]: E0517 00:35:01.826842 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:01.829686 kubelet[2012]: W0517 00:35:01.826860 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:01.829686 kubelet[2012]: E0517 00:35:01.826880 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:01.829686 kubelet[2012]: E0517 00:35:01.827398 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:01.829686 kubelet[2012]: W0517 00:35:01.827413 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:01.829686 kubelet[2012]: E0517 00:35:01.827433 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:01.829686 kubelet[2012]: E0517 00:35:01.827877 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:01.830393 kubelet[2012]: W0517 00:35:01.827891 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:01.830393 kubelet[2012]: E0517 00:35:01.827938 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:01.830393 kubelet[2012]: E0517 00:35:01.828324 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:01.830393 kubelet[2012]: W0517 00:35:01.828339 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:01.830393 kubelet[2012]: E0517 00:35:01.828356 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:01.830393 kubelet[2012]: E0517 00:35:01.828652 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:01.830393 kubelet[2012]: W0517 00:35:01.828665 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:01.830393 kubelet[2012]: E0517 00:35:01.828680 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:01.830393 kubelet[2012]: E0517 00:35:01.829732 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:01.830393 kubelet[2012]: W0517 00:35:01.829747 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:01.831014 kubelet[2012]: E0517 00:35:01.829766 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:01.831014 kubelet[2012]: E0517 00:35:01.830274 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:01.831014 kubelet[2012]: W0517 00:35:01.830289 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:01.831014 kubelet[2012]: E0517 00:35:01.830305 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:01.831014 kubelet[2012]: E0517 00:35:01.830667 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:01.831014 kubelet[2012]: W0517 00:35:01.830682 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:01.831014 kubelet[2012]: E0517 00:35:01.830699 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:01.831014 kubelet[2012]: E0517 00:35:01.830967 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:01.831014 kubelet[2012]: W0517 00:35:01.830979 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:01.831014 kubelet[2012]: E0517 00:35:01.830995 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:01.832695 systemd[1]: Started cri-containerd-d5ccf69f62d015a813c3dabed833614d86e6cd3a80de8a92ea4959278f57b730.scope. May 17 00:35:01.835489 kubelet[2012]: E0517 00:35:01.835461 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:01.835489 kubelet[2012]: W0517 00:35:01.835488 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:01.835673 kubelet[2012]: E0517 00:35:01.835509 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:01.835993 kubelet[2012]: E0517 00:35:01.835946 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:01.835993 kubelet[2012]: W0517 00:35:01.835970 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:01.836169 kubelet[2012]: E0517 00:35:01.836000 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:01.838605 kubelet[2012]: E0517 00:35:01.838439 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:01.838605 kubelet[2012]: W0517 00:35:01.838460 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:01.838605 kubelet[2012]: E0517 00:35:01.838498 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:01.839088 kubelet[2012]: E0517 00:35:01.838916 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:01.839088 kubelet[2012]: W0517 00:35:01.838935 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:01.839088 kubelet[2012]: E0517 00:35:01.838954 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:01.839571 kubelet[2012]: E0517 00:35:01.839403 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:01.839571 kubelet[2012]: W0517 00:35:01.839429 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:01.839571 kubelet[2012]: E0517 00:35:01.839448 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:01.840167 kubelet[2012]: E0517 00:35:01.839941 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:01.840167 kubelet[2012]: W0517 00:35:01.839967 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:01.840167 kubelet[2012]: E0517 00:35:01.839986 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:01.841300 kubelet[2012]: E0517 00:35:01.840611 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:01.841300 kubelet[2012]: W0517 00:35:01.840628 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:01.841300 kubelet[2012]: E0517 00:35:01.840645 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:01.841300 kubelet[2012]: E0517 00:35:01.841228 2012 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:01.841300 kubelet[2012]: W0517 00:35:01.841242 2012 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:01.841300 kubelet[2012]: E0517 00:35:01.841259 2012 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:01.860000 audit[2644]: AVC avc: denied { perfmon } for pid=2644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.860000 audit[2644]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f22487c6128 items=0 ppid=2561 pid=2644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:01.860000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435636366363966363264303135613831336333646162656438333336 May 17 00:35:01.864000 audit[2644]: AVC avc: denied { bpf } for pid=2644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.864000 audit[2644]: AVC avc: denied { bpf } for pid=2644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.864000 audit[2644]: AVC avc: denied { bpf } for pid=2644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.864000 audit[2644]: AVC avc: denied { perfmon } for pid=2644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.864000 audit[2644]: AVC avc: denied { perfmon } for pid=2644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.864000 audit[2644]: AVC avc: denied { perfmon } for pid=2644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.864000 audit[2644]: AVC avc: denied { perfmon } for pid=2644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.864000 audit[2644]: AVC avc: denied { perfmon } for pid=2644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.864000 audit[2644]: AVC avc: denied { bpf } for pid=2644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.864000 audit[2644]: AVC avc: denied { bpf } for pid=2644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.864000 audit: BPF prog-id=130 op=LOAD May 17 00:35:01.864000 audit[2644]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c000344368 items=0 ppid=2561 pid=2644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:01.864000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435636366363966363264303135613831336333646162656438333336 May 17 00:35:01.864000 audit[2644]: AVC avc: denied { bpf } for pid=2644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.864000 audit[2644]: AVC avc: denied { bpf } for pid=2644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.864000 audit[2644]: AVC avc: denied { perfmon } for pid=2644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.864000 audit[2644]: AVC avc: denied { perfmon } for pid=2644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.864000 audit[2644]: AVC avc: denied { perfmon } for pid=2644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.864000 audit[2644]: AVC avc: denied { perfmon } for pid=2644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.864000 audit[2644]: AVC avc: denied { perfmon } for pid=2644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.864000 audit[2644]: AVC avc: denied { bpf } for pid=2644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.864000 audit[2644]: AVC avc: denied { bpf } for pid=2644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.864000 audit: BPF prog-id=131 op=LOAD May 17 00:35:01.864000 audit[2644]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0003443b8 items=0 ppid=2561 pid=2644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:01.864000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435636366363966363264303135613831336333646162656438333336 May 17 00:35:01.864000 audit: BPF prog-id=131 op=UNLOAD May 17 00:35:01.864000 audit: BPF prog-id=130 op=UNLOAD May 17 00:35:01.864000 audit[2644]: AVC avc: denied { bpf } for pid=2644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.864000 audit[2644]: AVC avc: denied { bpf } for pid=2644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.864000 audit[2644]: AVC avc: denied { bpf } for pid=2644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.864000 audit[2644]: AVC avc: denied { perfmon } for pid=2644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.864000 audit[2644]: AVC avc: denied { perfmon } for pid=2644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.864000 audit[2644]: AVC avc: denied { perfmon } for pid=2644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.864000 audit[2644]: AVC avc: denied { perfmon } for pid=2644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.864000 audit[2644]: AVC avc: denied { perfmon } for pid=2644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.864000 audit[2644]: AVC avc: denied { bpf } for pid=2644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.864000 audit[2644]: AVC avc: denied { bpf } for pid=2644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.864000 audit: BPF prog-id=132 op=LOAD May 17 00:35:01.864000 audit[2644]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c000344448 items=0 ppid=2561 pid=2644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:01.864000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435636366363966363264303135613831336333646162656438333336 May 17 00:35:01.888507 env[1212]: time="2025-05-17T00:35:01.888442640Z" level=info msg="StartContainer for \"d5ccf69f62d015a813c3dabed833614d86e6cd3a80de8a92ea4959278f57b730\" returns successfully" May 17 00:35:01.904982 systemd[1]: cri-containerd-d5ccf69f62d015a813c3dabed833614d86e6cd3a80de8a92ea4959278f57b730.scope: Deactivated successfully. May 17 00:35:01.909000 audit: BPF prog-id=132 op=UNLOAD May 17 00:35:01.939200 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-d5ccf69f62d015a813c3dabed833614d86e6cd3a80de8a92ea4959278f57b730-rootfs.mount: Deactivated successfully. May 17 00:35:02.622442 env[1212]: time="2025-05-17T00:35:02.622353551Z" level=info msg="shim disconnected" id=d5ccf69f62d015a813c3dabed833614d86e6cd3a80de8a92ea4959278f57b730 May 17 00:35:02.622815 env[1212]: time="2025-05-17T00:35:02.622759811Z" level=warning msg="cleaning up after shim disconnected" id=d5ccf69f62d015a813c3dabed833614d86e6cd3a80de8a92ea4959278f57b730 namespace=k8s.io May 17 00:35:02.622815 env[1212]: time="2025-05-17T00:35:02.622789064Z" level=info msg="cleaning up dead shim" May 17 00:35:02.634481 env[1212]: time="2025-05-17T00:35:02.634357905Z" level=warning msg="cleanup warnings time=\"2025-05-17T00:35:02Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2717 runtime=io.containerd.runc.v2\n" May 17 00:35:02.726393 kubelet[2012]: I0517 00:35:02.726258 2012 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:35:02.728162 env[1212]: time="2025-05-17T00:35:02.728110195Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.0\"" May 17 00:35:02.750155 kubelet[2012]: I0517 00:35:02.750080 2012 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-7f944d8c4-cq7qr" podStartSLOduration=3.454215023 podStartE2EDuration="5.750053042s" podCreationTimestamp="2025-05-17 00:34:57 +0000 UTC" firstStartedPulling="2025-05-17 00:34:58.306465119 +0000 UTC m=+20.987610491" lastFinishedPulling="2025-05-17 00:35:00.602303125 +0000 UTC m=+23.283448510" observedRunningTime="2025-05-17 00:35:01.743262464 +0000 UTC m=+24.424407850" watchObservedRunningTime="2025-05-17 00:35:02.750053042 +0000 UTC m=+25.431198427" May 17 00:35:03.607345 kubelet[2012]: E0517 00:35:03.607281 2012 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kpjdk" podUID="9a0b64da-0bec-4455-813d-7708414d174b" May 17 00:35:05.607189 kubelet[2012]: E0517 00:35:05.607137 2012 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kpjdk" podUID="9a0b64da-0bec-4455-813d-7708414d174b" May 17 00:35:06.194238 env[1212]: time="2025-05-17T00:35:06.194094988Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:06.198395 env[1212]: time="2025-05-17T00:35:06.198316630Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:15f996c472622f23047ea38b2d72940e8c34d0996b8a2e12a1f255c1d7083185,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:06.200683 env[1212]: time="2025-05-17T00:35:06.200638666Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:06.202821 env[1212]: time="2025-05-17T00:35:06.202782796Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:3dd06656abdc03fbd51782d5f6fe4d70e6825a1c0c5bce2a165bbd2ff9e0f7df,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:06.203496 env[1212]: time="2025-05-17T00:35:06.203444194Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.0\" returns image reference \"sha256:15f996c472622f23047ea38b2d72940e8c34d0996b8a2e12a1f255c1d7083185\"" May 17 00:35:06.209007 env[1212]: time="2025-05-17T00:35:06.208951302Z" level=info msg="CreateContainer within sandbox \"bbee6d9105c2ba61b25b43fef4fbd8c25fe2e22c6bea1c16214f50bc58ae2ed9\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 17 00:35:06.227975 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2278013966.mount: Deactivated successfully. May 17 00:35:06.235714 env[1212]: time="2025-05-17T00:35:06.235647207Z" level=info msg="CreateContainer within sandbox \"bbee6d9105c2ba61b25b43fef4fbd8c25fe2e22c6bea1c16214f50bc58ae2ed9\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"742d9abd239f749474325a06e5bc81f6b973cb0c510e22629f4e6b11db69f98a\"" May 17 00:35:06.238424 env[1212]: time="2025-05-17T00:35:06.236559718Z" level=info msg="StartContainer for \"742d9abd239f749474325a06e5bc81f6b973cb0c510e22629f4e6b11db69f98a\"" May 17 00:35:06.277731 systemd[1]: run-containerd-runc-k8s.io-742d9abd239f749474325a06e5bc81f6b973cb0c510e22629f4e6b11db69f98a-runc.NLHW1E.mount: Deactivated successfully. May 17 00:35:06.283557 systemd[1]: Started cri-containerd-742d9abd239f749474325a06e5bc81f6b973cb0c510e22629f4e6b11db69f98a.scope. May 17 00:35:06.304000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:06.310956 kernel: kauditd_printk_skb: 223 callbacks suppressed May 17 00:35:06.311083 kernel: audit: type=1400 audit(1747442106.304:977): avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:06.304000 audit[2744]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fe1681a33f8 items=0 ppid=2561 pid=2744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:06.364273 kernel: audit: type=1300 audit(1747442106.304:977): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fe1681a33f8 items=0 ppid=2561 pid=2744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:06.304000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734326439616264323339663734393437343332356130366535626338 May 17 00:35:06.397784 kernel: audit: type=1327 audit(1747442106.304:977): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734326439616264323339663734393437343332356130366535626338 May 17 00:35:06.304000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:06.304000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:06.439278 kernel: audit: type=1400 audit(1747442106.304:978): avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:06.439478 kernel: audit: type=1400 audit(1747442106.304:978): avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:06.439525 kernel: audit: type=1400 audit(1747442106.304:978): avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:06.304000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:06.304000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:06.480684 kernel: audit: type=1400 audit(1747442106.304:978): avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:06.480858 kernel: audit: type=1400 audit(1747442106.304:978): avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:06.304000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:06.481903 env[1212]: time="2025-05-17T00:35:06.481839601Z" level=info msg="StartContainer for \"742d9abd239f749474325a06e5bc81f6b973cb0c510e22629f4e6b11db69f98a\" returns successfully" May 17 00:35:06.304000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:06.522590 kernel: audit: type=1400 audit(1747442106.304:978): avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:06.522775 kernel: audit: type=1400 audit(1747442106.304:978): avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:06.304000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:06.304000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:06.304000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:06.304000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:06.304000 audit: BPF prog-id=133 op=LOAD May 17 00:35:06.304000 audit[2744]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00025dd68 items=0 ppid=2561 pid=2744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:06.304000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734326439616264323339663734393437343332356130366535626338 May 17 00:35:06.304000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:06.304000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:06.304000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:06.304000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:06.304000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:06.304000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:06.304000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:06.304000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:06.304000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:06.304000 audit: BPF prog-id=134 op=LOAD May 17 00:35:06.304000 audit[2744]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00025ddb8 items=0 ppid=2561 pid=2744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:06.304000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734326439616264323339663734393437343332356130366535626338 May 17 00:35:06.304000 audit: BPF prog-id=134 op=UNLOAD May 17 00:35:06.304000 audit: BPF prog-id=133 op=UNLOAD May 17 00:35:06.304000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:06.304000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:06.304000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:06.304000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:06.304000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:06.304000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:06.304000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:06.304000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:06.304000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:06.304000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:06.304000 audit: BPF prog-id=135 op=LOAD May 17 00:35:06.304000 audit[2744]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00025de48 items=0 ppid=2561 pid=2744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:06.304000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734326439616264323339663734393437343332356130366535626338 May 17 00:35:07.438560 systemd[1]: cri-containerd-742d9abd239f749474325a06e5bc81f6b973cb0c510e22629f4e6b11db69f98a.scope: Deactivated successfully. May 17 00:35:07.442000 audit: BPF prog-id=135 op=UNLOAD May 17 00:35:07.447740 kubelet[2012]: I0517 00:35:07.447695 2012 kubelet_node_status.go:501] "Fast updating node status as it just became ready" May 17 00:35:07.484111 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-742d9abd239f749474325a06e5bc81f6b973cb0c510e22629f4e6b11db69f98a-rootfs.mount: Deactivated successfully. May 17 00:35:07.503500 systemd[1]: Created slice kubepods-burstable-pod81c29f47_17e5_4770_9231_d763d86cc377.slice. May 17 00:35:07.521762 systemd[1]: Created slice kubepods-besteffort-poda0dc23c7_a960_467c_add4_219d6ae8364b.slice. May 17 00:35:07.533592 kubelet[2012]: W0517 00:35:07.532437 2012 reflector.go:569] object-"calico-system"/"whisker-backend-key-pair": failed to list *v1.Secret: secrets "whisker-backend-key-pair" is forbidden: User "system:node:ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" cannot list resource "secrets" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758' and this object May 17 00:35:07.533592 kubelet[2012]: E0517 00:35:07.532498 2012 reflector.go:166] "Unhandled Error" err="object-\"calico-system\"/\"whisker-backend-key-pair\": Failed to watch *v1.Secret: failed to list *v1.Secret: secrets \"whisker-backend-key-pair\" is forbidden: User \"system:node:ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758\" cannot list resource \"secrets\" in API group \"\" in the namespace \"calico-system\": no relationship found between node 'ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758' and this object" logger="UnhandledError" May 17 00:35:07.533592 kubelet[2012]: W0517 00:35:07.532571 2012 reflector.go:569] object-"calico-system"/"whisker-ca-bundle": failed to list *v1.ConfigMap: configmaps "whisker-ca-bundle" is forbidden: User "system:node:ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758' and this object May 17 00:35:07.533592 kubelet[2012]: E0517 00:35:07.532589 2012 reflector.go:166] "Unhandled Error" err="object-\"calico-system\"/\"whisker-ca-bundle\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps \"whisker-ca-bundle\" is forbidden: User \"system:node:ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758\" cannot list resource \"configmaps\" in API group \"\" in the namespace \"calico-system\": no relationship found between node 'ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758' and this object" logger="UnhandledError" May 17 00:35:07.536267 systemd[1]: Created slice kubepods-burstable-pod0b840cb1_eedd_48bf_b8ec_581041390cbc.slice. May 17 00:35:07.558701 systemd[1]: Created slice kubepods-besteffort-pod965767b7_1792_4c91_b4d9_b8c2d202747e.slice. May 17 00:35:07.571393 kubelet[2012]: I0517 00:35:07.569972 2012 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5swll\" (UniqueName: \"kubernetes.io/projected/0b840cb1-eedd-48bf-b8ec-581041390cbc-kube-api-access-5swll\") pod \"coredns-668d6bf9bc-6kzm4\" (UID: \"0b840cb1-eedd-48bf-b8ec-581041390cbc\") " pod="kube-system/coredns-668d6bf9bc-6kzm4" May 17 00:35:07.571393 kubelet[2012]: I0517 00:35:07.570066 2012 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-w6t2j\" (UniqueName: \"kubernetes.io/projected/908a611b-ce73-4141-bc04-98329eaa22ef-kube-api-access-w6t2j\") pod \"calico-apiserver-68444b4b45-r6srh\" (UID: \"908a611b-ce73-4141-bc04-98329eaa22ef\") " pod="calico-apiserver/calico-apiserver-68444b4b45-r6srh" May 17 00:35:07.571393 kubelet[2012]: I0517 00:35:07.570117 2012 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/908a611b-ce73-4141-bc04-98329eaa22ef-calico-apiserver-certs\") pod \"calico-apiserver-68444b4b45-r6srh\" (UID: \"908a611b-ce73-4141-bc04-98329eaa22ef\") " pod="calico-apiserver/calico-apiserver-68444b4b45-r6srh" May 17 00:35:07.571393 kubelet[2012]: I0517 00:35:07.570154 2012 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fpbkk\" (UniqueName: \"kubernetes.io/projected/965767b7-1792-4c91-b4d9-b8c2d202747e-kube-api-access-fpbkk\") pod \"calico-apiserver-68444b4b45-l4vgc\" (UID: \"965767b7-1792-4c91-b4d9-b8c2d202747e\") " pod="calico-apiserver/calico-apiserver-68444b4b45-l4vgc" May 17 00:35:07.571393 kubelet[2012]: I0517 00:35:07.570212 2012 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-key-pair\" (UniqueName: \"kubernetes.io/secret/6fdee754-80af-4193-bcf6-93825e6ce6df-goldmane-key-pair\") pod \"goldmane-78d55f7ddc-8tw2k\" (UID: \"6fdee754-80af-4193-bcf6-93825e6ce6df\") " pod="calico-system/goldmane-78d55f7ddc-8tw2k" May 17 00:35:07.571797 kubelet[2012]: I0517 00:35:07.570250 2012 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/a0dc23c7-a960-467c-add4-219d6ae8364b-whisker-backend-key-pair\") pod \"whisker-84fff46d56-dqntj\" (UID: \"a0dc23c7-a960-467c-add4-219d6ae8364b\") " pod="calico-system/whisker-84fff46d56-dqntj" May 17 00:35:07.571797 kubelet[2012]: I0517 00:35:07.570289 2012 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9zz59\" (UniqueName: \"kubernetes.io/projected/6fdee754-80af-4193-bcf6-93825e6ce6df-kube-api-access-9zz59\") pod \"goldmane-78d55f7ddc-8tw2k\" (UID: \"6fdee754-80af-4193-bcf6-93825e6ce6df\") " pod="calico-system/goldmane-78d55f7ddc-8tw2k" May 17 00:35:07.573605 kubelet[2012]: I0517 00:35:07.572099 2012 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/81c29f47-17e5-4770-9231-d763d86cc377-config-volume\") pod \"coredns-668d6bf9bc-6zjt5\" (UID: \"81c29f47-17e5-4770-9231-d763d86cc377\") " pod="kube-system/coredns-668d6bf9bc-6zjt5" May 17 00:35:07.573605 kubelet[2012]: I0517 00:35:07.572360 2012 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/965767b7-1792-4c91-b4d9-b8c2d202747e-calico-apiserver-certs\") pod \"calico-apiserver-68444b4b45-l4vgc\" (UID: \"965767b7-1792-4c91-b4d9-b8c2d202747e\") " pod="calico-apiserver/calico-apiserver-68444b4b45-l4vgc" May 17 00:35:07.573605 kubelet[2012]: I0517 00:35:07.572444 2012 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ph7mp\" (UniqueName: \"kubernetes.io/projected/81c29f47-17e5-4770-9231-d763d86cc377-kube-api-access-ph7mp\") pod \"coredns-668d6bf9bc-6zjt5\" (UID: \"81c29f47-17e5-4770-9231-d763d86cc377\") " pod="kube-system/coredns-668d6bf9bc-6zjt5" May 17 00:35:07.573605 kubelet[2012]: I0517 00:35:07.572485 2012 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/0b840cb1-eedd-48bf-b8ec-581041390cbc-config-volume\") pod \"coredns-668d6bf9bc-6kzm4\" (UID: \"0b840cb1-eedd-48bf-b8ec-581041390cbc\") " pod="kube-system/coredns-668d6bf9bc-6kzm4" May 17 00:35:07.573605 kubelet[2012]: I0517 00:35:07.572702 2012 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ftwkz\" (UniqueName: \"kubernetes.io/projected/a0dc23c7-a960-467c-add4-219d6ae8364b-kube-api-access-ftwkz\") pod \"whisker-84fff46d56-dqntj\" (UID: \"a0dc23c7-a960-467c-add4-219d6ae8364b\") " pod="calico-system/whisker-84fff46d56-dqntj" May 17 00:35:07.573355 systemd[1]: Created slice kubepods-besteffort-pod6fdee754_80af_4193_bcf6_93825e6ce6df.slice. May 17 00:35:07.574076 kubelet[2012]: I0517 00:35:07.572747 2012 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config\" (UniqueName: \"kubernetes.io/configmap/6fdee754-80af-4193-bcf6-93825e6ce6df-config\") pod \"goldmane-78d55f7ddc-8tw2k\" (UID: \"6fdee754-80af-4193-bcf6-93825e6ce6df\") " pod="calico-system/goldmane-78d55f7ddc-8tw2k" May 17 00:35:07.579070 kubelet[2012]: I0517 00:35:07.579032 2012 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/6fdee754-80af-4193-bcf6-93825e6ce6df-goldmane-ca-bundle\") pod \"goldmane-78d55f7ddc-8tw2k\" (UID: \"6fdee754-80af-4193-bcf6-93825e6ce6df\") " pod="calico-system/goldmane-78d55f7ddc-8tw2k" May 17 00:35:07.579217 kubelet[2012]: I0517 00:35:07.579141 2012 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/a0dc23c7-a960-467c-add4-219d6ae8364b-whisker-ca-bundle\") pod \"whisker-84fff46d56-dqntj\" (UID: \"a0dc23c7-a960-467c-add4-219d6ae8364b\") " pod="calico-system/whisker-84fff46d56-dqntj" May 17 00:35:07.619801 systemd[1]: Created slice kubepods-besteffort-pod908a611b_ce73_4141_bc04_98329eaa22ef.slice. May 17 00:35:07.631129 systemd[1]: Created slice kubepods-besteffort-podfd78bca1_b6af_4311_93c6_d48694e45dc4.slice. May 17 00:35:07.639335 systemd[1]: Created slice kubepods-besteffort-pod9a0b64da_0bec_4455_813d_7708414d174b.slice. May 17 00:35:07.645653 env[1212]: time="2025-05-17T00:35:07.645584575Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-kpjdk,Uid:9a0b64da-0bec-4455-813d-7708414d174b,Namespace:calico-system,Attempt:0,}" May 17 00:35:07.680702 kubelet[2012]: I0517 00:35:07.680653 2012 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-x66wl\" (UniqueName: \"kubernetes.io/projected/fd78bca1-b6af-4311-93c6-d48694e45dc4-kube-api-access-x66wl\") pod \"calico-kube-controllers-5dfd77fb7d-55blf\" (UID: \"fd78bca1-b6af-4311-93c6-d48694e45dc4\") " pod="calico-system/calico-kube-controllers-5dfd77fb7d-55blf" May 17 00:35:07.680998 kubelet[2012]: I0517 00:35:07.680969 2012 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/fd78bca1-b6af-4311-93c6-d48694e45dc4-tigera-ca-bundle\") pod \"calico-kube-controllers-5dfd77fb7d-55blf\" (UID: \"fd78bca1-b6af-4311-93c6-d48694e45dc4\") " pod="calico-system/calico-kube-controllers-5dfd77fb7d-55blf" May 17 00:35:07.809391 env[1212]: time="2025-05-17T00:35:07.809314466Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-6zjt5,Uid:81c29f47-17e5-4770-9231-d763d86cc377,Namespace:kube-system,Attempt:0,}" May 17 00:35:07.855828 env[1212]: time="2025-05-17T00:35:07.855767472Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-6kzm4,Uid:0b840cb1-eedd-48bf-b8ec-581041390cbc,Namespace:kube-system,Attempt:0,}" May 17 00:35:07.866340 env[1212]: time="2025-05-17T00:35:07.866281632Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-68444b4b45-l4vgc,Uid:965767b7-1792-4c91-b4d9-b8c2d202747e,Namespace:calico-apiserver,Attempt:0,}" May 17 00:35:07.904151 env[1212]: time="2025-05-17T00:35:07.904093576Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-78d55f7ddc-8tw2k,Uid:6fdee754-80af-4193-bcf6-93825e6ce6df,Namespace:calico-system,Attempt:0,}" May 17 00:35:07.928867 env[1212]: time="2025-05-17T00:35:07.928782264Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-68444b4b45-r6srh,Uid:908a611b-ce73-4141-bc04-98329eaa22ef,Namespace:calico-apiserver,Attempt:0,}" May 17 00:35:07.936402 env[1212]: time="2025-05-17T00:35:07.936311364Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5dfd77fb7d-55blf,Uid:fd78bca1-b6af-4311-93c6-d48694e45dc4,Namespace:calico-system,Attempt:0,}" May 17 00:35:08.045442 env[1212]: time="2025-05-17T00:35:08.045353623Z" level=info msg="shim disconnected" id=742d9abd239f749474325a06e5bc81f6b973cb0c510e22629f4e6b11db69f98a May 17 00:35:08.045853 env[1212]: time="2025-05-17T00:35:08.045700268Z" level=warning msg="cleaning up after shim disconnected" id=742d9abd239f749474325a06e5bc81f6b973cb0c510e22629f4e6b11db69f98a namespace=k8s.io May 17 00:35:08.045853 env[1212]: time="2025-05-17T00:35:08.045730744Z" level=info msg="cleaning up dead shim" May 17 00:35:08.060910 env[1212]: time="2025-05-17T00:35:08.060784513Z" level=warning msg="cleanup warnings time=\"2025-05-17T00:35:08Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2797 runtime=io.containerd.runc.v2\n" May 17 00:35:08.376254 env[1212]: time="2025-05-17T00:35:08.376074818Z" level=error msg="Failed to destroy network for sandbox \"32cc285900e6dcd205b9f41d7d3f2e75a044bfcd11a475e4197aa67f0a1085c6\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:08.376976 env[1212]: time="2025-05-17T00:35:08.376914696Z" level=error msg="encountered an error cleaning up failed sandbox \"32cc285900e6dcd205b9f41d7d3f2e75a044bfcd11a475e4197aa67f0a1085c6\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:08.377210 env[1212]: time="2025-05-17T00:35:08.377164335Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-6kzm4,Uid:0b840cb1-eedd-48bf-b8ec-581041390cbc,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"32cc285900e6dcd205b9f41d7d3f2e75a044bfcd11a475e4197aa67f0a1085c6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:08.380999 kubelet[2012]: E0517 00:35:08.380939 2012 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"32cc285900e6dcd205b9f41d7d3f2e75a044bfcd11a475e4197aa67f0a1085c6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:08.381190 kubelet[2012]: E0517 00:35:08.381041 2012 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"32cc285900e6dcd205b9f41d7d3f2e75a044bfcd11a475e4197aa67f0a1085c6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-6kzm4" May 17 00:35:08.381190 kubelet[2012]: E0517 00:35:08.381076 2012 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"32cc285900e6dcd205b9f41d7d3f2e75a044bfcd11a475e4197aa67f0a1085c6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-6kzm4" May 17 00:35:08.381190 kubelet[2012]: E0517 00:35:08.381152 2012 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-668d6bf9bc-6kzm4_kube-system(0b840cb1-eedd-48bf-b8ec-581041390cbc)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-668d6bf9bc-6kzm4_kube-system(0b840cb1-eedd-48bf-b8ec-581041390cbc)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"32cc285900e6dcd205b9f41d7d3f2e75a044bfcd11a475e4197aa67f0a1085c6\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-6kzm4" podUID="0b840cb1-eedd-48bf-b8ec-581041390cbc" May 17 00:35:08.441596 env[1212]: time="2025-05-17T00:35:08.441516030Z" level=error msg="Failed to destroy network for sandbox \"ae6f816b5036db3784b9a7d5e70abd4eee780e7fed3ae1db3d7f7c255a52a286\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:08.442348 env[1212]: time="2025-05-17T00:35:08.442279204Z" level=error msg="encountered an error cleaning up failed sandbox \"ae6f816b5036db3784b9a7d5e70abd4eee780e7fed3ae1db3d7f7c255a52a286\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:08.442607 env[1212]: time="2025-05-17T00:35:08.442559410Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-kpjdk,Uid:9a0b64da-0bec-4455-813d-7708414d174b,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"ae6f816b5036db3784b9a7d5e70abd4eee780e7fed3ae1db3d7f7c255a52a286\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:08.446341 kubelet[2012]: E0517 00:35:08.446277 2012 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ae6f816b5036db3784b9a7d5e70abd4eee780e7fed3ae1db3d7f7c255a52a286\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:08.446565 kubelet[2012]: E0517 00:35:08.446435 2012 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ae6f816b5036db3784b9a7d5e70abd4eee780e7fed3ae1db3d7f7c255a52a286\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-kpjdk" May 17 00:35:08.446565 kubelet[2012]: E0517 00:35:08.446474 2012 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ae6f816b5036db3784b9a7d5e70abd4eee780e7fed3ae1db3d7f7c255a52a286\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-kpjdk" May 17 00:35:08.446702 kubelet[2012]: E0517 00:35:08.446536 2012 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-kpjdk_calico-system(9a0b64da-0bec-4455-813d-7708414d174b)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-kpjdk_calico-system(9a0b64da-0bec-4455-813d-7708414d174b)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"ae6f816b5036db3784b9a7d5e70abd4eee780e7fed3ae1db3d7f7c255a52a286\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-kpjdk" podUID="9a0b64da-0bec-4455-813d-7708414d174b" May 17 00:35:08.479646 env[1212]: time="2025-05-17T00:35:08.479564688Z" level=error msg="Failed to destroy network for sandbox \"f14ba2115524ea20392546b4b007b25bca35212c09d8bc580b78280805199eaf\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:08.493702 env[1212]: time="2025-05-17T00:35:08.480060758Z" level=error msg="encountered an error cleaning up failed sandbox \"f14ba2115524ea20392546b4b007b25bca35212c09d8bc580b78280805199eaf\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:08.493702 env[1212]: time="2025-05-17T00:35:08.480141125Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-68444b4b45-l4vgc,Uid:965767b7-1792-4c91-b4d9-b8c2d202747e,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"f14ba2115524ea20392546b4b007b25bca35212c09d8bc580b78280805199eaf\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:08.494800 kubelet[2012]: E0517 00:35:08.480453 2012 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f14ba2115524ea20392546b4b007b25bca35212c09d8bc580b78280805199eaf\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:08.494800 kubelet[2012]: E0517 00:35:08.480521 2012 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f14ba2115524ea20392546b4b007b25bca35212c09d8bc580b78280805199eaf\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-68444b4b45-l4vgc" May 17 00:35:08.494800 kubelet[2012]: E0517 00:35:08.480555 2012 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f14ba2115524ea20392546b4b007b25bca35212c09d8bc580b78280805199eaf\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-68444b4b45-l4vgc" May 17 00:35:08.499282 kubelet[2012]: E0517 00:35:08.480624 2012 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-68444b4b45-l4vgc_calico-apiserver(965767b7-1792-4c91-b4d9-b8c2d202747e)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-68444b4b45-l4vgc_calico-apiserver(965767b7-1792-4c91-b4d9-b8c2d202747e)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"f14ba2115524ea20392546b4b007b25bca35212c09d8bc580b78280805199eaf\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-68444b4b45-l4vgc" podUID="965767b7-1792-4c91-b4d9-b8c2d202747e" May 17 00:35:08.527134 env[1212]: time="2025-05-17T00:35:08.527064345Z" level=error msg="Failed to destroy network for sandbox \"67f1562eb02da319fa4fd938337ef3a583cef2fe3e70af43746166b722e25914\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:08.535394 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-67f1562eb02da319fa4fd938337ef3a583cef2fe3e70af43746166b722e25914-shm.mount: Deactivated successfully. May 17 00:35:08.538729 env[1212]: time="2025-05-17T00:35:08.538658953Z" level=error msg="encountered an error cleaning up failed sandbox \"67f1562eb02da319fa4fd938337ef3a583cef2fe3e70af43746166b722e25914\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:08.538995 env[1212]: time="2025-05-17T00:35:08.538943188Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-6zjt5,Uid:81c29f47-17e5-4770-9231-d763d86cc377,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"67f1562eb02da319fa4fd938337ef3a583cef2fe3e70af43746166b722e25914\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:08.539437 kubelet[2012]: E0517 00:35:08.539382 2012 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"67f1562eb02da319fa4fd938337ef3a583cef2fe3e70af43746166b722e25914\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:08.539595 kubelet[2012]: E0517 00:35:08.539485 2012 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"67f1562eb02da319fa4fd938337ef3a583cef2fe3e70af43746166b722e25914\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-6zjt5" May 17 00:35:08.539595 kubelet[2012]: E0517 00:35:08.539525 2012 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"67f1562eb02da319fa4fd938337ef3a583cef2fe3e70af43746166b722e25914\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-6zjt5" May 17 00:35:08.539793 kubelet[2012]: E0517 00:35:08.539591 2012 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-668d6bf9bc-6zjt5_kube-system(81c29f47-17e5-4770-9231-d763d86cc377)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-668d6bf9bc-6zjt5_kube-system(81c29f47-17e5-4770-9231-d763d86cc377)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"67f1562eb02da319fa4fd938337ef3a583cef2fe3e70af43746166b722e25914\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-6zjt5" podUID="81c29f47-17e5-4770-9231-d763d86cc377" May 17 00:35:08.562935 env[1212]: time="2025-05-17T00:35:08.562861632Z" level=error msg="Failed to destroy network for sandbox \"0bcf44e68d1237e0478c4818c985fe24d782e0d7dc964b90b8545553594addc8\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:08.570224 env[1212]: time="2025-05-17T00:35:08.563347966Z" level=error msg="encountered an error cleaning up failed sandbox \"0bcf44e68d1237e0478c4818c985fe24d782e0d7dc964b90b8545553594addc8\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:08.570224 env[1212]: time="2025-05-17T00:35:08.563472096Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5dfd77fb7d-55blf,Uid:fd78bca1-b6af-4311-93c6-d48694e45dc4,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"0bcf44e68d1237e0478c4818c985fe24d782e0d7dc964b90b8545553594addc8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:08.567499 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-0bcf44e68d1237e0478c4818c985fe24d782e0d7dc964b90b8545553594addc8-shm.mount: Deactivated successfully. May 17 00:35:08.571728 kubelet[2012]: E0517 00:35:08.563710 2012 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0bcf44e68d1237e0478c4818c985fe24d782e0d7dc964b90b8545553594addc8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:08.571728 kubelet[2012]: E0517 00:35:08.563779 2012 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0bcf44e68d1237e0478c4818c985fe24d782e0d7dc964b90b8545553594addc8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-5dfd77fb7d-55blf" May 17 00:35:08.571728 kubelet[2012]: E0517 00:35:08.563810 2012 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0bcf44e68d1237e0478c4818c985fe24d782e0d7dc964b90b8545553594addc8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-5dfd77fb7d-55blf" May 17 00:35:08.572083 kubelet[2012]: E0517 00:35:08.563866 2012 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-5dfd77fb7d-55blf_calico-system(fd78bca1-b6af-4311-93c6-d48694e45dc4)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-5dfd77fb7d-55blf_calico-system(fd78bca1-b6af-4311-93c6-d48694e45dc4)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"0bcf44e68d1237e0478c4818c985fe24d782e0d7dc964b90b8545553594addc8\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5dfd77fb7d-55blf" podUID="fd78bca1-b6af-4311-93c6-d48694e45dc4" May 17 00:35:08.591663 env[1212]: time="2025-05-17T00:35:08.591576887Z" level=error msg="Failed to destroy network for sandbox \"00abf7b6297ce5a7553f42c1fa6a13245c90242046f7dcfe927acc6b856f3689\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:08.595621 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-00abf7b6297ce5a7553f42c1fa6a13245c90242046f7dcfe927acc6b856f3689-shm.mount: Deactivated successfully. May 17 00:35:08.601410 env[1212]: time="2025-05-17T00:35:08.598096690Z" level=error msg="encountered an error cleaning up failed sandbox \"00abf7b6297ce5a7553f42c1fa6a13245c90242046f7dcfe927acc6b856f3689\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:08.601410 env[1212]: time="2025-05-17T00:35:08.598196449Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-68444b4b45-r6srh,Uid:908a611b-ce73-4141-bc04-98329eaa22ef,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"00abf7b6297ce5a7553f42c1fa6a13245c90242046f7dcfe927acc6b856f3689\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:08.603738 kubelet[2012]: E0517 00:35:08.601820 2012 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"00abf7b6297ce5a7553f42c1fa6a13245c90242046f7dcfe927acc6b856f3689\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:08.603738 kubelet[2012]: E0517 00:35:08.602041 2012 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"00abf7b6297ce5a7553f42c1fa6a13245c90242046f7dcfe927acc6b856f3689\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-68444b4b45-r6srh" May 17 00:35:08.603738 kubelet[2012]: E0517 00:35:08.602080 2012 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"00abf7b6297ce5a7553f42c1fa6a13245c90242046f7dcfe927acc6b856f3689\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-68444b4b45-r6srh" May 17 00:35:08.604032 kubelet[2012]: E0517 00:35:08.602235 2012 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-68444b4b45-r6srh_calico-apiserver(908a611b-ce73-4141-bc04-98329eaa22ef)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-68444b4b45-r6srh_calico-apiserver(908a611b-ce73-4141-bc04-98329eaa22ef)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"00abf7b6297ce5a7553f42c1fa6a13245c90242046f7dcfe927acc6b856f3689\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-68444b4b45-r6srh" podUID="908a611b-ce73-4141-bc04-98329eaa22ef" May 17 00:35:08.606684 env[1212]: time="2025-05-17T00:35:08.606620617Z" level=error msg="Failed to destroy network for sandbox \"7eccfb45669ec6645d158891b10a770ecdedbe69d219b47e4d21a3e9c0413b0d\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:08.610494 env[1212]: time="2025-05-17T00:35:08.607106107Z" level=error msg="encountered an error cleaning up failed sandbox \"7eccfb45669ec6645d158891b10a770ecdedbe69d219b47e4d21a3e9c0413b0d\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:08.610494 env[1212]: time="2025-05-17T00:35:08.607195687Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-78d55f7ddc-8tw2k,Uid:6fdee754-80af-4193-bcf6-93825e6ce6df,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"7eccfb45669ec6645d158891b10a770ecdedbe69d219b47e4d21a3e9c0413b0d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:08.610691 kubelet[2012]: E0517 00:35:08.608628 2012 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7eccfb45669ec6645d158891b10a770ecdedbe69d219b47e4d21a3e9c0413b0d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:08.610691 kubelet[2012]: E0517 00:35:08.608708 2012 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7eccfb45669ec6645d158891b10a770ecdedbe69d219b47e4d21a3e9c0413b0d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-78d55f7ddc-8tw2k" May 17 00:35:08.610691 kubelet[2012]: E0517 00:35:08.608776 2012 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7eccfb45669ec6645d158891b10a770ecdedbe69d219b47e4d21a3e9c0413b0d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-78d55f7ddc-8tw2k" May 17 00:35:08.610584 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-7eccfb45669ec6645d158891b10a770ecdedbe69d219b47e4d21a3e9c0413b0d-shm.mount: Deactivated successfully. May 17 00:35:08.610989 kubelet[2012]: E0517 00:35:08.608848 2012 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"goldmane-78d55f7ddc-8tw2k_calico-system(6fdee754-80af-4193-bcf6-93825e6ce6df)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"goldmane-78d55f7ddc-8tw2k_calico-system(6fdee754-80af-4193-bcf6-93825e6ce6df)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"7eccfb45669ec6645d158891b10a770ecdedbe69d219b47e4d21a3e9c0413b0d\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-78d55f7ddc-8tw2k" podUID="6fdee754-80af-4193-bcf6-93825e6ce6df" May 17 00:35:08.685771 kubelet[2012]: E0517 00:35:08.685650 2012 secret.go:189] Couldn't get secret calico-system/whisker-backend-key-pair: failed to sync secret cache: timed out waiting for the condition May 17 00:35:08.686242 kubelet[2012]: E0517 00:35:08.686211 2012 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/a0dc23c7-a960-467c-add4-219d6ae8364b-whisker-backend-key-pair podName:a0dc23c7-a960-467c-add4-219d6ae8364b nodeName:}" failed. No retries permitted until 2025-05-17 00:35:09.186181893 +0000 UTC m=+31.867327278 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "whisker-backend-key-pair" (UniqueName: "kubernetes.io/secret/a0dc23c7-a960-467c-add4-219d6ae8364b-whisker-backend-key-pair") pod "whisker-84fff46d56-dqntj" (UID: "a0dc23c7-a960-467c-add4-219d6ae8364b") : failed to sync secret cache: timed out waiting for the condition May 17 00:35:08.742050 kubelet[2012]: I0517 00:35:08.742012 2012 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="32cc285900e6dcd205b9f41d7d3f2e75a044bfcd11a475e4197aa67f0a1085c6" May 17 00:35:08.742866 env[1212]: time="2025-05-17T00:35:08.742812980Z" level=info msg="StopPodSandbox for \"32cc285900e6dcd205b9f41d7d3f2e75a044bfcd11a475e4197aa67f0a1085c6\"" May 17 00:35:08.749552 kubelet[2012]: I0517 00:35:08.747993 2012 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="f14ba2115524ea20392546b4b007b25bca35212c09d8bc580b78280805199eaf" May 17 00:35:08.754394 env[1212]: time="2025-05-17T00:35:08.754198861Z" level=info msg="StopPodSandbox for \"f14ba2115524ea20392546b4b007b25bca35212c09d8bc580b78280805199eaf\"" May 17 00:35:08.759481 kubelet[2012]: I0517 00:35:08.758564 2012 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="00abf7b6297ce5a7553f42c1fa6a13245c90242046f7dcfe927acc6b856f3689" May 17 00:35:08.768034 kubelet[2012]: I0517 00:35:08.765560 2012 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="67f1562eb02da319fa4fd938337ef3a583cef2fe3e70af43746166b722e25914" May 17 00:35:08.768666 env[1212]: time="2025-05-17T00:35:08.768610339Z" level=info msg="StopPodSandbox for \"67f1562eb02da319fa4fd938337ef3a583cef2fe3e70af43746166b722e25914\"" May 17 00:35:08.770471 env[1212]: time="2025-05-17T00:35:08.761416627Z" level=info msg="StopPodSandbox for \"00abf7b6297ce5a7553f42c1fa6a13245c90242046f7dcfe927acc6b856f3689\"" May 17 00:35:08.777972 kubelet[2012]: I0517 00:35:08.775131 2012 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="7eccfb45669ec6645d158891b10a770ecdedbe69d219b47e4d21a3e9c0413b0d" May 17 00:35:08.778244 env[1212]: time="2025-05-17T00:35:08.776091039Z" level=info msg="StopPodSandbox for \"7eccfb45669ec6645d158891b10a770ecdedbe69d219b47e4d21a3e9c0413b0d\"" May 17 00:35:08.799220 env[1212]: time="2025-05-17T00:35:08.799174859Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.0\"" May 17 00:35:08.804334 kubelet[2012]: I0517 00:35:08.803874 2012 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="0bcf44e68d1237e0478c4818c985fe24d782e0d7dc964b90b8545553594addc8" May 17 00:35:08.804849 env[1212]: time="2025-05-17T00:35:08.804788475Z" level=info msg="StopPodSandbox for \"0bcf44e68d1237e0478c4818c985fe24d782e0d7dc964b90b8545553594addc8\"" May 17 00:35:08.812628 kubelet[2012]: I0517 00:35:08.812106 2012 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="ae6f816b5036db3784b9a7d5e70abd4eee780e7fed3ae1db3d7f7c255a52a286" May 17 00:35:08.813050 env[1212]: time="2025-05-17T00:35:08.813012424Z" level=info msg="StopPodSandbox for \"ae6f816b5036db3784b9a7d5e70abd4eee780e7fed3ae1db3d7f7c255a52a286\"" May 17 00:35:08.854530 env[1212]: time="2025-05-17T00:35:08.854453930Z" level=error msg="StopPodSandbox for \"f14ba2115524ea20392546b4b007b25bca35212c09d8bc580b78280805199eaf\" failed" error="failed to destroy network for sandbox \"f14ba2115524ea20392546b4b007b25bca35212c09d8bc580b78280805199eaf\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:08.855144 kubelet[2012]: E0517 00:35:08.855090 2012 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f14ba2115524ea20392546b4b007b25bca35212c09d8bc580b78280805199eaf\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f14ba2115524ea20392546b4b007b25bca35212c09d8bc580b78280805199eaf" May 17 00:35:08.855334 kubelet[2012]: E0517 00:35:08.855196 2012 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"f14ba2115524ea20392546b4b007b25bca35212c09d8bc580b78280805199eaf"} May 17 00:35:08.855432 kubelet[2012]: E0517 00:35:08.855400 2012 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"965767b7-1792-4c91-b4d9-b8c2d202747e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f14ba2115524ea20392546b4b007b25bca35212c09d8bc580b78280805199eaf\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:35:08.855575 kubelet[2012]: E0517 00:35:08.855446 2012 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"965767b7-1792-4c91-b4d9-b8c2d202747e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f14ba2115524ea20392546b4b007b25bca35212c09d8bc580b78280805199eaf\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-68444b4b45-l4vgc" podUID="965767b7-1792-4c91-b4d9-b8c2d202747e" May 17 00:35:08.885900 env[1212]: time="2025-05-17T00:35:08.885820522Z" level=error msg="StopPodSandbox for \"32cc285900e6dcd205b9f41d7d3f2e75a044bfcd11a475e4197aa67f0a1085c6\" failed" error="failed to destroy network for sandbox \"32cc285900e6dcd205b9f41d7d3f2e75a044bfcd11a475e4197aa67f0a1085c6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:08.886438 kubelet[2012]: E0517 00:35:08.886374 2012 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"32cc285900e6dcd205b9f41d7d3f2e75a044bfcd11a475e4197aa67f0a1085c6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="32cc285900e6dcd205b9f41d7d3f2e75a044bfcd11a475e4197aa67f0a1085c6" May 17 00:35:08.886610 kubelet[2012]: E0517 00:35:08.886459 2012 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"32cc285900e6dcd205b9f41d7d3f2e75a044bfcd11a475e4197aa67f0a1085c6"} May 17 00:35:08.886610 kubelet[2012]: E0517 00:35:08.886507 2012 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"0b840cb1-eedd-48bf-b8ec-581041390cbc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"32cc285900e6dcd205b9f41d7d3f2e75a044bfcd11a475e4197aa67f0a1085c6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:35:08.886610 kubelet[2012]: E0517 00:35:08.886541 2012 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"0b840cb1-eedd-48bf-b8ec-581041390cbc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"32cc285900e6dcd205b9f41d7d3f2e75a044bfcd11a475e4197aa67f0a1085c6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-6kzm4" podUID="0b840cb1-eedd-48bf-b8ec-581041390cbc" May 17 00:35:08.970774 env[1212]: time="2025-05-17T00:35:08.970598962Z" level=error msg="StopPodSandbox for \"0bcf44e68d1237e0478c4818c985fe24d782e0d7dc964b90b8545553594addc8\" failed" error="failed to destroy network for sandbox \"0bcf44e68d1237e0478c4818c985fe24d782e0d7dc964b90b8545553594addc8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:08.972011 kubelet[2012]: E0517 00:35:08.971747 2012 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"0bcf44e68d1237e0478c4818c985fe24d782e0d7dc964b90b8545553594addc8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="0bcf44e68d1237e0478c4818c985fe24d782e0d7dc964b90b8545553594addc8" May 17 00:35:08.972011 kubelet[2012]: E0517 00:35:08.971829 2012 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"0bcf44e68d1237e0478c4818c985fe24d782e0d7dc964b90b8545553594addc8"} May 17 00:35:08.972011 kubelet[2012]: E0517 00:35:08.971903 2012 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"fd78bca1-b6af-4311-93c6-d48694e45dc4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0bcf44e68d1237e0478c4818c985fe24d782e0d7dc964b90b8545553594addc8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:35:08.972011 kubelet[2012]: E0517 00:35:08.971946 2012 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"fd78bca1-b6af-4311-93c6-d48694e45dc4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0bcf44e68d1237e0478c4818c985fe24d782e0d7dc964b90b8545553594addc8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5dfd77fb7d-55blf" podUID="fd78bca1-b6af-4311-93c6-d48694e45dc4" May 17 00:35:08.983538 env[1212]: time="2025-05-17T00:35:08.983469417Z" level=error msg="StopPodSandbox for \"67f1562eb02da319fa4fd938337ef3a583cef2fe3e70af43746166b722e25914\" failed" error="failed to destroy network for sandbox \"67f1562eb02da319fa4fd938337ef3a583cef2fe3e70af43746166b722e25914\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:08.984115 kubelet[2012]: E0517 00:35:08.984048 2012 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"67f1562eb02da319fa4fd938337ef3a583cef2fe3e70af43746166b722e25914\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="67f1562eb02da319fa4fd938337ef3a583cef2fe3e70af43746166b722e25914" May 17 00:35:08.984281 kubelet[2012]: E0517 00:35:08.984130 2012 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"67f1562eb02da319fa4fd938337ef3a583cef2fe3e70af43746166b722e25914"} May 17 00:35:08.984281 kubelet[2012]: E0517 00:35:08.984211 2012 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"81c29f47-17e5-4770-9231-d763d86cc377\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"67f1562eb02da319fa4fd938337ef3a583cef2fe3e70af43746166b722e25914\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:35:08.984281 kubelet[2012]: E0517 00:35:08.984247 2012 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"81c29f47-17e5-4770-9231-d763d86cc377\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"67f1562eb02da319fa4fd938337ef3a583cef2fe3e70af43746166b722e25914\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-6zjt5" podUID="81c29f47-17e5-4770-9231-d763d86cc377" May 17 00:35:08.988819 env[1212]: time="2025-05-17T00:35:08.988750494Z" level=error msg="StopPodSandbox for \"ae6f816b5036db3784b9a7d5e70abd4eee780e7fed3ae1db3d7f7c255a52a286\" failed" error="failed to destroy network for sandbox \"ae6f816b5036db3784b9a7d5e70abd4eee780e7fed3ae1db3d7f7c255a52a286\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:08.989058 kubelet[2012]: E0517 00:35:08.989001 2012 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"ae6f816b5036db3784b9a7d5e70abd4eee780e7fed3ae1db3d7f7c255a52a286\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="ae6f816b5036db3784b9a7d5e70abd4eee780e7fed3ae1db3d7f7c255a52a286" May 17 00:35:08.989171 kubelet[2012]: E0517 00:35:08.989069 2012 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"ae6f816b5036db3784b9a7d5e70abd4eee780e7fed3ae1db3d7f7c255a52a286"} May 17 00:35:08.989171 kubelet[2012]: E0517 00:35:08.989133 2012 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"9a0b64da-0bec-4455-813d-7708414d174b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ae6f816b5036db3784b9a7d5e70abd4eee780e7fed3ae1db3d7f7c255a52a286\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:35:08.989493 kubelet[2012]: E0517 00:35:08.989166 2012 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"9a0b64da-0bec-4455-813d-7708414d174b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ae6f816b5036db3784b9a7d5e70abd4eee780e7fed3ae1db3d7f7c255a52a286\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-kpjdk" podUID="9a0b64da-0bec-4455-813d-7708414d174b" May 17 00:35:08.989622 env[1212]: time="2025-05-17T00:35:08.989314727Z" level=error msg="StopPodSandbox for \"00abf7b6297ce5a7553f42c1fa6a13245c90242046f7dcfe927acc6b856f3689\" failed" error="failed to destroy network for sandbox \"00abf7b6297ce5a7553f42c1fa6a13245c90242046f7dcfe927acc6b856f3689\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:08.989709 kubelet[2012]: E0517 00:35:08.989559 2012 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"00abf7b6297ce5a7553f42c1fa6a13245c90242046f7dcfe927acc6b856f3689\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="00abf7b6297ce5a7553f42c1fa6a13245c90242046f7dcfe927acc6b856f3689" May 17 00:35:08.989709 kubelet[2012]: E0517 00:35:08.989613 2012 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"00abf7b6297ce5a7553f42c1fa6a13245c90242046f7dcfe927acc6b856f3689"} May 17 00:35:08.989709 kubelet[2012]: E0517 00:35:08.989652 2012 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"908a611b-ce73-4141-bc04-98329eaa22ef\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"00abf7b6297ce5a7553f42c1fa6a13245c90242046f7dcfe927acc6b856f3689\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:35:08.989917 kubelet[2012]: E0517 00:35:08.989716 2012 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"908a611b-ce73-4141-bc04-98329eaa22ef\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"00abf7b6297ce5a7553f42c1fa6a13245c90242046f7dcfe927acc6b856f3689\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-68444b4b45-r6srh" podUID="908a611b-ce73-4141-bc04-98329eaa22ef" May 17 00:35:09.006078 env[1212]: time="2025-05-17T00:35:09.005980322Z" level=error msg="StopPodSandbox for \"7eccfb45669ec6645d158891b10a770ecdedbe69d219b47e4d21a3e9c0413b0d\" failed" error="failed to destroy network for sandbox \"7eccfb45669ec6645d158891b10a770ecdedbe69d219b47e4d21a3e9c0413b0d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:09.007183 kubelet[2012]: E0517 00:35:09.007114 2012 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"7eccfb45669ec6645d158891b10a770ecdedbe69d219b47e4d21a3e9c0413b0d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="7eccfb45669ec6645d158891b10a770ecdedbe69d219b47e4d21a3e9c0413b0d" May 17 00:35:09.007309 kubelet[2012]: E0517 00:35:09.007190 2012 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"7eccfb45669ec6645d158891b10a770ecdedbe69d219b47e4d21a3e9c0413b0d"} May 17 00:35:09.007309 kubelet[2012]: E0517 00:35:09.007240 2012 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"6fdee754-80af-4193-bcf6-93825e6ce6df\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7eccfb45669ec6645d158891b10a770ecdedbe69d219b47e4d21a3e9c0413b0d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:35:09.007309 kubelet[2012]: E0517 00:35:09.007294 2012 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"6fdee754-80af-4193-bcf6-93825e6ce6df\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7eccfb45669ec6645d158891b10a770ecdedbe69d219b47e4d21a3e9c0413b0d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-78d55f7ddc-8tw2k" podUID="6fdee754-80af-4193-bcf6-93825e6ce6df" May 17 00:35:09.337577 env[1212]: time="2025-05-17T00:35:09.337521748Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-84fff46d56-dqntj,Uid:a0dc23c7-a960-467c-add4-219d6ae8364b,Namespace:calico-system,Attempt:0,}" May 17 00:35:09.426180 env[1212]: time="2025-05-17T00:35:09.426108778Z" level=error msg="Failed to destroy network for sandbox \"c1a481d13254c4e8710ceefc02b6916ba1ddd857c222b6cd383453c4f3ebd596\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:09.429823 env[1212]: time="2025-05-17T00:35:09.429750422Z" level=error msg="encountered an error cleaning up failed sandbox \"c1a481d13254c4e8710ceefc02b6916ba1ddd857c222b6cd383453c4f3ebd596\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:09.430102 env[1212]: time="2025-05-17T00:35:09.430037694Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-84fff46d56-dqntj,Uid:a0dc23c7-a960-467c-add4-219d6ae8364b,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"c1a481d13254c4e8710ceefc02b6916ba1ddd857c222b6cd383453c4f3ebd596\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:09.430425 kubelet[2012]: E0517 00:35:09.430350 2012 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c1a481d13254c4e8710ceefc02b6916ba1ddd857c222b6cd383453c4f3ebd596\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:09.430585 kubelet[2012]: E0517 00:35:09.430462 2012 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c1a481d13254c4e8710ceefc02b6916ba1ddd857c222b6cd383453c4f3ebd596\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-84fff46d56-dqntj" May 17 00:35:09.430585 kubelet[2012]: E0517 00:35:09.430530 2012 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c1a481d13254c4e8710ceefc02b6916ba1ddd857c222b6cd383453c4f3ebd596\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-84fff46d56-dqntj" May 17 00:35:09.430711 kubelet[2012]: E0517 00:35:09.430596 2012 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"whisker-84fff46d56-dqntj_calico-system(a0dc23c7-a960-467c-add4-219d6ae8364b)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"whisker-84fff46d56-dqntj_calico-system(a0dc23c7-a960-467c-add4-219d6ae8364b)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"c1a481d13254c4e8710ceefc02b6916ba1ddd857c222b6cd383453c4f3ebd596\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-84fff46d56-dqntj" podUID="a0dc23c7-a960-467c-add4-219d6ae8364b" May 17 00:35:09.827186 kubelet[2012]: I0517 00:35:09.825656 2012 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="c1a481d13254c4e8710ceefc02b6916ba1ddd857c222b6cd383453c4f3ebd596" May 17 00:35:09.829460 env[1212]: time="2025-05-17T00:35:09.829383559Z" level=info msg="StopPodSandbox for \"c1a481d13254c4e8710ceefc02b6916ba1ddd857c222b6cd383453c4f3ebd596\"" May 17 00:35:09.888011 env[1212]: time="2025-05-17T00:35:09.887933424Z" level=error msg="StopPodSandbox for \"c1a481d13254c4e8710ceefc02b6916ba1ddd857c222b6cd383453c4f3ebd596\" failed" error="failed to destroy network for sandbox \"c1a481d13254c4e8710ceefc02b6916ba1ddd857c222b6cd383453c4f3ebd596\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:09.888345 kubelet[2012]: E0517 00:35:09.888269 2012 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c1a481d13254c4e8710ceefc02b6916ba1ddd857c222b6cd383453c4f3ebd596\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c1a481d13254c4e8710ceefc02b6916ba1ddd857c222b6cd383453c4f3ebd596" May 17 00:35:09.888535 kubelet[2012]: E0517 00:35:09.888392 2012 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"c1a481d13254c4e8710ceefc02b6916ba1ddd857c222b6cd383453c4f3ebd596"} May 17 00:35:09.888535 kubelet[2012]: E0517 00:35:09.888472 2012 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a0dc23c7-a960-467c-add4-219d6ae8364b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c1a481d13254c4e8710ceefc02b6916ba1ddd857c222b6cd383453c4f3ebd596\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:35:09.888704 kubelet[2012]: E0517 00:35:09.888517 2012 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a0dc23c7-a960-467c-add4-219d6ae8364b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c1a481d13254c4e8710ceefc02b6916ba1ddd857c222b6cd383453c4f3ebd596\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-84fff46d56-dqntj" podUID="a0dc23c7-a960-467c-add4-219d6ae8364b" May 17 00:35:16.077479 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2745672866.mount: Deactivated successfully. May 17 00:35:16.117001 env[1212]: time="2025-05-17T00:35:16.116924989Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:16.119827 env[1212]: time="2025-05-17T00:35:16.119776368Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d12dae9bc0999225efe30fd5618bcf2195709d54ed2840234f5006aab5f7d721,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:16.121809 env[1212]: time="2025-05-17T00:35:16.121772065Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:16.123912 env[1212]: time="2025-05-17T00:35:16.123871848Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:7cb61ea47ca0a8e6d0526a42da4f1e399b37ccd13339d0776d272465cb7ee012,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:16.124594 env[1212]: time="2025-05-17T00:35:16.124547681Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.0\" returns image reference \"sha256:d12dae9bc0999225efe30fd5618bcf2195709d54ed2840234f5006aab5f7d721\"" May 17 00:35:16.147667 env[1212]: time="2025-05-17T00:35:16.147596937Z" level=info msg="CreateContainer within sandbox \"bbee6d9105c2ba61b25b43fef4fbd8c25fe2e22c6bea1c16214f50bc58ae2ed9\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 17 00:35:16.172670 env[1212]: time="2025-05-17T00:35:16.172598112Z" level=info msg="CreateContainer within sandbox \"bbee6d9105c2ba61b25b43fef4fbd8c25fe2e22c6bea1c16214f50bc58ae2ed9\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"86937f2fa6aea780273f5e3ebb4de50aad612e8544bc0cd4da674142b77a9c46\"" May 17 00:35:16.173703 env[1212]: time="2025-05-17T00:35:16.173661208Z" level=info msg="StartContainer for \"86937f2fa6aea780273f5e3ebb4de50aad612e8544bc0cd4da674142b77a9c46\"" May 17 00:35:16.201757 systemd[1]: Started cri-containerd-86937f2fa6aea780273f5e3ebb4de50aad612e8544bc0cd4da674142b77a9c46.scope. May 17 00:35:16.258816 kernel: kauditd_printk_skb: 34 callbacks suppressed May 17 00:35:16.259014 kernel: audit: type=1400 audit(1747442116.232:984): avc: denied { perfmon } for pid=3169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:16.232000 audit[3169]: AVC avc: denied { perfmon } for pid=3169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:16.291878 kernel: audit: type=1300 audit(1747442116.232:984): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f1cb5f67778 items=0 ppid=2561 pid=3169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:16.232000 audit[3169]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f1cb5f67778 items=0 ppid=2561 pid=3169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:16.320956 kernel: audit: type=1327 audit(1747442116.232:984): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836393337663266613661656137383032373366356533656262346465 May 17 00:35:16.232000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836393337663266613661656137383032373366356533656262346465 May 17 00:35:16.232000 audit[3169]: AVC avc: denied { bpf } for pid=3169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:16.362343 kernel: audit: type=1400 audit(1747442116.232:985): avc: denied { bpf } for pid=3169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:16.362525 kernel: audit: type=1400 audit(1747442116.232:985): avc: denied { bpf } for pid=3169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:16.232000 audit[3169]: AVC avc: denied { bpf } for pid=3169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:16.232000 audit[3169]: AVC avc: denied { bpf } for pid=3169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:16.389459 kernel: audit: type=1400 audit(1747442116.232:985): avc: denied { bpf } for pid=3169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:16.410573 kernel: audit: type=1400 audit(1747442116.232:985): avc: denied { perfmon } for pid=3169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:16.232000 audit[3169]: AVC avc: denied { perfmon } for pid=3169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:16.232000 audit[3169]: AVC avc: denied { perfmon } for pid=3169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:16.425998 env[1212]: time="2025-05-17T00:35:16.425927676Z" level=info msg="StartContainer for \"86937f2fa6aea780273f5e3ebb4de50aad612e8544bc0cd4da674142b77a9c46\" returns successfully" May 17 00:35:16.432049 kernel: audit: type=1400 audit(1747442116.232:985): avc: denied { perfmon } for pid=3169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:16.232000 audit[3169]: AVC avc: denied { perfmon } for pid=3169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:16.232000 audit[3169]: AVC avc: denied { perfmon } for pid=3169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:16.474934 kernel: audit: type=1400 audit(1747442116.232:985): avc: denied { perfmon } for pid=3169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:16.475099 kernel: audit: type=1400 audit(1747442116.232:985): avc: denied { perfmon } for pid=3169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:16.232000 audit[3169]: AVC avc: denied { perfmon } for pid=3169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:16.232000 audit[3169]: AVC avc: denied { bpf } for pid=3169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:16.232000 audit[3169]: AVC avc: denied { bpf } for pid=3169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:16.232000 audit: BPF prog-id=136 op=LOAD May 17 00:35:16.232000 audit[3169]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0003b6238 items=0 ppid=2561 pid=3169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:16.232000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836393337663266613661656137383032373366356533656262346465 May 17 00:35:16.258000 audit[3169]: AVC avc: denied { bpf } for pid=3169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:16.258000 audit[3169]: AVC avc: denied { bpf } for pid=3169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:16.258000 audit[3169]: AVC avc: denied { perfmon } for pid=3169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:16.258000 audit[3169]: AVC avc: denied { perfmon } for pid=3169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:16.258000 audit[3169]: AVC avc: denied { perfmon } for pid=3169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:16.258000 audit[3169]: AVC avc: denied { perfmon } for pid=3169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:16.258000 audit[3169]: AVC avc: denied { perfmon } for pid=3169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:16.258000 audit[3169]: AVC avc: denied { bpf } for pid=3169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:16.258000 audit[3169]: AVC avc: denied { bpf } for pid=3169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:16.258000 audit: BPF prog-id=137 op=LOAD May 17 00:35:16.258000 audit[3169]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0003b6288 items=0 ppid=2561 pid=3169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:16.258000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836393337663266613661656137383032373366356533656262346465 May 17 00:35:16.291000 audit: BPF prog-id=137 op=UNLOAD May 17 00:35:16.291000 audit: BPF prog-id=136 op=UNLOAD May 17 00:35:16.292000 audit[3169]: AVC avc: denied { bpf } for pid=3169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:16.292000 audit[3169]: AVC avc: denied { bpf } for pid=3169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:16.292000 audit[3169]: AVC avc: denied { bpf } for pid=3169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:16.292000 audit[3169]: AVC avc: denied { perfmon } for pid=3169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:16.292000 audit[3169]: AVC avc: denied { perfmon } for pid=3169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:16.292000 audit[3169]: AVC avc: denied { perfmon } for pid=3169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:16.292000 audit[3169]: AVC avc: denied { perfmon } for pid=3169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:16.292000 audit[3169]: AVC avc: denied { perfmon } for pid=3169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:16.292000 audit[3169]: AVC avc: denied { bpf } for pid=3169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:16.292000 audit[3169]: AVC avc: denied { bpf } for pid=3169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:16.292000 audit: BPF prog-id=138 op=LOAD May 17 00:35:16.292000 audit[3169]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003b6318 items=0 ppid=2561 pid=3169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:16.292000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836393337663266613661656137383032373366356533656262346465 May 17 00:35:16.546338 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 17 00:35:16.546562 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 17 00:35:16.780806 env[1212]: time="2025-05-17T00:35:16.780668501Z" level=info msg="StopPodSandbox for \"c1a481d13254c4e8710ceefc02b6916ba1ddd857c222b6cd383453c4f3ebd596\"" May 17 00:35:16.919463 kubelet[2012]: I0517 00:35:16.919348 2012 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-nzf4z" podStartSLOduration=2.876811213 podStartE2EDuration="18.919318549s" podCreationTimestamp="2025-05-17 00:34:58 +0000 UTC" firstStartedPulling="2025-05-17 00:35:00.083288209 +0000 UTC m=+22.764433579" lastFinishedPulling="2025-05-17 00:35:16.125795533 +0000 UTC m=+38.806940915" observedRunningTime="2025-05-17 00:35:16.888200069 +0000 UTC m=+39.569345453" watchObservedRunningTime="2025-05-17 00:35:16.919318549 +0000 UTC m=+39.600463935" May 17 00:35:16.998351 env[1212]: 2025-05-17 00:35:16.921 [INFO][3218] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="c1a481d13254c4e8710ceefc02b6916ba1ddd857c222b6cd383453c4f3ebd596" May 17 00:35:16.998351 env[1212]: 2025-05-17 00:35:16.921 [INFO][3218] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="c1a481d13254c4e8710ceefc02b6916ba1ddd857c222b6cd383453c4f3ebd596" iface="eth0" netns="/var/run/netns/cni-37ae385d-0578-5b7d-c8cc-564552b54b5b" May 17 00:35:16.998351 env[1212]: 2025-05-17 00:35:16.921 [INFO][3218] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="c1a481d13254c4e8710ceefc02b6916ba1ddd857c222b6cd383453c4f3ebd596" iface="eth0" netns="/var/run/netns/cni-37ae385d-0578-5b7d-c8cc-564552b54b5b" May 17 00:35:16.998351 env[1212]: 2025-05-17 00:35:16.922 [INFO][3218] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="c1a481d13254c4e8710ceefc02b6916ba1ddd857c222b6cd383453c4f3ebd596" iface="eth0" netns="/var/run/netns/cni-37ae385d-0578-5b7d-c8cc-564552b54b5b" May 17 00:35:16.998351 env[1212]: 2025-05-17 00:35:16.922 [INFO][3218] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="c1a481d13254c4e8710ceefc02b6916ba1ddd857c222b6cd383453c4f3ebd596" May 17 00:35:16.998351 env[1212]: 2025-05-17 00:35:16.922 [INFO][3218] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c1a481d13254c4e8710ceefc02b6916ba1ddd857c222b6cd383453c4f3ebd596" May 17 00:35:16.998351 env[1212]: 2025-05-17 00:35:16.965 [INFO][3230] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c1a481d13254c4e8710ceefc02b6916ba1ddd857c222b6cd383453c4f3ebd596" HandleID="k8s-pod-network.c1a481d13254c4e8710ceefc02b6916ba1ddd857c222b6cd383453c4f3ebd596" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-whisker--84fff46d56--dqntj-eth0" May 17 00:35:16.998351 env[1212]: 2025-05-17 00:35:16.966 [INFO][3230] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:35:16.998351 env[1212]: 2025-05-17 00:35:16.966 [INFO][3230] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:35:16.998351 env[1212]: 2025-05-17 00:35:16.985 [WARNING][3230] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c1a481d13254c4e8710ceefc02b6916ba1ddd857c222b6cd383453c4f3ebd596" HandleID="k8s-pod-network.c1a481d13254c4e8710ceefc02b6916ba1ddd857c222b6cd383453c4f3ebd596" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-whisker--84fff46d56--dqntj-eth0" May 17 00:35:16.998351 env[1212]: 2025-05-17 00:35:16.986 [INFO][3230] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c1a481d13254c4e8710ceefc02b6916ba1ddd857c222b6cd383453c4f3ebd596" HandleID="k8s-pod-network.c1a481d13254c4e8710ceefc02b6916ba1ddd857c222b6cd383453c4f3ebd596" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-whisker--84fff46d56--dqntj-eth0" May 17 00:35:16.998351 env[1212]: 2025-05-17 00:35:16.988 [INFO][3230] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:35:16.998351 env[1212]: 2025-05-17 00:35:16.995 [INFO][3218] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="c1a481d13254c4e8710ceefc02b6916ba1ddd857c222b6cd383453c4f3ebd596" May 17 00:35:16.999244 env[1212]: time="2025-05-17T00:35:16.998814340Z" level=info msg="TearDown network for sandbox \"c1a481d13254c4e8710ceefc02b6916ba1ddd857c222b6cd383453c4f3ebd596\" successfully" May 17 00:35:16.999244 env[1212]: time="2025-05-17T00:35:16.998868543Z" level=info msg="StopPodSandbox for \"c1a481d13254c4e8710ceefc02b6916ba1ddd857c222b6cd383453c4f3ebd596\" returns successfully" May 17 00:35:17.068759 kubelet[2012]: I0517 00:35:17.068685 2012 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"kube-api-access-ftwkz\" (UniqueName: \"kubernetes.io/projected/a0dc23c7-a960-467c-add4-219d6ae8364b-kube-api-access-ftwkz\") pod \"a0dc23c7-a960-467c-add4-219d6ae8364b\" (UID: \"a0dc23c7-a960-467c-add4-219d6ae8364b\") " May 17 00:35:17.068985 kubelet[2012]: I0517 00:35:17.068774 2012 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/a0dc23c7-a960-467c-add4-219d6ae8364b-whisker-ca-bundle\") pod \"a0dc23c7-a960-467c-add4-219d6ae8364b\" (UID: \"a0dc23c7-a960-467c-add4-219d6ae8364b\") " May 17 00:35:17.068985 kubelet[2012]: I0517 00:35:17.068817 2012 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/a0dc23c7-a960-467c-add4-219d6ae8364b-whisker-backend-key-pair\") pod \"a0dc23c7-a960-467c-add4-219d6ae8364b\" (UID: \"a0dc23c7-a960-467c-add4-219d6ae8364b\") " May 17 00:35:17.077496 kubelet[2012]: I0517 00:35:17.077443 2012 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/a0dc23c7-a960-467c-add4-219d6ae8364b-whisker-backend-key-pair" (OuterVolumeSpecName: "whisker-backend-key-pair") pod "a0dc23c7-a960-467c-add4-219d6ae8364b" (UID: "a0dc23c7-a960-467c-add4-219d6ae8364b"). InnerVolumeSpecName "whisker-backend-key-pair". PluginName "kubernetes.io/secret", VolumeGIDValue "" May 17 00:35:17.078815 kubelet[2012]: I0517 00:35:17.078207 2012 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/a0dc23c7-a960-467c-add4-219d6ae8364b-kube-api-access-ftwkz" (OuterVolumeSpecName: "kube-api-access-ftwkz") pod "a0dc23c7-a960-467c-add4-219d6ae8364b" (UID: "a0dc23c7-a960-467c-add4-219d6ae8364b"). InnerVolumeSpecName "kube-api-access-ftwkz". PluginName "kubernetes.io/projected", VolumeGIDValue "" May 17 00:35:17.079025 kubelet[2012]: I0517 00:35:17.078697 2012 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/a0dc23c7-a960-467c-add4-219d6ae8364b-whisker-ca-bundle" (OuterVolumeSpecName: "whisker-ca-bundle") pod "a0dc23c7-a960-467c-add4-219d6ae8364b" (UID: "a0dc23c7-a960-467c-add4-219d6ae8364b"). InnerVolumeSpecName "whisker-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGIDValue "" May 17 00:35:17.084498 systemd[1]: run-netns-cni\x2d37ae385d\x2d0578\x2d5b7d\x2dc8cc\x2d564552b54b5b.mount: Deactivated successfully. May 17 00:35:17.096273 systemd[1]: var-lib-kubelet-pods-a0dc23c7\x2da960\x2d467c\x2dadd4\x2d219d6ae8364b-volumes-kubernetes.io\x7esecret-whisker\x2dbackend\x2dkey\x2dpair.mount: Deactivated successfully. May 17 00:35:17.096662 systemd[1]: var-lib-kubelet-pods-a0dc23c7\x2da960\x2d467c\x2dadd4\x2d219d6ae8364b-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dftwkz.mount: Deactivated successfully. May 17 00:35:17.169953 kubelet[2012]: I0517 00:35:17.169896 2012 reconciler_common.go:299] "Volume detached for volume \"kube-api-access-ftwkz\" (UniqueName: \"kubernetes.io/projected/a0dc23c7-a960-467c-add4-219d6ae8364b-kube-api-access-ftwkz\") on node \"ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758\" DevicePath \"\"" May 17 00:35:17.169953 kubelet[2012]: I0517 00:35:17.169950 2012 reconciler_common.go:299] "Volume detached for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/a0dc23c7-a960-467c-add4-219d6ae8364b-whisker-ca-bundle\") on node \"ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758\" DevicePath \"\"" May 17 00:35:17.169953 kubelet[2012]: I0517 00:35:17.169968 2012 reconciler_common.go:299] "Volume detached for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/a0dc23c7-a960-467c-add4-219d6ae8364b-whisker-backend-key-pair\") on node \"ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758\" DevicePath \"\"" May 17 00:35:17.613657 systemd[1]: Removed slice kubepods-besteffort-poda0dc23c7_a960_467c_add4_219d6ae8364b.slice. May 17 00:35:17.932921 systemd[1]: Created slice kubepods-besteffort-pod3dcc79a4_50c4_40e3_9eb9_e25e3953688a.slice. May 17 00:35:17.976928 kubelet[2012]: I0517 00:35:17.976871 2012 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/3dcc79a4-50c4-40e3-9eb9-e25e3953688a-whisker-backend-key-pair\") pod \"whisker-7ffdff5fc8-9slj8\" (UID: \"3dcc79a4-50c4-40e3-9eb9-e25e3953688a\") " pod="calico-system/whisker-7ffdff5fc8-9slj8" May 17 00:35:17.977570 kubelet[2012]: I0517 00:35:17.977538 2012 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/3dcc79a4-50c4-40e3-9eb9-e25e3953688a-whisker-ca-bundle\") pod \"whisker-7ffdff5fc8-9slj8\" (UID: \"3dcc79a4-50c4-40e3-9eb9-e25e3953688a\") " pod="calico-system/whisker-7ffdff5fc8-9slj8" May 17 00:35:17.977733 kubelet[2012]: I0517 00:35:17.977621 2012 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xhw88\" (UniqueName: \"kubernetes.io/projected/3dcc79a4-50c4-40e3-9eb9-e25e3953688a-kube-api-access-xhw88\") pod \"whisker-7ffdff5fc8-9slj8\" (UID: \"3dcc79a4-50c4-40e3-9eb9-e25e3953688a\") " pod="calico-system/whisker-7ffdff5fc8-9slj8" May 17 00:35:18.242084 env[1212]: time="2025-05-17T00:35:18.241398263Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-7ffdff5fc8-9slj8,Uid:3dcc79a4-50c4-40e3-9eb9-e25e3953688a,Namespace:calico-system,Attempt:0,}" May 17 00:35:18.268000 audit[3307]: AVC avc: denied { write } for pid=3307 comm="tee" name="fd" dev="proc" ino=24984 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:35:18.268000 audit[3307]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffde5a1879d a2=241 a3=1b6 items=1 ppid=3262 pid=3307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:18.274000 audit[3309]: AVC avc: denied { write } for pid=3309 comm="tee" name="fd" dev="proc" ino=24993 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:35:18.277000 audit[3315]: AVC avc: denied { write } for pid=3315 comm="tee" name="fd" dev="proc" ino=24996 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:35:18.274000 audit[3309]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc623f379b a2=241 a3=1b6 items=1 ppid=3268 pid=3309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:18.268000 audit: CWD cwd="/etc/service/enabled/cni/log" May 17 00:35:18.268000 audit: PATH item=0 name="/dev/fd/63" inode=24939 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:18.268000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:35:18.274000 audit: CWD cwd="/etc/service/enabled/confd/log" May 17 00:35:18.274000 audit: PATH item=0 name="/dev/fd/63" inode=24940 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:18.274000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:35:18.301000 audit[3331]: AVC avc: denied { write } for pid=3331 comm="tee" name="fd" dev="proc" ino=25004 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:35:18.302000 audit[3317]: AVC avc: denied { write } for pid=3317 comm="tee" name="fd" dev="proc" ino=25007 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:35:18.277000 audit[3315]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdf376379b a2=241 a3=1b6 items=1 ppid=3263 pid=3315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:18.277000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 17 00:35:18.277000 audit: PATH item=0 name="/dev/fd/63" inode=24945 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:18.277000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:35:18.302000 audit[3317]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffea4b1179c a2=241 a3=1b6 items=1 ppid=3271 pid=3317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:18.302000 audit: CWD cwd="/etc/service/enabled/bird/log" May 17 00:35:18.302000 audit: PATH item=0 name="/dev/fd/63" inode=24946 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:18.302000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:35:18.301000 audit[3331]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffeecb4b79b a2=241 a3=1b6 items=1 ppid=3275 pid=3331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:18.301000 audit: CWD cwd="/etc/service/enabled/felix/log" May 17 00:35:18.301000 audit: PATH item=0 name="/dev/fd/63" inode=24990 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:18.301000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:35:18.349000 audit[3340]: AVC avc: denied { write } for pid=3340 comm="tee" name="fd" dev="proc" ino=25016 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:35:18.349000 audit[3340]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffca453178b a2=241 a3=1b6 items=1 ppid=3270 pid=3340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:18.349000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 17 00:35:18.349000 audit: PATH item=0 name="/dev/fd/63" inode=24140 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:18.349000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:35:18.370000 audit[3342]: AVC avc: denied { write } for pid=3342 comm="tee" name="fd" dev="proc" ino=25020 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:35:18.370000 audit[3342]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffd3f0978c a2=241 a3=1b6 items=1 ppid=3272 pid=3342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:18.370000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 17 00:35:18.370000 audit: PATH item=0 name="/dev/fd/63" inode=25001 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:18.370000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:35:18.526626 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:35:18.526316 systemd-networkd[1016]: calica0182183ea: Link UP May 17 00:35:18.544435 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calica0182183ea: link becomes ready May 17 00:35:18.545568 systemd-networkd[1016]: calica0182183ea: Gained carrier May 17 00:35:18.570257 env[1212]: 2025-05-17 00:35:18.348 [INFO][3320] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 17 00:35:18.570257 env[1212]: 2025-05-17 00:35:18.371 [INFO][3320] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-whisker--7ffdff5fc8--9slj8-eth0 whisker-7ffdff5fc8- calico-system 3dcc79a4-50c4-40e3-9eb9-e25e3953688a 905 0 2025-05-17 00:35:17 +0000 UTC map[app.kubernetes.io/name:whisker k8s-app:whisker pod-template-hash:7ffdff5fc8 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:whisker] map[] [] [] []} {k8s ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758 whisker-7ffdff5fc8-9slj8 eth0 whisker [] [] [kns.calico-system ksa.calico-system.whisker] calica0182183ea [] [] }} ContainerID="7b72822d2a1d78effc27aa87d2b8b1a5ac2955a27bdfd43cd51e6f84bb9b38db" Namespace="calico-system" Pod="whisker-7ffdff5fc8-9slj8" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-whisker--7ffdff5fc8--9slj8-" May 17 00:35:18.570257 env[1212]: 2025-05-17 00:35:18.371 [INFO][3320] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="7b72822d2a1d78effc27aa87d2b8b1a5ac2955a27bdfd43cd51e6f84bb9b38db" Namespace="calico-system" Pod="whisker-7ffdff5fc8-9slj8" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-whisker--7ffdff5fc8--9slj8-eth0" May 17 00:35:18.570257 env[1212]: 2025-05-17 00:35:18.442 [INFO][3355] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="7b72822d2a1d78effc27aa87d2b8b1a5ac2955a27bdfd43cd51e6f84bb9b38db" HandleID="k8s-pod-network.7b72822d2a1d78effc27aa87d2b8b1a5ac2955a27bdfd43cd51e6f84bb9b38db" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-whisker--7ffdff5fc8--9slj8-eth0" May 17 00:35:18.570257 env[1212]: 2025-05-17 00:35:18.443 [INFO][3355] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="7b72822d2a1d78effc27aa87d2b8b1a5ac2955a27bdfd43cd51e6f84bb9b38db" HandleID="k8s-pod-network.7b72822d2a1d78effc27aa87d2b8b1a5ac2955a27bdfd43cd51e6f84bb9b38db" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-whisker--7ffdff5fc8--9slj8-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d9b80), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758", "pod":"whisker-7ffdff5fc8-9slj8", "timestamp":"2025-05-17 00:35:18.442605606 +0000 UTC"}, Hostname:"ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:35:18.570257 env[1212]: 2025-05-17 00:35:18.443 [INFO][3355] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:35:18.570257 env[1212]: 2025-05-17 00:35:18.443 [INFO][3355] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:35:18.570257 env[1212]: 2025-05-17 00:35:18.443 [INFO][3355] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758' May 17 00:35:18.570257 env[1212]: 2025-05-17 00:35:18.456 [INFO][3355] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.7b72822d2a1d78effc27aa87d2b8b1a5ac2955a27bdfd43cd51e6f84bb9b38db" host="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:35:18.570257 env[1212]: 2025-05-17 00:35:18.464 [INFO][3355] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:35:18.570257 env[1212]: 2025-05-17 00:35:18.476 [INFO][3355] ipam/ipam.go 511: Trying affinity for 192.168.43.128/26 host="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:35:18.570257 env[1212]: 2025-05-17 00:35:18.479 [INFO][3355] ipam/ipam.go 158: Attempting to load block cidr=192.168.43.128/26 host="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:35:18.570257 env[1212]: 2025-05-17 00:35:18.482 [INFO][3355] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.43.128/26 host="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:35:18.570257 env[1212]: 2025-05-17 00:35:18.482 [INFO][3355] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.43.128/26 handle="k8s-pod-network.7b72822d2a1d78effc27aa87d2b8b1a5ac2955a27bdfd43cd51e6f84bb9b38db" host="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:35:18.570257 env[1212]: 2025-05-17 00:35:18.484 [INFO][3355] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.7b72822d2a1d78effc27aa87d2b8b1a5ac2955a27bdfd43cd51e6f84bb9b38db May 17 00:35:18.570257 env[1212]: 2025-05-17 00:35:18.490 [INFO][3355] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.43.128/26 handle="k8s-pod-network.7b72822d2a1d78effc27aa87d2b8b1a5ac2955a27bdfd43cd51e6f84bb9b38db" host="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:35:18.570257 env[1212]: 2025-05-17 00:35:18.498 [INFO][3355] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.43.129/26] block=192.168.43.128/26 handle="k8s-pod-network.7b72822d2a1d78effc27aa87d2b8b1a5ac2955a27bdfd43cd51e6f84bb9b38db" host="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:35:18.570257 env[1212]: 2025-05-17 00:35:18.498 [INFO][3355] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.43.129/26] handle="k8s-pod-network.7b72822d2a1d78effc27aa87d2b8b1a5ac2955a27bdfd43cd51e6f84bb9b38db" host="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:35:18.570257 env[1212]: 2025-05-17 00:35:18.498 [INFO][3355] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:35:18.570257 env[1212]: 2025-05-17 00:35:18.499 [INFO][3355] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.43.129/26] IPv6=[] ContainerID="7b72822d2a1d78effc27aa87d2b8b1a5ac2955a27bdfd43cd51e6f84bb9b38db" HandleID="k8s-pod-network.7b72822d2a1d78effc27aa87d2b8b1a5ac2955a27bdfd43cd51e6f84bb9b38db" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-whisker--7ffdff5fc8--9slj8-eth0" May 17 00:35:18.571548 env[1212]: 2025-05-17 00:35:18.501 [INFO][3320] cni-plugin/k8s.go 418: Populated endpoint ContainerID="7b72822d2a1d78effc27aa87d2b8b1a5ac2955a27bdfd43cd51e6f84bb9b38db" Namespace="calico-system" Pod="whisker-7ffdff5fc8-9slj8" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-whisker--7ffdff5fc8--9slj8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-whisker--7ffdff5fc8--9slj8-eth0", GenerateName:"whisker-7ffdff5fc8-", Namespace:"calico-system", SelfLink:"", UID:"3dcc79a4-50c4-40e3-9eb9-e25e3953688a", ResourceVersion:"905", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 35, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"7ffdff5fc8", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758", ContainerID:"", Pod:"whisker-7ffdff5fc8-9slj8", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.43.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"calica0182183ea", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:35:18.571548 env[1212]: 2025-05-17 00:35:18.501 [INFO][3320] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.43.129/32] ContainerID="7b72822d2a1d78effc27aa87d2b8b1a5ac2955a27bdfd43cd51e6f84bb9b38db" Namespace="calico-system" Pod="whisker-7ffdff5fc8-9slj8" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-whisker--7ffdff5fc8--9slj8-eth0" May 17 00:35:18.571548 env[1212]: 2025-05-17 00:35:18.501 [INFO][3320] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calica0182183ea ContainerID="7b72822d2a1d78effc27aa87d2b8b1a5ac2955a27bdfd43cd51e6f84bb9b38db" Namespace="calico-system" Pod="whisker-7ffdff5fc8-9slj8" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-whisker--7ffdff5fc8--9slj8-eth0" May 17 00:35:18.571548 env[1212]: 2025-05-17 00:35:18.518 [INFO][3320] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="7b72822d2a1d78effc27aa87d2b8b1a5ac2955a27bdfd43cd51e6f84bb9b38db" Namespace="calico-system" Pod="whisker-7ffdff5fc8-9slj8" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-whisker--7ffdff5fc8--9slj8-eth0" May 17 00:35:18.571548 env[1212]: 2025-05-17 00:35:18.553 [INFO][3320] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="7b72822d2a1d78effc27aa87d2b8b1a5ac2955a27bdfd43cd51e6f84bb9b38db" Namespace="calico-system" Pod="whisker-7ffdff5fc8-9slj8" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-whisker--7ffdff5fc8--9slj8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-whisker--7ffdff5fc8--9slj8-eth0", GenerateName:"whisker-7ffdff5fc8-", Namespace:"calico-system", SelfLink:"", UID:"3dcc79a4-50c4-40e3-9eb9-e25e3953688a", ResourceVersion:"905", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 35, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"7ffdff5fc8", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758", ContainerID:"7b72822d2a1d78effc27aa87d2b8b1a5ac2955a27bdfd43cd51e6f84bb9b38db", Pod:"whisker-7ffdff5fc8-9slj8", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.43.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"calica0182183ea", MAC:"ea:57:91:7f:32:50", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:35:18.571548 env[1212]: 2025-05-17 00:35:18.568 [INFO][3320] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="7b72822d2a1d78effc27aa87d2b8b1a5ac2955a27bdfd43cd51e6f84bb9b38db" Namespace="calico-system" Pod="whisker-7ffdff5fc8-9slj8" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-whisker--7ffdff5fc8--9slj8-eth0" May 17 00:35:18.599396 env[1212]: time="2025-05-17T00:35:18.591723744Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:35:18.599396 env[1212]: time="2025-05-17T00:35:18.591830536Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:35:18.599396 env[1212]: time="2025-05-17T00:35:18.591875469Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:35:18.599396 env[1212]: time="2025-05-17T00:35:18.592116080Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7b72822d2a1d78effc27aa87d2b8b1a5ac2955a27bdfd43cd51e6f84bb9b38db pid=3376 runtime=io.containerd.runc.v2 May 17 00:35:18.635089 systemd[1]: Started cri-containerd-7b72822d2a1d78effc27aa87d2b8b1a5ac2955a27bdfd43cd51e6f84bb9b38db.scope. May 17 00:35:18.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:18.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:18.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:18.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:18.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:18.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:18.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:18.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:18.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:18.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:18.678000 audit: BPF prog-id=139 op=LOAD May 17 00:35:18.681000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:18.681000 audit[3385]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3376 pid=3385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:18.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762373238323264326131643738656666633237616138376432623862 May 17 00:35:18.681000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:18.681000 audit[3385]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3376 pid=3385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:18.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762373238323264326131643738656666633237616138376432623862 May 17 00:35:18.681000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:18.681000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:18.681000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:18.681000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:18.681000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:18.681000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:18.681000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:18.681000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:18.681000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:18.681000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:18.681000 audit: BPF prog-id=140 op=LOAD May 17 00:35:18.681000 audit[3385]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001c0260 items=0 ppid=3376 pid=3385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:18.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762373238323264326131643738656666633237616138376432623862 May 17 00:35:18.681000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:18.681000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:18.681000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:18.681000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:18.681000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:18.681000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:18.681000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:18.681000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:18.681000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:18.681000 audit: BPF prog-id=141 op=LOAD May 17 00:35:18.681000 audit[3385]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001c02a8 items=0 ppid=3376 pid=3385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:18.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762373238323264326131643738656666633237616138376432623862 May 17 00:35:18.681000 audit: BPF prog-id=141 op=UNLOAD May 17 00:35:18.681000 audit: BPF prog-id=140 op=UNLOAD May 17 00:35:18.681000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:18.681000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:18.681000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:18.681000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:18.681000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:18.681000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:18.681000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:18.681000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:18.681000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:18.681000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:18.681000 audit: BPF prog-id=142 op=LOAD May 17 00:35:18.681000 audit[3385]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c06b8 items=0 ppid=3376 pid=3385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:18.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762373238323264326131643738656666633237616138376432623862 May 17 00:35:18.749785 env[1212]: time="2025-05-17T00:35:18.749723302Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-7ffdff5fc8-9slj8,Uid:3dcc79a4-50c4-40e3-9eb9-e25e3953688a,Namespace:calico-system,Attempt:0,} returns sandbox id \"7b72822d2a1d78effc27aa87d2b8b1a5ac2955a27bdfd43cd51e6f84bb9b38db\"" May 17 00:35:18.752234 env[1212]: time="2025-05-17T00:35:18.752188354Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\"" May 17 00:35:18.884543 env[1212]: time="2025-05-17T00:35:18.884470930Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:35:18.886591 env[1212]: time="2025-05-17T00:35:18.885925227Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:35:18.886771 kubelet[2012]: E0517 00:35:18.886198 2012 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:35:18.886771 kubelet[2012]: E0517 00:35:18.886283 2012 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:35:18.886897 kubelet[2012]: E0517 00:35:18.886516 2012 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.0,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:dc356148a25040b2be34d2920fa2f436,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-xhw88,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-7ffdff5fc8-9slj8_calico-system(3dcc79a4-50c4-40e3-9eb9-e25e3953688a): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:35:18.889410 env[1212]: time="2025-05-17T00:35:18.889351349Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\"" May 17 00:35:19.014189 env[1212]: time="2025-05-17T00:35:19.014099903Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:35:19.015481 env[1212]: time="2025-05-17T00:35:19.015414202Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:35:19.015822 kubelet[2012]: E0517 00:35:19.015761 2012 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:35:19.016310 kubelet[2012]: E0517 00:35:19.015835 2012 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:35:19.016453 kubelet[2012]: E0517 00:35:19.016009 2012 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-xhw88,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-7ffdff5fc8-9slj8_calico-system(3dcc79a4-50c4-40e3-9eb9-e25e3953688a): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:35:19.017587 kubelet[2012]: E0517 00:35:19.017505 2012 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-7ffdff5fc8-9slj8" podUID="3dcc79a4-50c4-40e3-9eb9-e25e3953688a" May 17 00:35:19.607105 env[1212]: time="2025-05-17T00:35:19.607048697Z" level=info msg="StopPodSandbox for \"32cc285900e6dcd205b9f41d7d3f2e75a044bfcd11a475e4197aa67f0a1085c6\"" May 17 00:35:19.607946 env[1212]: time="2025-05-17T00:35:19.607313047Z" level=info msg="StopPodSandbox for \"0bcf44e68d1237e0478c4818c985fe24d782e0d7dc964b90b8545553594addc8\"" May 17 00:35:19.612309 kubelet[2012]: I0517 00:35:19.611906 2012 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="a0dc23c7-a960-467c-add4-219d6ae8364b" path="/var/lib/kubelet/pods/a0dc23c7-a960-467c-add4-219d6ae8364b/volumes" May 17 00:35:19.763260 env[1212]: 2025-05-17 00:35:19.690 [INFO][3442] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="0bcf44e68d1237e0478c4818c985fe24d782e0d7dc964b90b8545553594addc8" May 17 00:35:19.763260 env[1212]: 2025-05-17 00:35:19.690 [INFO][3442] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="0bcf44e68d1237e0478c4818c985fe24d782e0d7dc964b90b8545553594addc8" iface="eth0" netns="/var/run/netns/cni-3e917a50-6f59-0a8d-8049-0cfe06bb2797" May 17 00:35:19.763260 env[1212]: 2025-05-17 00:35:19.690 [INFO][3442] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="0bcf44e68d1237e0478c4818c985fe24d782e0d7dc964b90b8545553594addc8" iface="eth0" netns="/var/run/netns/cni-3e917a50-6f59-0a8d-8049-0cfe06bb2797" May 17 00:35:19.763260 env[1212]: 2025-05-17 00:35:19.690 [INFO][3442] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="0bcf44e68d1237e0478c4818c985fe24d782e0d7dc964b90b8545553594addc8" iface="eth0" netns="/var/run/netns/cni-3e917a50-6f59-0a8d-8049-0cfe06bb2797" May 17 00:35:19.763260 env[1212]: 2025-05-17 00:35:19.691 [INFO][3442] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="0bcf44e68d1237e0478c4818c985fe24d782e0d7dc964b90b8545553594addc8" May 17 00:35:19.763260 env[1212]: 2025-05-17 00:35:19.691 [INFO][3442] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0bcf44e68d1237e0478c4818c985fe24d782e0d7dc964b90b8545553594addc8" May 17 00:35:19.763260 env[1212]: 2025-05-17 00:35:19.747 [INFO][3456] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0bcf44e68d1237e0478c4818c985fe24d782e0d7dc964b90b8545553594addc8" HandleID="k8s-pod-network.0bcf44e68d1237e0478c4818c985fe24d782e0d7dc964b90b8545553594addc8" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-calico--kube--controllers--5dfd77fb7d--55blf-eth0" May 17 00:35:19.763260 env[1212]: 2025-05-17 00:35:19.747 [INFO][3456] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:35:19.763260 env[1212]: 2025-05-17 00:35:19.747 [INFO][3456] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:35:19.763260 env[1212]: 2025-05-17 00:35:19.757 [WARNING][3456] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0bcf44e68d1237e0478c4818c985fe24d782e0d7dc964b90b8545553594addc8" HandleID="k8s-pod-network.0bcf44e68d1237e0478c4818c985fe24d782e0d7dc964b90b8545553594addc8" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-calico--kube--controllers--5dfd77fb7d--55blf-eth0" May 17 00:35:19.763260 env[1212]: 2025-05-17 00:35:19.757 [INFO][3456] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0bcf44e68d1237e0478c4818c985fe24d782e0d7dc964b90b8545553594addc8" HandleID="k8s-pod-network.0bcf44e68d1237e0478c4818c985fe24d782e0d7dc964b90b8545553594addc8" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-calico--kube--controllers--5dfd77fb7d--55blf-eth0" May 17 00:35:19.763260 env[1212]: 2025-05-17 00:35:19.760 [INFO][3456] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:35:19.763260 env[1212]: 2025-05-17 00:35:19.761 [INFO][3442] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="0bcf44e68d1237e0478c4818c985fe24d782e0d7dc964b90b8545553594addc8" May 17 00:35:19.767756 systemd[1]: run-netns-cni\x2d3e917a50\x2d6f59\x2d0a8d\x2d8049\x2d0cfe06bb2797.mount: Deactivated successfully. May 17 00:35:19.770270 env[1212]: time="2025-05-17T00:35:19.770208192Z" level=info msg="TearDown network for sandbox \"0bcf44e68d1237e0478c4818c985fe24d782e0d7dc964b90b8545553594addc8\" successfully" May 17 00:35:19.770484 env[1212]: time="2025-05-17T00:35:19.770301557Z" level=info msg="StopPodSandbox for \"0bcf44e68d1237e0478c4818c985fe24d782e0d7dc964b90b8545553594addc8\" returns successfully" May 17 00:35:19.771599 env[1212]: time="2025-05-17T00:35:19.771551594Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5dfd77fb7d-55blf,Uid:fd78bca1-b6af-4311-93c6-d48694e45dc4,Namespace:calico-system,Attempt:1,}" May 17 00:35:19.813270 env[1212]: 2025-05-17 00:35:19.709 [INFO][3443] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="32cc285900e6dcd205b9f41d7d3f2e75a044bfcd11a475e4197aa67f0a1085c6" May 17 00:35:19.813270 env[1212]: 2025-05-17 00:35:19.709 [INFO][3443] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="32cc285900e6dcd205b9f41d7d3f2e75a044bfcd11a475e4197aa67f0a1085c6" iface="eth0" netns="/var/run/netns/cni-e6f8f71e-eb57-96c8-12ca-35e7cff1e1c0" May 17 00:35:19.813270 env[1212]: 2025-05-17 00:35:19.709 [INFO][3443] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="32cc285900e6dcd205b9f41d7d3f2e75a044bfcd11a475e4197aa67f0a1085c6" iface="eth0" netns="/var/run/netns/cni-e6f8f71e-eb57-96c8-12ca-35e7cff1e1c0" May 17 00:35:19.813270 env[1212]: 2025-05-17 00:35:19.710 [INFO][3443] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="32cc285900e6dcd205b9f41d7d3f2e75a044bfcd11a475e4197aa67f0a1085c6" iface="eth0" netns="/var/run/netns/cni-e6f8f71e-eb57-96c8-12ca-35e7cff1e1c0" May 17 00:35:19.813270 env[1212]: 2025-05-17 00:35:19.710 [INFO][3443] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="32cc285900e6dcd205b9f41d7d3f2e75a044bfcd11a475e4197aa67f0a1085c6" May 17 00:35:19.813270 env[1212]: 2025-05-17 00:35:19.710 [INFO][3443] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="32cc285900e6dcd205b9f41d7d3f2e75a044bfcd11a475e4197aa67f0a1085c6" May 17 00:35:19.813270 env[1212]: 2025-05-17 00:35:19.777 [INFO][3461] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="32cc285900e6dcd205b9f41d7d3f2e75a044bfcd11a475e4197aa67f0a1085c6" HandleID="k8s-pod-network.32cc285900e6dcd205b9f41d7d3f2e75a044bfcd11a475e4197aa67f0a1085c6" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-coredns--668d6bf9bc--6kzm4-eth0" May 17 00:35:19.813270 env[1212]: 2025-05-17 00:35:19.777 [INFO][3461] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:35:19.813270 env[1212]: 2025-05-17 00:35:19.779 [INFO][3461] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:35:19.813270 env[1212]: 2025-05-17 00:35:19.787 [WARNING][3461] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="32cc285900e6dcd205b9f41d7d3f2e75a044bfcd11a475e4197aa67f0a1085c6" HandleID="k8s-pod-network.32cc285900e6dcd205b9f41d7d3f2e75a044bfcd11a475e4197aa67f0a1085c6" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-coredns--668d6bf9bc--6kzm4-eth0" May 17 00:35:19.813270 env[1212]: 2025-05-17 00:35:19.787 [INFO][3461] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="32cc285900e6dcd205b9f41d7d3f2e75a044bfcd11a475e4197aa67f0a1085c6" HandleID="k8s-pod-network.32cc285900e6dcd205b9f41d7d3f2e75a044bfcd11a475e4197aa67f0a1085c6" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-coredns--668d6bf9bc--6kzm4-eth0" May 17 00:35:19.813270 env[1212]: 2025-05-17 00:35:19.789 [INFO][3461] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:35:19.813270 env[1212]: 2025-05-17 00:35:19.809 [INFO][3443] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="32cc285900e6dcd205b9f41d7d3f2e75a044bfcd11a475e4197aa67f0a1085c6" May 17 00:35:19.818729 env[1212]: time="2025-05-17T00:35:19.818664973Z" level=info msg="TearDown network for sandbox \"32cc285900e6dcd205b9f41d7d3f2e75a044bfcd11a475e4197aa67f0a1085c6\" successfully" May 17 00:35:19.818963 env[1212]: time="2025-05-17T00:35:19.818927903Z" level=info msg="StopPodSandbox for \"32cc285900e6dcd205b9f41d7d3f2e75a044bfcd11a475e4197aa67f0a1085c6\" returns successfully" May 17 00:35:19.820959 systemd[1]: run-netns-cni\x2de6f8f71e\x2deb57\x2d96c8\x2d12ca\x2d35e7cff1e1c0.mount: Deactivated successfully. May 17 00:35:19.822204 env[1212]: time="2025-05-17T00:35:19.822159074Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-6kzm4,Uid:0b840cb1-eedd-48bf-b8ec-581041390cbc,Namespace:kube-system,Attempt:1,}" May 17 00:35:19.880397 kubelet[2012]: E0517 00:35:19.878664 2012 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-7ffdff5fc8-9slj8" podUID="3dcc79a4-50c4-40e3-9eb9-e25e3953688a" May 17 00:35:19.938000 audit[3501]: NETFILTER_CFG table=filter:99 family=2 entries=22 op=nft_register_rule pid=3501 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:35:19.938000 audit[3501]: SYSCALL arch=c000003e syscall=46 success=yes exit=8224 a0=3 a1=7ffc4ec00df0 a2=0 a3=7ffc4ec00ddc items=0 ppid=2172 pid=3501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:19.938000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:35:19.942000 audit[3501]: NETFILTER_CFG table=nat:100 family=2 entries=12 op=nft_register_rule pid=3501 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:35:19.942000 audit[3501]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc4ec00df0 a2=0 a3=0 items=0 ppid=2172 pid=3501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:19.942000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:35:20.005715 systemd-networkd[1016]: calica0182183ea: Gained IPv6LL May 17 00:35:20.164961 systemd-networkd[1016]: caliec1af03241e: Link UP May 17 00:35:20.173446 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:35:20.173551 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliec1af03241e: link becomes ready May 17 00:35:20.182155 systemd-networkd[1016]: caliec1af03241e: Gained carrier May 17 00:35:20.205573 env[1212]: 2025-05-17 00:35:19.965 [INFO][3471] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 17 00:35:20.205573 env[1212]: 2025-05-17 00:35:19.998 [INFO][3471] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-calico--kube--controllers--5dfd77fb7d--55blf-eth0 calico-kube-controllers-5dfd77fb7d- calico-system fd78bca1-b6af-4311-93c6-d48694e45dc4 924 0 2025-05-17 00:34:58 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:5dfd77fb7d projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758 calico-kube-controllers-5dfd77fb7d-55blf eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] caliec1af03241e [] [] }} ContainerID="d1ad55d169eedb1da98455b18bcb3a06d6962e829f4e29730ca9c0dd90f9f477" Namespace="calico-system" Pod="calico-kube-controllers-5dfd77fb7d-55blf" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-calico--kube--controllers--5dfd77fb7d--55blf-" May 17 00:35:20.205573 env[1212]: 2025-05-17 00:35:19.998 [INFO][3471] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="d1ad55d169eedb1da98455b18bcb3a06d6962e829f4e29730ca9c0dd90f9f477" Namespace="calico-system" Pod="calico-kube-controllers-5dfd77fb7d-55blf" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-calico--kube--controllers--5dfd77fb7d--55blf-eth0" May 17 00:35:20.205573 env[1212]: 2025-05-17 00:35:20.077 [INFO][3507] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d1ad55d169eedb1da98455b18bcb3a06d6962e829f4e29730ca9c0dd90f9f477" HandleID="k8s-pod-network.d1ad55d169eedb1da98455b18bcb3a06d6962e829f4e29730ca9c0dd90f9f477" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-calico--kube--controllers--5dfd77fb7d--55blf-eth0" May 17 00:35:20.205573 env[1212]: 2025-05-17 00:35:20.080 [INFO][3507] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="d1ad55d169eedb1da98455b18bcb3a06d6962e829f4e29730ca9c0dd90f9f477" HandleID="k8s-pod-network.d1ad55d169eedb1da98455b18bcb3a06d6962e829f4e29730ca9c0dd90f9f477" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-calico--kube--controllers--5dfd77fb7d--55blf-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d1630), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758", "pod":"calico-kube-controllers-5dfd77fb7d-55blf", "timestamp":"2025-05-17 00:35:20.077865906 +0000 UTC"}, Hostname:"ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:35:20.205573 env[1212]: 2025-05-17 00:35:20.081 [INFO][3507] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:35:20.205573 env[1212]: 2025-05-17 00:35:20.081 [INFO][3507] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:35:20.205573 env[1212]: 2025-05-17 00:35:20.081 [INFO][3507] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758' May 17 00:35:20.205573 env[1212]: 2025-05-17 00:35:20.107 [INFO][3507] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.d1ad55d169eedb1da98455b18bcb3a06d6962e829f4e29730ca9c0dd90f9f477" host="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:35:20.205573 env[1212]: 2025-05-17 00:35:20.115 [INFO][3507] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:35:20.205573 env[1212]: 2025-05-17 00:35:20.136 [INFO][3507] ipam/ipam.go 511: Trying affinity for 192.168.43.128/26 host="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:35:20.205573 env[1212]: 2025-05-17 00:35:20.139 [INFO][3507] ipam/ipam.go 158: Attempting to load block cidr=192.168.43.128/26 host="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:35:20.205573 env[1212]: 2025-05-17 00:35:20.142 [INFO][3507] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.43.128/26 host="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:35:20.205573 env[1212]: 2025-05-17 00:35:20.142 [INFO][3507] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.43.128/26 handle="k8s-pod-network.d1ad55d169eedb1da98455b18bcb3a06d6962e829f4e29730ca9c0dd90f9f477" host="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:35:20.205573 env[1212]: 2025-05-17 00:35:20.144 [INFO][3507] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.d1ad55d169eedb1da98455b18bcb3a06d6962e829f4e29730ca9c0dd90f9f477 May 17 00:35:20.205573 env[1212]: 2025-05-17 00:35:20.149 [INFO][3507] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.43.128/26 handle="k8s-pod-network.d1ad55d169eedb1da98455b18bcb3a06d6962e829f4e29730ca9c0dd90f9f477" host="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:35:20.205573 env[1212]: 2025-05-17 00:35:20.157 [INFO][3507] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.43.130/26] block=192.168.43.128/26 handle="k8s-pod-network.d1ad55d169eedb1da98455b18bcb3a06d6962e829f4e29730ca9c0dd90f9f477" host="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:35:20.205573 env[1212]: 2025-05-17 00:35:20.157 [INFO][3507] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.43.130/26] handle="k8s-pod-network.d1ad55d169eedb1da98455b18bcb3a06d6962e829f4e29730ca9c0dd90f9f477" host="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:35:20.205573 env[1212]: 2025-05-17 00:35:20.157 [INFO][3507] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:35:20.205573 env[1212]: 2025-05-17 00:35:20.157 [INFO][3507] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.43.130/26] IPv6=[] ContainerID="d1ad55d169eedb1da98455b18bcb3a06d6962e829f4e29730ca9c0dd90f9f477" HandleID="k8s-pod-network.d1ad55d169eedb1da98455b18bcb3a06d6962e829f4e29730ca9c0dd90f9f477" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-calico--kube--controllers--5dfd77fb7d--55blf-eth0" May 17 00:35:20.207063 env[1212]: 2025-05-17 00:35:20.160 [INFO][3471] cni-plugin/k8s.go 418: Populated endpoint ContainerID="d1ad55d169eedb1da98455b18bcb3a06d6962e829f4e29730ca9c0dd90f9f477" Namespace="calico-system" Pod="calico-kube-controllers-5dfd77fb7d-55blf" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-calico--kube--controllers--5dfd77fb7d--55blf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-calico--kube--controllers--5dfd77fb7d--55blf-eth0", GenerateName:"calico-kube-controllers-5dfd77fb7d-", Namespace:"calico-system", SelfLink:"", UID:"fd78bca1-b6af-4311-93c6-d48694e45dc4", ResourceVersion:"924", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 34, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5dfd77fb7d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758", ContainerID:"", Pod:"calico-kube-controllers-5dfd77fb7d-55blf", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.43.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"caliec1af03241e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:35:20.207063 env[1212]: 2025-05-17 00:35:20.161 [INFO][3471] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.43.130/32] ContainerID="d1ad55d169eedb1da98455b18bcb3a06d6962e829f4e29730ca9c0dd90f9f477" Namespace="calico-system" Pod="calico-kube-controllers-5dfd77fb7d-55blf" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-calico--kube--controllers--5dfd77fb7d--55blf-eth0" May 17 00:35:20.207063 env[1212]: 2025-05-17 00:35:20.161 [INFO][3471] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to caliec1af03241e ContainerID="d1ad55d169eedb1da98455b18bcb3a06d6962e829f4e29730ca9c0dd90f9f477" Namespace="calico-system" Pod="calico-kube-controllers-5dfd77fb7d-55blf" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-calico--kube--controllers--5dfd77fb7d--55blf-eth0" May 17 00:35:20.207063 env[1212]: 2025-05-17 00:35:20.183 [INFO][3471] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="d1ad55d169eedb1da98455b18bcb3a06d6962e829f4e29730ca9c0dd90f9f477" Namespace="calico-system" Pod="calico-kube-controllers-5dfd77fb7d-55blf" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-calico--kube--controllers--5dfd77fb7d--55blf-eth0" May 17 00:35:20.207063 env[1212]: 2025-05-17 00:35:20.184 [INFO][3471] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="d1ad55d169eedb1da98455b18bcb3a06d6962e829f4e29730ca9c0dd90f9f477" Namespace="calico-system" Pod="calico-kube-controllers-5dfd77fb7d-55blf" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-calico--kube--controllers--5dfd77fb7d--55blf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-calico--kube--controllers--5dfd77fb7d--55blf-eth0", GenerateName:"calico-kube-controllers-5dfd77fb7d-", Namespace:"calico-system", SelfLink:"", UID:"fd78bca1-b6af-4311-93c6-d48694e45dc4", ResourceVersion:"924", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 34, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5dfd77fb7d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758", ContainerID:"d1ad55d169eedb1da98455b18bcb3a06d6962e829f4e29730ca9c0dd90f9f477", Pod:"calico-kube-controllers-5dfd77fb7d-55blf", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.43.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"caliec1af03241e", MAC:"76:8f:7b:59:50:56", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:35:20.207063 env[1212]: 2025-05-17 00:35:20.203 [INFO][3471] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="d1ad55d169eedb1da98455b18bcb3a06d6962e829f4e29730ca9c0dd90f9f477" Namespace="calico-system" Pod="calico-kube-controllers-5dfd77fb7d-55blf" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-calico--kube--controllers--5dfd77fb7d--55blf-eth0" May 17 00:35:20.227196 env[1212]: time="2025-05-17T00:35:20.227105682Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:35:20.227540 env[1212]: time="2025-05-17T00:35:20.227484282Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:35:20.227745 env[1212]: time="2025-05-17T00:35:20.227695912Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:35:20.228139 env[1212]: time="2025-05-17T00:35:20.228089172Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d1ad55d169eedb1da98455b18bcb3a06d6962e829f4e29730ca9c0dd90f9f477 pid=3538 runtime=io.containerd.runc.v2 May 17 00:35:20.287653 systemd[1]: run-containerd-runc-k8s.io-d1ad55d169eedb1da98455b18bcb3a06d6962e829f4e29730ca9c0dd90f9f477-runc.ShpXbB.mount: Deactivated successfully. May 17 00:35:20.297512 systemd[1]: Started cri-containerd-d1ad55d169eedb1da98455b18bcb3a06d6962e829f4e29730ca9c0dd90f9f477.scope. May 17 00:35:20.297608 systemd-networkd[1016]: calib9951cfd5c4: Link UP May 17 00:35:20.306852 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calib9951cfd5c4: link becomes ready May 17 00:35:20.306886 systemd-networkd[1016]: calib9951cfd5c4: Gained carrier May 17 00:35:20.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.332000 audit: BPF prog-id=143 op=LOAD May 17 00:35:20.333000 audit[3549]: AVC avc: denied { bpf } for pid=3549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.333000 audit[3549]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=3538 pid=3549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.333000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431616435356431363965656462316461393834353562313862636233 May 17 00:35:20.334000 audit[3549]: AVC avc: denied { perfmon } for pid=3549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.334000 audit[3549]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=c items=0 ppid=3538 pid=3549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.334000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431616435356431363965656462316461393834353562313862636233 May 17 00:35:20.337000 audit[3549]: AVC avc: denied { bpf } for pid=3549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.337000 audit[3549]: AVC avc: denied { bpf } for pid=3549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.337000 audit[3549]: AVC avc: denied { bpf } for pid=3549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.337000 audit[3549]: AVC avc: denied { perfmon } for pid=3549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.337000 audit[3549]: AVC avc: denied { perfmon } for pid=3549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.337000 audit[3549]: AVC avc: denied { perfmon } for pid=3549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.337000 audit[3549]: AVC avc: denied { perfmon } for pid=3549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.337000 audit[3549]: AVC avc: denied { perfmon } for pid=3549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.337000 audit[3549]: AVC avc: denied { bpf } for pid=3549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.337000 audit[3549]: AVC avc: denied { bpf } for pid=3549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.337000 audit: BPF prog-id=144 op=LOAD May 17 00:35:20.337000 audit[3549]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c00024e960 items=0 ppid=3538 pid=3549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.337000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431616435356431363965656462316461393834353562313862636233 May 17 00:35:20.339000 audit[3549]: AVC avc: denied { bpf } for pid=3549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.339000 audit[3549]: AVC avc: denied { bpf } for pid=3549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.339000 audit[3549]: AVC avc: denied { perfmon } for pid=3549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.339000 audit[3549]: AVC avc: denied { perfmon } for pid=3549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.339000 audit[3549]: AVC avc: denied { perfmon } for pid=3549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.339000 audit[3549]: AVC avc: denied { perfmon } for pid=3549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.339000 audit[3549]: AVC avc: denied { perfmon } for pid=3549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.339000 audit[3549]: AVC avc: denied { bpf } for pid=3549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.339000 audit[3549]: AVC avc: denied { bpf } for pid=3549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.339000 audit: BPF prog-id=145 op=LOAD May 17 00:35:20.339000 audit[3549]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c00024e9a8 items=0 ppid=3538 pid=3549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.339000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431616435356431363965656462316461393834353562313862636233 May 17 00:35:20.340000 audit: BPF prog-id=145 op=UNLOAD May 17 00:35:20.340000 audit: BPF prog-id=144 op=UNLOAD May 17 00:35:20.340000 audit[3549]: AVC avc: denied { bpf } for pid=3549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.340000 audit[3549]: AVC avc: denied { bpf } for pid=3549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.340000 audit[3549]: AVC avc: denied { bpf } for pid=3549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.340000 audit[3549]: AVC avc: denied { perfmon } for pid=3549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.340000 audit[3549]: AVC avc: denied { perfmon } for pid=3549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.340000 audit[3549]: AVC avc: denied { perfmon } for pid=3549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.340000 audit[3549]: AVC avc: denied { perfmon } for pid=3549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.340000 audit[3549]: AVC avc: denied { perfmon } for pid=3549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.340000 audit[3549]: AVC avc: denied { bpf } for pid=3549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.340000 audit[3549]: AVC avc: denied { bpf } for pid=3549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.340000 audit: BPF prog-id=146 op=LOAD May 17 00:35:20.340000 audit[3549]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c00024edb8 items=0 ppid=3538 pid=3549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.340000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431616435356431363965656462316461393834353562313862636233 May 17 00:35:20.344208 env[1212]: 2025-05-17 00:35:19.986 [INFO][3490] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 17 00:35:20.344208 env[1212]: 2025-05-17 00:35:20.025 [INFO][3490] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-coredns--668d6bf9bc--6kzm4-eth0 coredns-668d6bf9bc- kube-system 0b840cb1-eedd-48bf-b8ec-581041390cbc 925 0 2025-05-17 00:34:44 +0000 UTC map[k8s-app:kube-dns pod-template-hash:668d6bf9bc projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758 coredns-668d6bf9bc-6kzm4 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calib9951cfd5c4 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] [] }} ContainerID="27f61e72aba93d488c80329f93b65777188a45f2c1551e2e7b3ac32a83622f37" Namespace="kube-system" Pod="coredns-668d6bf9bc-6kzm4" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-coredns--668d6bf9bc--6kzm4-" May 17 00:35:20.344208 env[1212]: 2025-05-17 00:35:20.025 [INFO][3490] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="27f61e72aba93d488c80329f93b65777188a45f2c1551e2e7b3ac32a83622f37" Namespace="kube-system" Pod="coredns-668d6bf9bc-6kzm4" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-coredns--668d6bf9bc--6kzm4-eth0" May 17 00:35:20.344208 env[1212]: 2025-05-17 00:35:20.134 [INFO][3514] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="27f61e72aba93d488c80329f93b65777188a45f2c1551e2e7b3ac32a83622f37" HandleID="k8s-pod-network.27f61e72aba93d488c80329f93b65777188a45f2c1551e2e7b3ac32a83622f37" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-coredns--668d6bf9bc--6kzm4-eth0" May 17 00:35:20.344208 env[1212]: 2025-05-17 00:35:20.134 [INFO][3514] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="27f61e72aba93d488c80329f93b65777188a45f2c1551e2e7b3ac32a83622f37" HandleID="k8s-pod-network.27f61e72aba93d488c80329f93b65777188a45f2c1551e2e7b3ac32a83622f37" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-coredns--668d6bf9bc--6kzm4-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002356f0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758", "pod":"coredns-668d6bf9bc-6kzm4", "timestamp":"2025-05-17 00:35:20.134537414 +0000 UTC"}, Hostname:"ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:35:20.344208 env[1212]: 2025-05-17 00:35:20.135 [INFO][3514] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:35:20.344208 env[1212]: 2025-05-17 00:35:20.158 [INFO][3514] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:35:20.344208 env[1212]: 2025-05-17 00:35:20.158 [INFO][3514] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758' May 17 00:35:20.344208 env[1212]: 2025-05-17 00:35:20.207 [INFO][3514] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.27f61e72aba93d488c80329f93b65777188a45f2c1551e2e7b3ac32a83622f37" host="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:35:20.344208 env[1212]: 2025-05-17 00:35:20.216 [INFO][3514] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:35:20.344208 env[1212]: 2025-05-17 00:35:20.224 [INFO][3514] ipam/ipam.go 511: Trying affinity for 192.168.43.128/26 host="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:35:20.344208 env[1212]: 2025-05-17 00:35:20.227 [INFO][3514] ipam/ipam.go 158: Attempting to load block cidr=192.168.43.128/26 host="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:35:20.344208 env[1212]: 2025-05-17 00:35:20.242 [INFO][3514] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.43.128/26 host="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:35:20.344208 env[1212]: 2025-05-17 00:35:20.243 [INFO][3514] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.43.128/26 handle="k8s-pod-network.27f61e72aba93d488c80329f93b65777188a45f2c1551e2e7b3ac32a83622f37" host="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:35:20.344208 env[1212]: 2025-05-17 00:35:20.245 [INFO][3514] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.27f61e72aba93d488c80329f93b65777188a45f2c1551e2e7b3ac32a83622f37 May 17 00:35:20.344208 env[1212]: 2025-05-17 00:35:20.251 [INFO][3514] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.43.128/26 handle="k8s-pod-network.27f61e72aba93d488c80329f93b65777188a45f2c1551e2e7b3ac32a83622f37" host="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:35:20.344208 env[1212]: 2025-05-17 00:35:20.260 [INFO][3514] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.43.131/26] block=192.168.43.128/26 handle="k8s-pod-network.27f61e72aba93d488c80329f93b65777188a45f2c1551e2e7b3ac32a83622f37" host="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:35:20.344208 env[1212]: 2025-05-17 00:35:20.260 [INFO][3514] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.43.131/26] handle="k8s-pod-network.27f61e72aba93d488c80329f93b65777188a45f2c1551e2e7b3ac32a83622f37" host="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:35:20.344208 env[1212]: 2025-05-17 00:35:20.260 [INFO][3514] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:35:20.344208 env[1212]: 2025-05-17 00:35:20.260 [INFO][3514] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.43.131/26] IPv6=[] ContainerID="27f61e72aba93d488c80329f93b65777188a45f2c1551e2e7b3ac32a83622f37" HandleID="k8s-pod-network.27f61e72aba93d488c80329f93b65777188a45f2c1551e2e7b3ac32a83622f37" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-coredns--668d6bf9bc--6kzm4-eth0" May 17 00:35:20.345434 env[1212]: 2025-05-17 00:35:20.263 [INFO][3490] cni-plugin/k8s.go 418: Populated endpoint ContainerID="27f61e72aba93d488c80329f93b65777188a45f2c1551e2e7b3ac32a83622f37" Namespace="kube-system" Pod="coredns-668d6bf9bc-6kzm4" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-coredns--668d6bf9bc--6kzm4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-coredns--668d6bf9bc--6kzm4-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"0b840cb1-eedd-48bf-b8ec-581041390cbc", ResourceVersion:"925", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 34, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758", ContainerID:"", Pod:"coredns-668d6bf9bc-6kzm4", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.43.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib9951cfd5c4", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:35:20.345434 env[1212]: 2025-05-17 00:35:20.263 [INFO][3490] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.43.131/32] ContainerID="27f61e72aba93d488c80329f93b65777188a45f2c1551e2e7b3ac32a83622f37" Namespace="kube-system" Pod="coredns-668d6bf9bc-6kzm4" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-coredns--668d6bf9bc--6kzm4-eth0" May 17 00:35:20.345434 env[1212]: 2025-05-17 00:35:20.263 [INFO][3490] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calib9951cfd5c4 ContainerID="27f61e72aba93d488c80329f93b65777188a45f2c1551e2e7b3ac32a83622f37" Namespace="kube-system" Pod="coredns-668d6bf9bc-6kzm4" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-coredns--668d6bf9bc--6kzm4-eth0" May 17 00:35:20.345434 env[1212]: 2025-05-17 00:35:20.312 [INFO][3490] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="27f61e72aba93d488c80329f93b65777188a45f2c1551e2e7b3ac32a83622f37" Namespace="kube-system" Pod="coredns-668d6bf9bc-6kzm4" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-coredns--668d6bf9bc--6kzm4-eth0" May 17 00:35:20.345434 env[1212]: 2025-05-17 00:35:20.322 [INFO][3490] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="27f61e72aba93d488c80329f93b65777188a45f2c1551e2e7b3ac32a83622f37" Namespace="kube-system" Pod="coredns-668d6bf9bc-6kzm4" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-coredns--668d6bf9bc--6kzm4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-coredns--668d6bf9bc--6kzm4-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"0b840cb1-eedd-48bf-b8ec-581041390cbc", ResourceVersion:"925", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 34, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758", ContainerID:"27f61e72aba93d488c80329f93b65777188a45f2c1551e2e7b3ac32a83622f37", Pod:"coredns-668d6bf9bc-6kzm4", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.43.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib9951cfd5c4", MAC:"62:36:db:c6:72:3b", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:35:20.345434 env[1212]: 2025-05-17 00:35:20.337 [INFO][3490] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="27f61e72aba93d488c80329f93b65777188a45f2c1551e2e7b3ac32a83622f37" Namespace="kube-system" Pod="coredns-668d6bf9bc-6kzm4" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-coredns--668d6bf9bc--6kzm4-eth0" May 17 00:35:20.364469 env[1212]: time="2025-05-17T00:35:20.364197055Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:35:20.364469 env[1212]: time="2025-05-17T00:35:20.364244310Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:35:20.364469 env[1212]: time="2025-05-17T00:35:20.364261874Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:35:20.364799 env[1212]: time="2025-05-17T00:35:20.364536800Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/27f61e72aba93d488c80329f93b65777188a45f2c1551e2e7b3ac32a83622f37 pid=3579 runtime=io.containerd.runc.v2 May 17 00:35:20.391319 systemd[1]: Started cri-containerd-27f61e72aba93d488c80329f93b65777188a45f2c1551e2e7b3ac32a83622f37.scope. May 17 00:35:20.419064 env[1212]: time="2025-05-17T00:35:20.418828561Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5dfd77fb7d-55blf,Uid:fd78bca1-b6af-4311-93c6-d48694e45dc4,Namespace:calico-system,Attempt:1,} returns sandbox id \"d1ad55d169eedb1da98455b18bcb3a06d6962e829f4e29730ca9c0dd90f9f477\"" May 17 00:35:20.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.432000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.432000 audit: BPF prog-id=147 op=LOAD May 17 00:35:20.434598 env[1212]: time="2025-05-17T00:35:20.433341336Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.0\"" May 17 00:35:20.433000 audit[3587]: AVC avc: denied { bpf } for pid=3587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.433000 audit[3587]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3579 pid=3587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.433000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237663631653732616261393364343838633830333239663933623635 May 17 00:35:20.433000 audit[3587]: AVC avc: denied { perfmon } for pid=3587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.433000 audit[3587]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3579 pid=3587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.433000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237663631653732616261393364343838633830333239663933623635 May 17 00:35:20.433000 audit[3587]: AVC avc: denied { bpf } for pid=3587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.433000 audit[3587]: AVC avc: denied { bpf } for pid=3587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.433000 audit[3587]: AVC avc: denied { bpf } for pid=3587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.433000 audit[3587]: AVC avc: denied { perfmon } for pid=3587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.433000 audit[3587]: AVC avc: denied { perfmon } for pid=3587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.433000 audit[3587]: AVC avc: denied { perfmon } for pid=3587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.433000 audit[3587]: AVC avc: denied { perfmon } for pid=3587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.433000 audit[3587]: AVC avc: denied { perfmon } for pid=3587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.433000 audit[3587]: AVC avc: denied { bpf } for pid=3587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.433000 audit[3587]: AVC avc: denied { bpf } for pid=3587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.433000 audit: BPF prog-id=148 op=LOAD May 17 00:35:20.433000 audit[3587]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001dde00 items=0 ppid=3579 pid=3587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.433000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237663631653732616261393364343838633830333239663933623635 May 17 00:35:20.434000 audit[3587]: AVC avc: denied { bpf } for pid=3587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.434000 audit[3587]: AVC avc: denied { bpf } for pid=3587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.434000 audit[3587]: AVC avc: denied { perfmon } for pid=3587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.434000 audit[3587]: AVC avc: denied { perfmon } for pid=3587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.434000 audit[3587]: AVC avc: denied { perfmon } for pid=3587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.434000 audit[3587]: AVC avc: denied { perfmon } for pid=3587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.434000 audit[3587]: AVC avc: denied { perfmon } for pid=3587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.434000 audit[3587]: AVC avc: denied { bpf } for pid=3587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.434000 audit[3587]: AVC avc: denied { bpf } for pid=3587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.434000 audit: BPF prog-id=149 op=LOAD May 17 00:35:20.434000 audit[3587]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001dde48 items=0 ppid=3579 pid=3587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.434000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237663631653732616261393364343838633830333239663933623635 May 17 00:35:20.434000 audit: BPF prog-id=149 op=UNLOAD May 17 00:35:20.434000 audit: BPF prog-id=148 op=UNLOAD May 17 00:35:20.434000 audit[3587]: AVC avc: denied { bpf } for pid=3587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.434000 audit[3587]: AVC avc: denied { bpf } for pid=3587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.434000 audit[3587]: AVC avc: denied { bpf } for pid=3587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.434000 audit[3587]: AVC avc: denied { perfmon } for pid=3587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.434000 audit[3587]: AVC avc: denied { perfmon } for pid=3587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.434000 audit[3587]: AVC avc: denied { perfmon } for pid=3587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.434000 audit[3587]: AVC avc: denied { perfmon } for pid=3587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.434000 audit[3587]: AVC avc: denied { perfmon } for pid=3587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.434000 audit[3587]: AVC avc: denied { bpf } for pid=3587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.434000 audit[3587]: AVC avc: denied { bpf } for pid=3587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.434000 audit: BPF prog-id=150 op=LOAD May 17 00:35:20.434000 audit[3587]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003c0258 items=0 ppid=3579 pid=3587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.434000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237663631653732616261393364343838633830333239663933623635 May 17 00:35:20.484059 env[1212]: time="2025-05-17T00:35:20.484000994Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-6kzm4,Uid:0b840cb1-eedd-48bf-b8ec-581041390cbc,Namespace:kube-system,Attempt:1,} returns sandbox id \"27f61e72aba93d488c80329f93b65777188a45f2c1551e2e7b3ac32a83622f37\"" May 17 00:35:20.490825 env[1212]: time="2025-05-17T00:35:20.490778321Z" level=info msg="CreateContainer within sandbox \"27f61e72aba93d488c80329f93b65777188a45f2c1551e2e7b3ac32a83622f37\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 17 00:35:20.508736 env[1212]: time="2025-05-17T00:35:20.508689988Z" level=info msg="CreateContainer within sandbox \"27f61e72aba93d488c80329f93b65777188a45f2c1551e2e7b3ac32a83622f37\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"de6c0ecabc9810ea462d816147f849d5387e6c91e03510079222999fd45dfe9c\"" May 17 00:35:20.509877 env[1212]: time="2025-05-17T00:35:20.509809095Z" level=info msg="StartContainer for \"de6c0ecabc9810ea462d816147f849d5387e6c91e03510079222999fd45dfe9c\"" May 17 00:35:20.534517 systemd[1]: Started cri-containerd-de6c0ecabc9810ea462d816147f849d5387e6c91e03510079222999fd45dfe9c.scope. May 17 00:35:20.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.555000 audit: BPF prog-id=151 op=LOAD May 17 00:35:20.557000 audit[3626]: AVC avc: denied { bpf } for pid=3626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.557000 audit[3626]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3579 pid=3626 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.557000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465366330656361626339383130656134363264383136313437663834 May 17 00:35:20.557000 audit[3626]: AVC avc: denied { perfmon } for pid=3626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.557000 audit[3626]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3579 pid=3626 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.557000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465366330656361626339383130656134363264383136313437663834 May 17 00:35:20.558000 audit[3626]: AVC avc: denied { bpf } for pid=3626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.558000 audit[3626]: AVC avc: denied { bpf } for pid=3626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.558000 audit[3626]: AVC avc: denied { bpf } for pid=3626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.558000 audit[3626]: AVC avc: denied { perfmon } for pid=3626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.558000 audit[3626]: AVC avc: denied { perfmon } for pid=3626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.558000 audit[3626]: AVC avc: denied { perfmon } for pid=3626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.558000 audit[3626]: AVC avc: denied { perfmon } for pid=3626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.558000 audit[3626]: AVC avc: denied { perfmon } for pid=3626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.558000 audit[3626]: AVC avc: denied { bpf } for pid=3626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.558000 audit[3626]: AVC avc: denied { bpf } for pid=3626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.558000 audit: BPF prog-id=152 op=LOAD May 17 00:35:20.558000 audit[3626]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00032ab20 items=0 ppid=3579 pid=3626 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.558000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465366330656361626339383130656134363264383136313437663834 May 17 00:35:20.560000 audit[3626]: AVC avc: denied { bpf } for pid=3626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.560000 audit[3626]: AVC avc: denied { bpf } for pid=3626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.560000 audit[3626]: AVC avc: denied { perfmon } for pid=3626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.560000 audit[3626]: AVC avc: denied { perfmon } for pid=3626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.560000 audit[3626]: AVC avc: denied { perfmon } for pid=3626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.560000 audit[3626]: AVC avc: denied { perfmon } for pid=3626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.560000 audit[3626]: AVC avc: denied { perfmon } for pid=3626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.560000 audit[3626]: AVC avc: denied { bpf } for pid=3626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.560000 audit[3626]: AVC avc: denied { bpf } for pid=3626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.560000 audit: BPF prog-id=153 op=LOAD May 17 00:35:20.560000 audit[3626]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00032ab68 items=0 ppid=3579 pid=3626 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.560000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465366330656361626339383130656134363264383136313437663834 May 17 00:35:20.561000 audit: BPF prog-id=153 op=UNLOAD May 17 00:35:20.561000 audit: BPF prog-id=152 op=UNLOAD May 17 00:35:20.561000 audit[3626]: AVC avc: denied { bpf } for pid=3626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.561000 audit[3626]: AVC avc: denied { bpf } for pid=3626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.561000 audit[3626]: AVC avc: denied { bpf } for pid=3626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.561000 audit[3626]: AVC avc: denied { perfmon } for pid=3626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.561000 audit[3626]: AVC avc: denied { perfmon } for pid=3626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.561000 audit[3626]: AVC avc: denied { perfmon } for pid=3626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.561000 audit[3626]: AVC avc: denied { perfmon } for pid=3626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.561000 audit[3626]: AVC avc: denied { perfmon } for pid=3626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.561000 audit[3626]: AVC avc: denied { bpf } for pid=3626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.561000 audit[3626]: AVC avc: denied { bpf } for pid=3626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.561000 audit: BPF prog-id=154 op=LOAD May 17 00:35:20.561000 audit[3626]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00032af78 items=0 ppid=3579 pid=3626 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.561000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465366330656361626339383130656134363264383136313437663834 May 17 00:35:20.596092 env[1212]: time="2025-05-17T00:35:20.596022512Z" level=info msg="StartContainer for \"de6c0ecabc9810ea462d816147f849d5387e6c91e03510079222999fd45dfe9c\" returns successfully" May 17 00:35:20.606430 env[1212]: time="2025-05-17T00:35:20.606351552Z" level=info msg="StopPodSandbox for \"ae6f816b5036db3784b9a7d5e70abd4eee780e7fed3ae1db3d7f7c255a52a286\"" May 17 00:35:20.626000 audit[3637]: AVC avc: denied { getattr } for pid=3637 comm="coredns" path="cgroup:[4026532756]" dev="nsfs" ino=4026532756 scontext=system_u:system_r:svirt_lxc_net_t:s0:c14,c597 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 May 17 00:35:20.626000 audit[3637]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c00005a6f0 a2=c0004f69f8 a3=0 items=0 ppid=3579 pid=3637 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c14,c597 key=(null) May 17 00:35:20.626000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 May 17 00:35:20.775518 env[1212]: 2025-05-17 00:35:20.708 [INFO][3669] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="ae6f816b5036db3784b9a7d5e70abd4eee780e7fed3ae1db3d7f7c255a52a286" May 17 00:35:20.775518 env[1212]: 2025-05-17 00:35:20.709 [INFO][3669] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="ae6f816b5036db3784b9a7d5e70abd4eee780e7fed3ae1db3d7f7c255a52a286" iface="eth0" netns="/var/run/netns/cni-b44bcbf1-f336-09e4-6b9f-d107e316e682" May 17 00:35:20.775518 env[1212]: 2025-05-17 00:35:20.709 [INFO][3669] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="ae6f816b5036db3784b9a7d5e70abd4eee780e7fed3ae1db3d7f7c255a52a286" iface="eth0" netns="/var/run/netns/cni-b44bcbf1-f336-09e4-6b9f-d107e316e682" May 17 00:35:20.775518 env[1212]: 2025-05-17 00:35:20.709 [INFO][3669] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="ae6f816b5036db3784b9a7d5e70abd4eee780e7fed3ae1db3d7f7c255a52a286" iface="eth0" netns="/var/run/netns/cni-b44bcbf1-f336-09e4-6b9f-d107e316e682" May 17 00:35:20.775518 env[1212]: 2025-05-17 00:35:20.709 [INFO][3669] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="ae6f816b5036db3784b9a7d5e70abd4eee780e7fed3ae1db3d7f7c255a52a286" May 17 00:35:20.775518 env[1212]: 2025-05-17 00:35:20.710 [INFO][3669] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ae6f816b5036db3784b9a7d5e70abd4eee780e7fed3ae1db3d7f7c255a52a286" May 17 00:35:20.775518 env[1212]: 2025-05-17 00:35:20.757 [INFO][3679] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ae6f816b5036db3784b9a7d5e70abd4eee780e7fed3ae1db3d7f7c255a52a286" HandleID="k8s-pod-network.ae6f816b5036db3784b9a7d5e70abd4eee780e7fed3ae1db3d7f7c255a52a286" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-csi--node--driver--kpjdk-eth0" May 17 00:35:20.775518 env[1212]: 2025-05-17 00:35:20.757 [INFO][3679] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:35:20.775518 env[1212]: 2025-05-17 00:35:20.758 [INFO][3679] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:35:20.775518 env[1212]: 2025-05-17 00:35:20.768 [WARNING][3679] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ae6f816b5036db3784b9a7d5e70abd4eee780e7fed3ae1db3d7f7c255a52a286" HandleID="k8s-pod-network.ae6f816b5036db3784b9a7d5e70abd4eee780e7fed3ae1db3d7f7c255a52a286" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-csi--node--driver--kpjdk-eth0" May 17 00:35:20.775518 env[1212]: 2025-05-17 00:35:20.768 [INFO][3679] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ae6f816b5036db3784b9a7d5e70abd4eee780e7fed3ae1db3d7f7c255a52a286" HandleID="k8s-pod-network.ae6f816b5036db3784b9a7d5e70abd4eee780e7fed3ae1db3d7f7c255a52a286" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-csi--node--driver--kpjdk-eth0" May 17 00:35:20.775518 env[1212]: 2025-05-17 00:35:20.770 [INFO][3679] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:35:20.775518 env[1212]: 2025-05-17 00:35:20.774 [INFO][3669] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="ae6f816b5036db3784b9a7d5e70abd4eee780e7fed3ae1db3d7f7c255a52a286" May 17 00:35:20.777035 env[1212]: time="2025-05-17T00:35:20.776972976Z" level=info msg="TearDown network for sandbox \"ae6f816b5036db3784b9a7d5e70abd4eee780e7fed3ae1db3d7f7c255a52a286\" successfully" May 17 00:35:20.777196 env[1212]: time="2025-05-17T00:35:20.777166289Z" level=info msg="StopPodSandbox for \"ae6f816b5036db3784b9a7d5e70abd4eee780e7fed3ae1db3d7f7c255a52a286\" returns successfully" May 17 00:35:20.781580 env[1212]: time="2025-05-17T00:35:20.781533589Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-kpjdk,Uid:9a0b64da-0bec-4455-813d-7708414d174b,Namespace:calico-system,Attempt:1,}" May 17 00:35:20.930956 kubelet[2012]: I0517 00:35:20.930876 2012 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-668d6bf9bc-6kzm4" podStartSLOduration=36.930847711 podStartE2EDuration="36.930847711s" podCreationTimestamp="2025-05-17 00:34:44 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:35:20.904535843 +0000 UTC m=+43.585681229" watchObservedRunningTime="2025-05-17 00:35:20.930847711 +0000 UTC m=+43.611993108" May 17 00:35:20.932000 audit[3706]: NETFILTER_CFG table=filter:101 family=2 entries=22 op=nft_register_rule pid=3706 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:35:20.932000 audit[3706]: SYSCALL arch=c000003e syscall=46 success=yes exit=8224 a0=3 a1=7ffc2b26f4c0 a2=0 a3=7ffc2b26f4ac items=0 ppid=2172 pid=3706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.932000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:35:20.936000 audit[3706]: NETFILTER_CFG table=nat:102 family=2 entries=12 op=nft_register_rule pid=3706 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:35:20.936000 audit[3706]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc2b26f4c0 a2=0 a3=0 items=0 ppid=2172 pid=3706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.936000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:35:20.973000 audit[3708]: NETFILTER_CFG table=filter:103 family=2 entries=19 op=nft_register_rule pid=3708 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:35:20.973000 audit[3708]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffe38d37e10 a2=0 a3=7ffe38d37dfc items=0 ppid=2172 pid=3708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.973000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:35:20.979000 audit[3708]: NETFILTER_CFG table=nat:104 family=2 entries=33 op=nft_register_chain pid=3708 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:35:20.979000 audit[3708]: SYSCALL arch=c000003e syscall=46 success=yes exit=13428 a0=3 a1=7ffe38d37e10 a2=0 a3=7ffe38d37dfc items=0 ppid=2172 pid=3708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.979000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:35:21.006930 systemd-networkd[1016]: calic0e0f164190: Link UP May 17 00:35:21.018416 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calic0e0f164190: link becomes ready May 17 00:35:21.018688 systemd-networkd[1016]: calic0e0f164190: Gained carrier May 17 00:35:21.050184 env[1212]: 2025-05-17 00:35:20.825 [INFO][3686] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 17 00:35:21.050184 env[1212]: 2025-05-17 00:35:20.841 [INFO][3686] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-csi--node--driver--kpjdk-eth0 csi-node-driver- calico-system 9a0b64da-0bec-4455-813d-7708414d174b 946 0 2025-05-17 00:34:58 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:78f6f74485 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758 csi-node-driver-kpjdk eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] calic0e0f164190 [] [] }} ContainerID="bb107d470c9792b792c0a8cc56dc38513f86f4cd856146d650c48504effd925f" Namespace="calico-system" Pod="csi-node-driver-kpjdk" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-csi--node--driver--kpjdk-" May 17 00:35:21.050184 env[1212]: 2025-05-17 00:35:20.841 [INFO][3686] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="bb107d470c9792b792c0a8cc56dc38513f86f4cd856146d650c48504effd925f" Namespace="calico-system" Pod="csi-node-driver-kpjdk" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-csi--node--driver--kpjdk-eth0" May 17 00:35:21.050184 env[1212]: 2025-05-17 00:35:20.891 [INFO][3698] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="bb107d470c9792b792c0a8cc56dc38513f86f4cd856146d650c48504effd925f" HandleID="k8s-pod-network.bb107d470c9792b792c0a8cc56dc38513f86f4cd856146d650c48504effd925f" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-csi--node--driver--kpjdk-eth0" May 17 00:35:21.050184 env[1212]: 2025-05-17 00:35:20.891 [INFO][3698] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="bb107d470c9792b792c0a8cc56dc38513f86f4cd856146d650c48504effd925f" HandleID="k8s-pod-network.bb107d470c9792b792c0a8cc56dc38513f86f4cd856146d650c48504effd925f" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-csi--node--driver--kpjdk-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000235630), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758", "pod":"csi-node-driver-kpjdk", "timestamp":"2025-05-17 00:35:20.891271165 +0000 UTC"}, Hostname:"ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:35:21.050184 env[1212]: 2025-05-17 00:35:20.892 [INFO][3698] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:35:21.050184 env[1212]: 2025-05-17 00:35:20.892 [INFO][3698] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:35:21.050184 env[1212]: 2025-05-17 00:35:20.892 [INFO][3698] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758' May 17 00:35:21.050184 env[1212]: 2025-05-17 00:35:20.916 [INFO][3698] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.bb107d470c9792b792c0a8cc56dc38513f86f4cd856146d650c48504effd925f" host="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:35:21.050184 env[1212]: 2025-05-17 00:35:20.958 [INFO][3698] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:35:21.050184 env[1212]: 2025-05-17 00:35:20.971 [INFO][3698] ipam/ipam.go 511: Trying affinity for 192.168.43.128/26 host="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:35:21.050184 env[1212]: 2025-05-17 00:35:20.976 [INFO][3698] ipam/ipam.go 158: Attempting to load block cidr=192.168.43.128/26 host="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:35:21.050184 env[1212]: 2025-05-17 00:35:20.979 [INFO][3698] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.43.128/26 host="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:35:21.050184 env[1212]: 2025-05-17 00:35:20.979 [INFO][3698] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.43.128/26 handle="k8s-pod-network.bb107d470c9792b792c0a8cc56dc38513f86f4cd856146d650c48504effd925f" host="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:35:21.050184 env[1212]: 2025-05-17 00:35:20.981 [INFO][3698] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.bb107d470c9792b792c0a8cc56dc38513f86f4cd856146d650c48504effd925f May 17 00:35:21.050184 env[1212]: 2025-05-17 00:35:20.988 [INFO][3698] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.43.128/26 handle="k8s-pod-network.bb107d470c9792b792c0a8cc56dc38513f86f4cd856146d650c48504effd925f" host="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:35:21.050184 env[1212]: 2025-05-17 00:35:20.999 [INFO][3698] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.43.132/26] block=192.168.43.128/26 handle="k8s-pod-network.bb107d470c9792b792c0a8cc56dc38513f86f4cd856146d650c48504effd925f" host="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:35:21.050184 env[1212]: 2025-05-17 00:35:21.000 [INFO][3698] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.43.132/26] handle="k8s-pod-network.bb107d470c9792b792c0a8cc56dc38513f86f4cd856146d650c48504effd925f" host="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:35:21.050184 env[1212]: 2025-05-17 00:35:21.000 [INFO][3698] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:35:21.050184 env[1212]: 2025-05-17 00:35:21.000 [INFO][3698] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.43.132/26] IPv6=[] ContainerID="bb107d470c9792b792c0a8cc56dc38513f86f4cd856146d650c48504effd925f" HandleID="k8s-pod-network.bb107d470c9792b792c0a8cc56dc38513f86f4cd856146d650c48504effd925f" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-csi--node--driver--kpjdk-eth0" May 17 00:35:21.051208 env[1212]: 2025-05-17 00:35:21.002 [INFO][3686] cni-plugin/k8s.go 418: Populated endpoint ContainerID="bb107d470c9792b792c0a8cc56dc38513f86f4cd856146d650c48504effd925f" Namespace="calico-system" Pod="csi-node-driver-kpjdk" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-csi--node--driver--kpjdk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-csi--node--driver--kpjdk-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"9a0b64da-0bec-4455-813d-7708414d174b", ResourceVersion:"946", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 34, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758", ContainerID:"", Pod:"csi-node-driver-kpjdk", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.43.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calic0e0f164190", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:35:21.051208 env[1212]: 2025-05-17 00:35:21.002 [INFO][3686] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.43.132/32] ContainerID="bb107d470c9792b792c0a8cc56dc38513f86f4cd856146d650c48504effd925f" Namespace="calico-system" Pod="csi-node-driver-kpjdk" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-csi--node--driver--kpjdk-eth0" May 17 00:35:21.051208 env[1212]: 2025-05-17 00:35:21.002 [INFO][3686] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calic0e0f164190 ContainerID="bb107d470c9792b792c0a8cc56dc38513f86f4cd856146d650c48504effd925f" Namespace="calico-system" Pod="csi-node-driver-kpjdk" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-csi--node--driver--kpjdk-eth0" May 17 00:35:21.051208 env[1212]: 2025-05-17 00:35:21.019 [INFO][3686] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="bb107d470c9792b792c0a8cc56dc38513f86f4cd856146d650c48504effd925f" Namespace="calico-system" Pod="csi-node-driver-kpjdk" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-csi--node--driver--kpjdk-eth0" May 17 00:35:21.051208 env[1212]: 2025-05-17 00:35:21.021 [INFO][3686] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="bb107d470c9792b792c0a8cc56dc38513f86f4cd856146d650c48504effd925f" Namespace="calico-system" Pod="csi-node-driver-kpjdk" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-csi--node--driver--kpjdk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-csi--node--driver--kpjdk-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"9a0b64da-0bec-4455-813d-7708414d174b", ResourceVersion:"946", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 34, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758", ContainerID:"bb107d470c9792b792c0a8cc56dc38513f86f4cd856146d650c48504effd925f", Pod:"csi-node-driver-kpjdk", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.43.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calic0e0f164190", MAC:"a6:44:6c:7e:36:26", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:35:21.051208 env[1212]: 2025-05-17 00:35:21.044 [INFO][3686] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="bb107d470c9792b792c0a8cc56dc38513f86f4cd856146d650c48504effd925f" Namespace="calico-system" Pod="csi-node-driver-kpjdk" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-csi--node--driver--kpjdk-eth0" May 17 00:35:21.069159 env[1212]: time="2025-05-17T00:35:21.068819324Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:35:21.069159 env[1212]: time="2025-05-17T00:35:21.068896787Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:35:21.069159 env[1212]: time="2025-05-17T00:35:21.068930879Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:35:21.069633 env[1212]: time="2025-05-17T00:35:21.069535322Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bb107d470c9792b792c0a8cc56dc38513f86f4cd856146d650c48504effd925f pid=3724 runtime=io.containerd.runc.v2 May 17 00:35:21.097958 systemd[1]: run-netns-cni\x2db44bcbf1\x2df336\x2d09e4\x2d6b9f\x2dd107e316e682.mount: Deactivated successfully. May 17 00:35:21.115935 systemd[1]: Started cri-containerd-bb107d470c9792b792c0a8cc56dc38513f86f4cd856146d650c48504effd925f.scope. May 17 00:35:21.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:21.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:21.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:21.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:21.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:21.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:21.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:21.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:21.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:21.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:21.155000 audit: BPF prog-id=155 op=LOAD May 17 00:35:21.156000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:21.156000 audit[3733]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3724 pid=3733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:21.156000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262313037643437306339373932623739326330613863633536646333 May 17 00:35:21.156000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:21.156000 audit[3733]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=3724 pid=3733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:21.156000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262313037643437306339373932623739326330613863633536646333 May 17 00:35:21.156000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:21.156000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:21.156000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:21.156000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:21.156000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:21.156000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:21.156000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:21.156000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:21.156000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:21.156000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:21.156000 audit: BPF prog-id=156 op=LOAD May 17 00:35:21.156000 audit[3733]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c00029a660 items=0 ppid=3724 pid=3733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:21.156000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262313037643437306339373932623739326330613863633536646333 May 17 00:35:21.156000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:21.156000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:21.156000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:21.156000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:21.156000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:21.156000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:21.156000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:21.156000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:21.156000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:21.156000 audit: BPF prog-id=157 op=LOAD May 17 00:35:21.156000 audit[3733]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c00029a6a8 items=0 ppid=3724 pid=3733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:21.156000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262313037643437306339373932623739326330613863633536646333 May 17 00:35:21.156000 audit: BPF prog-id=157 op=UNLOAD May 17 00:35:21.156000 audit: BPF prog-id=156 op=UNLOAD May 17 00:35:21.156000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:21.156000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:21.156000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:21.156000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:21.156000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:21.156000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:21.156000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:21.156000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:21.156000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:21.156000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:21.156000 audit: BPF prog-id=158 op=LOAD May 17 00:35:21.156000 audit[3733]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c00029aab8 items=0 ppid=3724 pid=3733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:21.156000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262313037643437306339373932623739326330613863633536646333 May 17 00:35:21.180198 env[1212]: time="2025-05-17T00:35:21.180144389Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-kpjdk,Uid:9a0b64da-0bec-4455-813d-7708414d174b,Namespace:calico-system,Attempt:1,} returns sandbox id \"bb107d470c9792b792c0a8cc56dc38513f86f4cd856146d650c48504effd925f\"" May 17 00:35:21.349590 systemd-networkd[1016]: caliec1af03241e: Gained IPv6LL May 17 00:35:21.467598 kubelet[2012]: I0517 00:35:21.467268 2012 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:35:21.733612 systemd-networkd[1016]: calib9951cfd5c4: Gained IPv6LL May 17 00:35:22.150331 kernel: kauditd_printk_skb: 374 callbacks suppressed May 17 00:35:22.150501 kernel: audit: type=1325 audit(1747442122.127:1094): table=filter:105 family=2 entries=15 op=nft_register_rule pid=3798 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:35:22.127000 audit[3798]: NETFILTER_CFG table=filter:105 family=2 entries=15 op=nft_register_rule pid=3798 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:35:22.127000 audit[3798]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7fff8f9d9970 a2=0 a3=7fff8f9d995c items=0 ppid=2172 pid=3798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:22.199638 kernel: audit: type=1300 audit(1747442122.127:1094): arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7fff8f9d9970 a2=0 a3=7fff8f9d995c items=0 ppid=2172 pid=3798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:22.199781 kernel: audit: type=1327 audit(1747442122.127:1094): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:35:22.127000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:35:22.216267 kernel: audit: type=1325 audit(1747442122.161:1095): table=nat:106 family=2 entries=25 op=nft_register_chain pid=3798 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:35:22.161000 audit[3798]: NETFILTER_CFG table=nat:106 family=2 entries=25 op=nft_register_chain pid=3798 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:35:22.251172 kernel: audit: type=1300 audit(1747442122.161:1095): arch=c000003e syscall=46 success=yes exit=8580 a0=3 a1=7fff8f9d9970 a2=0 a3=7fff8f9d995c items=0 ppid=2172 pid=3798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:22.161000 audit[3798]: SYSCALL arch=c000003e syscall=46 success=yes exit=8580 a0=3 a1=7fff8f9d9970 a2=0 a3=7fff8f9d995c items=0 ppid=2172 pid=3798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:22.161000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:35:22.268452 kernel: audit: type=1327 audit(1747442122.161:1095): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:35:22.387000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:22.409991 kernel: audit: type=1400 audit(1747442122.387:1096): avc: denied { bpf } for pid=3825 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:22.438399 kernel: audit: type=1400 audit(1747442122.387:1096): avc: denied { bpf } for pid=3825 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:22.387000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:22.387000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:22.483724 kernel: audit: type=1400 audit(1747442122.387:1096): avc: denied { perfmon } for pid=3825 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:22.483905 kernel: audit: type=1400 audit(1747442122.387:1096): avc: denied { perfmon } for pid=3825 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:22.387000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:22.387000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:22.387000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:22.387000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:22.387000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:22.387000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:22.387000 audit: BPF prog-id=159 op=LOAD May 17 00:35:22.387000 audit[3825]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd77465290 a2=98 a3=3 items=0 ppid=3777 pid=3825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:22.387000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:35:22.410000 audit: BPF prog-id=159 op=UNLOAD May 17 00:35:22.410000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:22.410000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:22.410000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:22.410000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:22.410000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:22.410000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:22.410000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:22.410000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:22.410000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:22.410000 audit: BPF prog-id=160 op=LOAD May 17 00:35:22.410000 audit[3825]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd77465080 a2=94 a3=54428f items=0 ppid=3777 pid=3825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:22.410000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:35:22.410000 audit: BPF prog-id=160 op=UNLOAD May 17 00:35:22.410000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:22.410000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:22.410000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:22.410000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:22.410000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:22.410000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:22.410000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:22.410000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:22.410000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:22.410000 audit: BPF prog-id=161 op=LOAD May 17 00:35:22.410000 audit[3825]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd774650b0 a2=94 a3=2 items=0 ppid=3777 pid=3825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:22.410000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:35:22.411000 audit: BPF prog-id=161 op=UNLOAD May 17 00:35:22.607003 env[1212]: time="2025-05-17T00:35:22.606950648Z" level=info msg="StopPodSandbox for \"7eccfb45669ec6645d158891b10a770ecdedbe69d219b47e4d21a3e9c0413b0d\"" May 17 00:35:22.618555 env[1212]: time="2025-05-17T00:35:22.618483729Z" level=info msg="StopPodSandbox for \"f14ba2115524ea20392546b4b007b25bca35212c09d8bc580b78280805199eaf\"" May 17 00:35:22.631094 systemd-networkd[1016]: calic0e0f164190: Gained IPv6LL May 17 00:35:23.000393 env[1212]: 2025-05-17 00:35:22.872 [INFO][3845] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="f14ba2115524ea20392546b4b007b25bca35212c09d8bc580b78280805199eaf" May 17 00:35:23.000393 env[1212]: 2025-05-17 00:35:22.873 [INFO][3845] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="f14ba2115524ea20392546b4b007b25bca35212c09d8bc580b78280805199eaf" iface="eth0" netns="/var/run/netns/cni-c0685a08-34b3-0727-2921-f3de0dce184d" May 17 00:35:23.000393 env[1212]: 2025-05-17 00:35:22.873 [INFO][3845] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="f14ba2115524ea20392546b4b007b25bca35212c09d8bc580b78280805199eaf" iface="eth0" netns="/var/run/netns/cni-c0685a08-34b3-0727-2921-f3de0dce184d" May 17 00:35:23.000393 env[1212]: 2025-05-17 00:35:22.873 [INFO][3845] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="f14ba2115524ea20392546b4b007b25bca35212c09d8bc580b78280805199eaf" iface="eth0" netns="/var/run/netns/cni-c0685a08-34b3-0727-2921-f3de0dce184d" May 17 00:35:23.000393 env[1212]: 2025-05-17 00:35:22.873 [INFO][3845] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="f14ba2115524ea20392546b4b007b25bca35212c09d8bc580b78280805199eaf" May 17 00:35:23.000393 env[1212]: 2025-05-17 00:35:22.873 [INFO][3845] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f14ba2115524ea20392546b4b007b25bca35212c09d8bc580b78280805199eaf" May 17 00:35:23.000393 env[1212]: 2025-05-17 00:35:22.963 [INFO][3862] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f14ba2115524ea20392546b4b007b25bca35212c09d8bc580b78280805199eaf" HandleID="k8s-pod-network.f14ba2115524ea20392546b4b007b25bca35212c09d8bc580b78280805199eaf" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-calico--apiserver--68444b4b45--l4vgc-eth0" May 17 00:35:23.000393 env[1212]: 2025-05-17 00:35:22.964 [INFO][3862] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:35:23.000393 env[1212]: 2025-05-17 00:35:22.964 [INFO][3862] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:35:23.000393 env[1212]: 2025-05-17 00:35:22.989 [WARNING][3862] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f14ba2115524ea20392546b4b007b25bca35212c09d8bc580b78280805199eaf" HandleID="k8s-pod-network.f14ba2115524ea20392546b4b007b25bca35212c09d8bc580b78280805199eaf" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-calico--apiserver--68444b4b45--l4vgc-eth0" May 17 00:35:23.000393 env[1212]: 2025-05-17 00:35:22.989 [INFO][3862] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f14ba2115524ea20392546b4b007b25bca35212c09d8bc580b78280805199eaf" HandleID="k8s-pod-network.f14ba2115524ea20392546b4b007b25bca35212c09d8bc580b78280805199eaf" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-calico--apiserver--68444b4b45--l4vgc-eth0" May 17 00:35:23.000393 env[1212]: 2025-05-17 00:35:22.993 [INFO][3862] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:35:23.000393 env[1212]: 2025-05-17 00:35:22.995 [INFO][3845] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="f14ba2115524ea20392546b4b007b25bca35212c09d8bc580b78280805199eaf" May 17 00:35:23.006608 systemd[1]: run-netns-cni\x2dc0685a08\x2d34b3\x2d0727\x2d2921\x2df3de0dce184d.mount: Deactivated successfully. May 17 00:35:23.009109 env[1212]: time="2025-05-17T00:35:23.009033304Z" level=info msg="TearDown network for sandbox \"f14ba2115524ea20392546b4b007b25bca35212c09d8bc580b78280805199eaf\" successfully" May 17 00:35:23.009267 env[1212]: time="2025-05-17T00:35:23.009107735Z" level=info msg="StopPodSandbox for \"f14ba2115524ea20392546b4b007b25bca35212c09d8bc580b78280805199eaf\" returns successfully" May 17 00:35:23.010318 env[1212]: time="2025-05-17T00:35:23.010273308Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-68444b4b45-l4vgc,Uid:965767b7-1792-4c91-b4d9-b8c2d202747e,Namespace:calico-apiserver,Attempt:1,}" May 17 00:35:23.063526 env[1212]: 2025-05-17 00:35:22.837 [INFO][3841] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="7eccfb45669ec6645d158891b10a770ecdedbe69d219b47e4d21a3e9c0413b0d" May 17 00:35:23.063526 env[1212]: 2025-05-17 00:35:22.838 [INFO][3841] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="7eccfb45669ec6645d158891b10a770ecdedbe69d219b47e4d21a3e9c0413b0d" iface="eth0" netns="/var/run/netns/cni-e62218aa-fc64-82bb-26f6-35ba419b1df5" May 17 00:35:23.063526 env[1212]: 2025-05-17 00:35:22.838 [INFO][3841] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="7eccfb45669ec6645d158891b10a770ecdedbe69d219b47e4d21a3e9c0413b0d" iface="eth0" netns="/var/run/netns/cni-e62218aa-fc64-82bb-26f6-35ba419b1df5" May 17 00:35:23.063526 env[1212]: 2025-05-17 00:35:22.838 [INFO][3841] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="7eccfb45669ec6645d158891b10a770ecdedbe69d219b47e4d21a3e9c0413b0d" iface="eth0" netns="/var/run/netns/cni-e62218aa-fc64-82bb-26f6-35ba419b1df5" May 17 00:35:23.063526 env[1212]: 2025-05-17 00:35:22.838 [INFO][3841] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="7eccfb45669ec6645d158891b10a770ecdedbe69d219b47e4d21a3e9c0413b0d" May 17 00:35:23.063526 env[1212]: 2025-05-17 00:35:22.838 [INFO][3841] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7eccfb45669ec6645d158891b10a770ecdedbe69d219b47e4d21a3e9c0413b0d" May 17 00:35:23.063526 env[1212]: 2025-05-17 00:35:22.966 [INFO][3857] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7eccfb45669ec6645d158891b10a770ecdedbe69d219b47e4d21a3e9c0413b0d" HandleID="k8s-pod-network.7eccfb45669ec6645d158891b10a770ecdedbe69d219b47e4d21a3e9c0413b0d" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-goldmane--78d55f7ddc--8tw2k-eth0" May 17 00:35:23.063526 env[1212]: 2025-05-17 00:35:22.967 [INFO][3857] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:35:23.063526 env[1212]: 2025-05-17 00:35:22.993 [INFO][3857] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:35:23.063526 env[1212]: 2025-05-17 00:35:23.041 [WARNING][3857] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7eccfb45669ec6645d158891b10a770ecdedbe69d219b47e4d21a3e9c0413b0d" HandleID="k8s-pod-network.7eccfb45669ec6645d158891b10a770ecdedbe69d219b47e4d21a3e9c0413b0d" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-goldmane--78d55f7ddc--8tw2k-eth0" May 17 00:35:23.063526 env[1212]: 2025-05-17 00:35:23.041 [INFO][3857] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7eccfb45669ec6645d158891b10a770ecdedbe69d219b47e4d21a3e9c0413b0d" HandleID="k8s-pod-network.7eccfb45669ec6645d158891b10a770ecdedbe69d219b47e4d21a3e9c0413b0d" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-goldmane--78d55f7ddc--8tw2k-eth0" May 17 00:35:23.063526 env[1212]: 2025-05-17 00:35:23.044 [INFO][3857] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:35:23.063526 env[1212]: 2025-05-17 00:35:23.052 [INFO][3841] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="7eccfb45669ec6645d158891b10a770ecdedbe69d219b47e4d21a3e9c0413b0d" May 17 00:35:23.073598 systemd[1]: run-netns-cni\x2de62218aa\x2dfc64\x2d82bb\x2d26f6\x2d35ba419b1df5.mount: Deactivated successfully. May 17 00:35:23.087182 env[1212]: time="2025-05-17T00:35:23.087123470Z" level=info msg="TearDown network for sandbox \"7eccfb45669ec6645d158891b10a770ecdedbe69d219b47e4d21a3e9c0413b0d\" successfully" May 17 00:35:23.087433 env[1212]: time="2025-05-17T00:35:23.087402322Z" level=info msg="StopPodSandbox for \"7eccfb45669ec6645d158891b10a770ecdedbe69d219b47e4d21a3e9c0413b0d\" returns successfully" May 17 00:35:23.091926 env[1212]: time="2025-05-17T00:35:23.091876828Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-78d55f7ddc-8tw2k,Uid:6fdee754-80af-4193-bcf6-93825e6ce6df,Namespace:calico-system,Attempt:1,}" May 17 00:35:23.181000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.181000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.181000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.181000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.181000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.181000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.181000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.181000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.181000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.181000 audit: BPF prog-id=162 op=LOAD May 17 00:35:23.181000 audit[3825]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd77464f70 a2=94 a3=1 items=0 ppid=3777 pid=3825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:23.181000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:35:23.181000 audit: BPF prog-id=162 op=UNLOAD May 17 00:35:23.181000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.181000 audit[3825]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd77465040 a2=50 a3=7ffd77465120 items=0 ppid=3777 pid=3825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:23.181000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:35:23.208000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.208000 audit[3825]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd77464f80 a2=28 a3=0 items=0 ppid=3777 pid=3825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:23.208000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:35:23.208000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.208000 audit[3825]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd77464fb0 a2=28 a3=0 items=0 ppid=3777 pid=3825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:23.208000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:35:23.208000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.208000 audit[3825]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd77464ec0 a2=28 a3=0 items=0 ppid=3777 pid=3825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:23.208000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:35:23.208000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.208000 audit[3825]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd77464fd0 a2=28 a3=0 items=0 ppid=3777 pid=3825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:23.208000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:35:23.208000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.208000 audit[3825]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd77464fb0 a2=28 a3=0 items=0 ppid=3777 pid=3825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:23.208000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:35:23.208000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.208000 audit[3825]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd77464fa0 a2=28 a3=0 items=0 ppid=3777 pid=3825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:23.208000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:35:23.208000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.208000 audit[3825]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd77464fd0 a2=28 a3=0 items=0 ppid=3777 pid=3825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:23.208000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:35:23.208000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.208000 audit[3825]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd77464fb0 a2=28 a3=0 items=0 ppid=3777 pid=3825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:23.208000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:35:23.208000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.208000 audit[3825]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd77464fd0 a2=28 a3=0 items=0 ppid=3777 pid=3825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:23.208000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:35:23.208000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.208000 audit[3825]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd77464fa0 a2=28 a3=0 items=0 ppid=3777 pid=3825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:23.208000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:35:23.209000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.209000 audit[3825]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd77465010 a2=28 a3=0 items=0 ppid=3777 pid=3825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:23.209000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:35:23.209000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.209000 audit[3825]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd77464dc0 a2=50 a3=1 items=0 ppid=3777 pid=3825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:23.209000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:35:23.209000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.209000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.209000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.209000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.209000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.209000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.209000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.209000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.209000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.209000 audit: BPF prog-id=163 op=LOAD May 17 00:35:23.209000 audit[3825]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd77464dc0 a2=94 a3=5 items=0 ppid=3777 pid=3825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:23.209000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:35:23.209000 audit: BPF prog-id=163 op=UNLOAD May 17 00:35:23.209000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.209000 audit[3825]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd77464e70 a2=50 a3=1 items=0 ppid=3777 pid=3825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:23.209000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:35:23.209000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.209000 audit[3825]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffd77464f90 a2=4 a3=38 items=0 ppid=3777 pid=3825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:23.209000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:35:23.209000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.209000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.209000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.209000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.209000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.209000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.209000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.209000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.209000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.209000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.209000 audit[3825]: AVC avc: denied { confidentiality } for pid=3825 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:35:23.209000 audit[3825]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd77464fe0 a2=94 a3=6 items=0 ppid=3777 pid=3825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:23.209000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:35:23.210000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.210000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.210000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.210000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.210000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.210000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.210000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.210000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.210000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.210000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.210000 audit[3825]: AVC avc: denied { confidentiality } for pid=3825 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:35:23.210000 audit[3825]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd77464790 a2=94 a3=88 items=0 ppid=3777 pid=3825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:23.210000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:35:23.212000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.212000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.212000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.212000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.212000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.212000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.212000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.212000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.212000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.212000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.212000 audit[3825]: AVC avc: denied { confidentiality } for pid=3825 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:35:23.212000 audit[3825]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd77464790 a2=94 a3=88 items=0 ppid=3777 pid=3825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:23.212000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:35:23.257000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.257000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.257000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.257000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.257000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.257000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.257000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.257000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.257000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.257000 audit: BPF prog-id=164 op=LOAD May 17 00:35:23.257000 audit[3904]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffce373c190 a2=98 a3=1999999999999999 items=0 ppid=3777 pid=3904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:23.257000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 00:35:23.257000 audit: BPF prog-id=164 op=UNLOAD May 17 00:35:23.257000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.257000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.257000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.257000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.257000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.257000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.257000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.257000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.257000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.257000 audit: BPF prog-id=165 op=LOAD May 17 00:35:23.257000 audit[3904]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffce373c070 a2=94 a3=ffff items=0 ppid=3777 pid=3904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:23.257000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 00:35:23.257000 audit: BPF prog-id=165 op=UNLOAD May 17 00:35:23.257000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.257000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.257000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.257000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.257000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.257000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.257000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.257000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.257000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.257000 audit: BPF prog-id=166 op=LOAD May 17 00:35:23.257000 audit[3904]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffce373c0b0 a2=94 a3=7ffce373c290 items=0 ppid=3777 pid=3904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:23.257000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 00:35:23.257000 audit: BPF prog-id=166 op=UNLOAD May 17 00:35:23.434533 systemd-networkd[1016]: calif7497a94ddf: Link UP May 17 00:35:23.440508 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:35:23.440642 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calif7497a94ddf: link becomes ready May 17 00:35:23.455334 systemd-networkd[1016]: calif7497a94ddf: Gained carrier May 17 00:35:23.502612 systemd-networkd[1016]: vxlan.calico: Link UP May 17 00:35:23.502626 systemd-networkd[1016]: vxlan.calico: Gained carrier May 17 00:35:23.524752 env[1212]: 2025-05-17 00:35:23.206 [INFO][3881] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-goldmane--78d55f7ddc--8tw2k-eth0 goldmane-78d55f7ddc- calico-system 6fdee754-80af-4193-bcf6-93825e6ce6df 972 0 2025-05-17 00:34:57 +0000 UTC map[app.kubernetes.io/name:goldmane k8s-app:goldmane pod-template-hash:78d55f7ddc projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:goldmane] map[] [] [] []} {k8s ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758 goldmane-78d55f7ddc-8tw2k eth0 goldmane [] [] [kns.calico-system ksa.calico-system.goldmane] calif7497a94ddf [] [] }} ContainerID="d514889c403002666dda612b4986a3034a57942503428ec928901f46a8fdffa6" Namespace="calico-system" Pod="goldmane-78d55f7ddc-8tw2k" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-goldmane--78d55f7ddc--8tw2k-" May 17 00:35:23.524752 env[1212]: 2025-05-17 00:35:23.207 [INFO][3881] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="d514889c403002666dda612b4986a3034a57942503428ec928901f46a8fdffa6" Namespace="calico-system" Pod="goldmane-78d55f7ddc-8tw2k" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-goldmane--78d55f7ddc--8tw2k-eth0" May 17 00:35:23.524752 env[1212]: 2025-05-17 00:35:23.332 [INFO][3898] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d514889c403002666dda612b4986a3034a57942503428ec928901f46a8fdffa6" HandleID="k8s-pod-network.d514889c403002666dda612b4986a3034a57942503428ec928901f46a8fdffa6" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-goldmane--78d55f7ddc--8tw2k-eth0" May 17 00:35:23.524752 env[1212]: 2025-05-17 00:35:23.334 [INFO][3898] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="d514889c403002666dda612b4986a3034a57942503428ec928901f46a8fdffa6" HandleID="k8s-pod-network.d514889c403002666dda612b4986a3034a57942503428ec928901f46a8fdffa6" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-goldmane--78d55f7ddc--8tw2k-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00032a4d0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758", "pod":"goldmane-78d55f7ddc-8tw2k", "timestamp":"2025-05-17 00:35:23.33259502 +0000 UTC"}, Hostname:"ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:35:23.524752 env[1212]: 2025-05-17 00:35:23.334 [INFO][3898] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:35:23.524752 env[1212]: 2025-05-17 00:35:23.334 [INFO][3898] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:35:23.524752 env[1212]: 2025-05-17 00:35:23.338 [INFO][3898] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758' May 17 00:35:23.524752 env[1212]: 2025-05-17 00:35:23.363 [INFO][3898] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.d514889c403002666dda612b4986a3034a57942503428ec928901f46a8fdffa6" host="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:35:23.524752 env[1212]: 2025-05-17 00:35:23.371 [INFO][3898] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:35:23.524752 env[1212]: 2025-05-17 00:35:23.382 [INFO][3898] ipam/ipam.go 511: Trying affinity for 192.168.43.128/26 host="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:35:23.524752 env[1212]: 2025-05-17 00:35:23.386 [INFO][3898] ipam/ipam.go 158: Attempting to load block cidr=192.168.43.128/26 host="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:35:23.524752 env[1212]: 2025-05-17 00:35:23.394 [INFO][3898] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.43.128/26 host="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:35:23.524752 env[1212]: 2025-05-17 00:35:23.394 [INFO][3898] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.43.128/26 handle="k8s-pod-network.d514889c403002666dda612b4986a3034a57942503428ec928901f46a8fdffa6" host="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:35:23.524752 env[1212]: 2025-05-17 00:35:23.399 [INFO][3898] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.d514889c403002666dda612b4986a3034a57942503428ec928901f46a8fdffa6 May 17 00:35:23.524752 env[1212]: 2025-05-17 00:35:23.407 [INFO][3898] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.43.128/26 handle="k8s-pod-network.d514889c403002666dda612b4986a3034a57942503428ec928901f46a8fdffa6" host="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:35:23.524752 env[1212]: 2025-05-17 00:35:23.416 [INFO][3898] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.43.133/26] block=192.168.43.128/26 handle="k8s-pod-network.d514889c403002666dda612b4986a3034a57942503428ec928901f46a8fdffa6" host="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:35:23.524752 env[1212]: 2025-05-17 00:35:23.416 [INFO][3898] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.43.133/26] handle="k8s-pod-network.d514889c403002666dda612b4986a3034a57942503428ec928901f46a8fdffa6" host="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:35:23.524752 env[1212]: 2025-05-17 00:35:23.417 [INFO][3898] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:35:23.524752 env[1212]: 2025-05-17 00:35:23.417 [INFO][3898] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.43.133/26] IPv6=[] ContainerID="d514889c403002666dda612b4986a3034a57942503428ec928901f46a8fdffa6" HandleID="k8s-pod-network.d514889c403002666dda612b4986a3034a57942503428ec928901f46a8fdffa6" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-goldmane--78d55f7ddc--8tw2k-eth0" May 17 00:35:23.526070 env[1212]: 2025-05-17 00:35:23.424 [INFO][3881] cni-plugin/k8s.go 418: Populated endpoint ContainerID="d514889c403002666dda612b4986a3034a57942503428ec928901f46a8fdffa6" Namespace="calico-system" Pod="goldmane-78d55f7ddc-8tw2k" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-goldmane--78d55f7ddc--8tw2k-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-goldmane--78d55f7ddc--8tw2k-eth0", GenerateName:"goldmane-78d55f7ddc-", Namespace:"calico-system", SelfLink:"", UID:"6fdee754-80af-4193-bcf6-93825e6ce6df", ResourceVersion:"972", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 34, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"78d55f7ddc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758", ContainerID:"", Pod:"goldmane-78d55f7ddc-8tw2k", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.43.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"calif7497a94ddf", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:35:23.526070 env[1212]: 2025-05-17 00:35:23.424 [INFO][3881] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.43.133/32] ContainerID="d514889c403002666dda612b4986a3034a57942503428ec928901f46a8fdffa6" Namespace="calico-system" Pod="goldmane-78d55f7ddc-8tw2k" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-goldmane--78d55f7ddc--8tw2k-eth0" May 17 00:35:23.526070 env[1212]: 2025-05-17 00:35:23.424 [INFO][3881] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calif7497a94ddf ContainerID="d514889c403002666dda612b4986a3034a57942503428ec928901f46a8fdffa6" Namespace="calico-system" Pod="goldmane-78d55f7ddc-8tw2k" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-goldmane--78d55f7ddc--8tw2k-eth0" May 17 00:35:23.526070 env[1212]: 2025-05-17 00:35:23.456 [INFO][3881] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="d514889c403002666dda612b4986a3034a57942503428ec928901f46a8fdffa6" Namespace="calico-system" Pod="goldmane-78d55f7ddc-8tw2k" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-goldmane--78d55f7ddc--8tw2k-eth0" May 17 00:35:23.526070 env[1212]: 2025-05-17 00:35:23.457 [INFO][3881] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="d514889c403002666dda612b4986a3034a57942503428ec928901f46a8fdffa6" Namespace="calico-system" Pod="goldmane-78d55f7ddc-8tw2k" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-goldmane--78d55f7ddc--8tw2k-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-goldmane--78d55f7ddc--8tw2k-eth0", GenerateName:"goldmane-78d55f7ddc-", Namespace:"calico-system", SelfLink:"", UID:"6fdee754-80af-4193-bcf6-93825e6ce6df", ResourceVersion:"972", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 34, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"78d55f7ddc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758", ContainerID:"d514889c403002666dda612b4986a3034a57942503428ec928901f46a8fdffa6", Pod:"goldmane-78d55f7ddc-8tw2k", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.43.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"calif7497a94ddf", MAC:"26:99:83:f5:fd:ca", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:35:23.526070 env[1212]: 2025-05-17 00:35:23.514 [INFO][3881] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="d514889c403002666dda612b4986a3034a57942503428ec928901f46a8fdffa6" Namespace="calico-system" Pod="goldmane-78d55f7ddc-8tw2k" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-goldmane--78d55f7ddc--8tw2k-eth0" May 17 00:35:23.557687 env[1212]: time="2025-05-17T00:35:23.557605257Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:35:23.557962 env[1212]: time="2025-05-17T00:35:23.557922701Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:35:23.558112 env[1212]: time="2025-05-17T00:35:23.558077970Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:35:23.558498 env[1212]: time="2025-05-17T00:35:23.558452689Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d514889c403002666dda612b4986a3034a57942503428ec928901f46a8fdffa6 pid=3949 runtime=io.containerd.runc.v2 May 17 00:35:23.601423 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid1a7f4f4789: link becomes ready May 17 00:35:23.605564 systemd-networkd[1016]: calid1a7f4f4789: Link UP May 17 00:35:23.607903 systemd-networkd[1016]: calid1a7f4f4789: Gained carrier May 17 00:35:23.615965 env[1212]: time="2025-05-17T00:35:23.615923822Z" level=info msg="StopPodSandbox for \"67f1562eb02da319fa4fd938337ef3a583cef2fe3e70af43746166b722e25914\"" May 17 00:35:23.623000 audit[3968]: AVC avc: denied { bpf } for pid=3968 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.623000 audit[3968]: AVC avc: denied { bpf } for pid=3968 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.623000 audit[3968]: AVC avc: denied { perfmon } for pid=3968 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.623000 audit[3968]: AVC avc: denied { perfmon } for pid=3968 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.623000 audit[3968]: AVC avc: denied { perfmon } for pid=3968 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.623000 audit[3968]: AVC avc: denied { perfmon } for pid=3968 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.623000 audit[3968]: AVC avc: denied { perfmon } for pid=3968 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.623000 audit[3968]: AVC avc: denied { bpf } for pid=3968 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.623000 audit[3968]: AVC avc: denied { bpf } for pid=3968 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.623000 audit: BPF prog-id=167 op=LOAD May 17 00:35:23.623000 audit[3968]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc720cfcb0 a2=98 a3=0 items=0 ppid=3777 pid=3968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:23.623000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:35:23.623000 audit: BPF prog-id=167 op=UNLOAD May 17 00:35:23.623000 audit[3968]: AVC avc: denied { bpf } for pid=3968 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.623000 audit[3968]: AVC avc: denied { bpf } for pid=3968 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.623000 audit[3968]: AVC avc: denied { perfmon } for pid=3968 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.623000 audit[3968]: AVC avc: denied { perfmon } for pid=3968 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.623000 audit[3968]: AVC avc: denied { perfmon } for pid=3968 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.623000 audit[3968]: AVC avc: denied { perfmon } for pid=3968 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.623000 audit[3968]: AVC avc: denied { perfmon } for pid=3968 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.623000 audit[3968]: AVC avc: denied { bpf } for pid=3968 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.623000 audit[3968]: AVC avc: denied { bpf } for pid=3968 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.623000 audit: BPF prog-id=168 op=LOAD May 17 00:35:23.623000 audit[3968]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc720cfac0 a2=94 a3=54428f items=0 ppid=3777 pid=3968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:23.623000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:35:23.623000 audit: BPF prog-id=168 op=UNLOAD May 17 00:35:23.623000 audit[3968]: AVC avc: denied { bpf } for pid=3968 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.623000 audit[3968]: AVC avc: denied { bpf } for pid=3968 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.623000 audit[3968]: AVC avc: denied { perfmon } for pid=3968 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.623000 audit[3968]: AVC avc: denied { perfmon } for pid=3968 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.623000 audit[3968]: AVC avc: denied { perfmon } for pid=3968 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.623000 audit[3968]: AVC avc: denied { perfmon } for pid=3968 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.623000 audit[3968]: AVC avc: denied { perfmon } for pid=3968 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.623000 audit[3968]: AVC avc: denied { bpf } for pid=3968 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.623000 audit[3968]: AVC avc: denied { bpf } for pid=3968 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.623000 audit: BPF prog-id=169 op=LOAD May 17 00:35:23.623000 audit[3968]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc720cfaf0 a2=94 a3=2 items=0 ppid=3777 pid=3968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:23.623000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:35:23.623000 audit: BPF prog-id=169 op=UNLOAD May 17 00:35:23.623000 audit[3968]: AVC avc: denied { bpf } for pid=3968 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.623000 audit[3968]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc720cf9c0 a2=28 a3=0 items=0 ppid=3777 pid=3968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:23.623000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:35:23.623000 audit[3968]: AVC avc: denied { bpf } for pid=3968 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.623000 audit[3968]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc720cf9f0 a2=28 a3=0 items=0 ppid=3777 pid=3968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:23.623000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:35:23.623000 audit[3968]: AVC avc: denied { bpf } for pid=3968 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.623000 audit[3968]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc720cf900 a2=28 a3=0 items=0 ppid=3777 pid=3968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:23.623000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:35:23.623000 audit[3968]: AVC avc: denied { bpf } for pid=3968 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.623000 audit[3968]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc720cfa10 a2=28 a3=0 items=0 ppid=3777 pid=3968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:23.623000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:35:23.623000 audit[3968]: AVC avc: denied { bpf } for pid=3968 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.623000 audit[3968]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc720cf9f0 a2=28 a3=0 items=0 ppid=3777 pid=3968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:23.623000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:35:23.624000 audit[3968]: AVC avc: denied { bpf } for pid=3968 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.624000 audit[3968]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc720cf9e0 a2=28 a3=0 items=0 ppid=3777 pid=3968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:23.624000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:35:23.625000 audit[3968]: AVC avc: denied { bpf } for pid=3968 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.625000 audit[3968]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc720cfa10 a2=28 a3=0 items=0 ppid=3777 pid=3968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:23.625000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:35:23.625000 audit[3968]: AVC avc: denied { bpf } for pid=3968 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.625000 audit[3968]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc720cf9f0 a2=28 a3=0 items=0 ppid=3777 pid=3968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:23.625000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:35:23.625000 audit[3968]: AVC avc: denied { bpf } for pid=3968 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.625000 audit[3968]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc720cfa10 a2=28 a3=0 items=0 ppid=3777 pid=3968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:23.625000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:35:23.625000 audit[3968]: AVC avc: denied { bpf } for pid=3968 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.625000 audit[3968]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc720cf9e0 a2=28 a3=0 items=0 ppid=3777 pid=3968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:23.625000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:35:23.625000 audit[3968]: AVC avc: denied { bpf } for pid=3968 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.625000 audit[3968]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc720cfa50 a2=28 a3=0 items=0 ppid=3777 pid=3968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:23.625000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:35:23.628000 audit[3968]: AVC avc: denied { bpf } for pid=3968 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.628000 audit[3968]: AVC avc: denied { bpf } for pid=3968 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.628000 audit[3968]: AVC avc: denied { perfmon } for pid=3968 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.628000 audit[3968]: AVC avc: denied { perfmon } for pid=3968 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.628000 audit[3968]: AVC avc: denied { perfmon } for pid=3968 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.628000 audit[3968]: AVC avc: denied { perfmon } for pid=3968 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.628000 audit[3968]: AVC avc: denied { perfmon } for pid=3968 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.628000 audit[3968]: AVC avc: denied { bpf } for pid=3968 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.628000 audit[3968]: AVC avc: denied { bpf } for pid=3968 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.628000 audit: BPF prog-id=170 op=LOAD May 17 00:35:23.628000 audit[3968]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc720cf8c0 a2=94 a3=0 items=0 ppid=3777 pid=3968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:23.628000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:35:23.628000 audit: BPF prog-id=170 op=UNLOAD May 17 00:35:23.629000 audit[3968]: AVC avc: denied { bpf } for pid=3968 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.629000 audit[3968]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffc720cf8b0 a2=50 a3=2800 items=0 ppid=3777 pid=3968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:23.629000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:35:23.634000 audit[3968]: AVC avc: denied { bpf } for pid=3968 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.634000 audit[3968]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffc720cf8b0 a2=50 a3=2800 items=0 ppid=3777 pid=3968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:23.634000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:35:23.634000 audit[3968]: AVC avc: denied { bpf } for pid=3968 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.634000 audit[3968]: AVC avc: denied { bpf } for pid=3968 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.634000 audit[3968]: AVC avc: denied { bpf } for pid=3968 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.634000 audit[3968]: AVC avc: denied { perfmon } for pid=3968 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.634000 audit[3968]: AVC avc: denied { perfmon } for pid=3968 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.634000 audit[3968]: AVC avc: denied { perfmon } for pid=3968 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.634000 audit[3968]: AVC avc: denied { perfmon } for pid=3968 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.634000 audit[3968]: AVC avc: denied { perfmon } for pid=3968 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.634000 audit[3968]: AVC avc: denied { bpf } for pid=3968 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.634000 audit[3968]: AVC avc: denied { bpf } for pid=3968 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.634000 audit: BPF prog-id=171 op=LOAD May 17 00:35:23.634000 audit[3968]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc720cf0d0 a2=94 a3=2 items=0 ppid=3777 pid=3968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:23.634000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:35:23.634000 audit: BPF prog-id=171 op=UNLOAD May 17 00:35:23.634000 audit[3968]: AVC avc: denied { bpf } for pid=3968 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.634000 audit[3968]: AVC avc: denied { bpf } for pid=3968 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.634000 audit[3968]: AVC avc: denied { bpf } for pid=3968 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.634000 audit[3968]: AVC avc: denied { perfmon } for pid=3968 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.634000 audit[3968]: AVC avc: denied { perfmon } for pid=3968 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.634000 audit[3968]: AVC avc: denied { perfmon } for pid=3968 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.634000 audit[3968]: AVC avc: denied { perfmon } for pid=3968 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.634000 audit[3968]: AVC avc: denied { perfmon } for pid=3968 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.634000 audit[3968]: AVC avc: denied { bpf } for pid=3968 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.634000 audit[3968]: AVC avc: denied { bpf } for pid=3968 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.634000 audit: BPF prog-id=172 op=LOAD May 17 00:35:23.634000 audit[3968]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc720cf1d0 a2=94 a3=30 items=0 ppid=3777 pid=3968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:23.634000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:35:23.650000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.650000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.650000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.650000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.650000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.650000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.650000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.650000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.659750 env[1212]: 2025-05-17 00:35:23.226 [INFO][3870] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-calico--apiserver--68444b4b45--l4vgc-eth0 calico-apiserver-68444b4b45- calico-apiserver 965767b7-1792-4c91-b4d9-b8c2d202747e 973 0 2025-05-17 00:34:54 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:68444b4b45 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758 calico-apiserver-68444b4b45-l4vgc eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calid1a7f4f4789 [] [] }} ContainerID="46c07d14feb7f301bbfd58b31ab295aac5560242c7e48609970c8d7cbe12ba10" Namespace="calico-apiserver" Pod="calico-apiserver-68444b4b45-l4vgc" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-calico--apiserver--68444b4b45--l4vgc-" May 17 00:35:23.659750 env[1212]: 2025-05-17 00:35:23.226 [INFO][3870] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="46c07d14feb7f301bbfd58b31ab295aac5560242c7e48609970c8d7cbe12ba10" Namespace="calico-apiserver" Pod="calico-apiserver-68444b4b45-l4vgc" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-calico--apiserver--68444b4b45--l4vgc-eth0" May 17 00:35:23.659750 env[1212]: 2025-05-17 00:35:23.378 [INFO][3911] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="46c07d14feb7f301bbfd58b31ab295aac5560242c7e48609970c8d7cbe12ba10" HandleID="k8s-pod-network.46c07d14feb7f301bbfd58b31ab295aac5560242c7e48609970c8d7cbe12ba10" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-calico--apiserver--68444b4b45--l4vgc-eth0" May 17 00:35:23.659750 env[1212]: 2025-05-17 00:35:23.378 [INFO][3911] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="46c07d14feb7f301bbfd58b31ab295aac5560242c7e48609970c8d7cbe12ba10" HandleID="k8s-pod-network.46c07d14feb7f301bbfd58b31ab295aac5560242c7e48609970c8d7cbe12ba10" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-calico--apiserver--68444b4b45--l4vgc-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000235920), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758", "pod":"calico-apiserver-68444b4b45-l4vgc", "timestamp":"2025-05-17 00:35:23.374131433 +0000 UTC"}, Hostname:"ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:35:23.659750 env[1212]: 2025-05-17 00:35:23.378 [INFO][3911] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:35:23.659750 env[1212]: 2025-05-17 00:35:23.416 [INFO][3911] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:35:23.659750 env[1212]: 2025-05-17 00:35:23.416 [INFO][3911] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758' May 17 00:35:23.659750 env[1212]: 2025-05-17 00:35:23.473 [INFO][3911] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.46c07d14feb7f301bbfd58b31ab295aac5560242c7e48609970c8d7cbe12ba10" host="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:35:23.659750 env[1212]: 2025-05-17 00:35:23.507 [INFO][3911] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:35:23.659750 env[1212]: 2025-05-17 00:35:23.533 [INFO][3911] ipam/ipam.go 511: Trying affinity for 192.168.43.128/26 host="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:35:23.659750 env[1212]: 2025-05-17 00:35:23.536 [INFO][3911] ipam/ipam.go 158: Attempting to load block cidr=192.168.43.128/26 host="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:35:23.659750 env[1212]: 2025-05-17 00:35:23.540 [INFO][3911] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.43.128/26 host="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:35:23.659750 env[1212]: 2025-05-17 00:35:23.541 [INFO][3911] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.43.128/26 handle="k8s-pod-network.46c07d14feb7f301bbfd58b31ab295aac5560242c7e48609970c8d7cbe12ba10" host="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:35:23.659750 env[1212]: 2025-05-17 00:35:23.543 [INFO][3911] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.46c07d14feb7f301bbfd58b31ab295aac5560242c7e48609970c8d7cbe12ba10 May 17 00:35:23.659750 env[1212]: 2025-05-17 00:35:23.549 [INFO][3911] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.43.128/26 handle="k8s-pod-network.46c07d14feb7f301bbfd58b31ab295aac5560242c7e48609970c8d7cbe12ba10" host="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:35:23.659750 env[1212]: 2025-05-17 00:35:23.570 [INFO][3911] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.43.134/26] block=192.168.43.128/26 handle="k8s-pod-network.46c07d14feb7f301bbfd58b31ab295aac5560242c7e48609970c8d7cbe12ba10" host="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:35:23.659750 env[1212]: 2025-05-17 00:35:23.571 [INFO][3911] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.43.134/26] handle="k8s-pod-network.46c07d14feb7f301bbfd58b31ab295aac5560242c7e48609970c8d7cbe12ba10" host="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:35:23.659750 env[1212]: 2025-05-17 00:35:23.571 [INFO][3911] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:35:23.659750 env[1212]: 2025-05-17 00:35:23.571 [INFO][3911] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.43.134/26] IPv6=[] ContainerID="46c07d14feb7f301bbfd58b31ab295aac5560242c7e48609970c8d7cbe12ba10" HandleID="k8s-pod-network.46c07d14feb7f301bbfd58b31ab295aac5560242c7e48609970c8d7cbe12ba10" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-calico--apiserver--68444b4b45--l4vgc-eth0" May 17 00:35:23.661075 env[1212]: 2025-05-17 00:35:23.582 [INFO][3870] cni-plugin/k8s.go 418: Populated endpoint ContainerID="46c07d14feb7f301bbfd58b31ab295aac5560242c7e48609970c8d7cbe12ba10" Namespace="calico-apiserver" Pod="calico-apiserver-68444b4b45-l4vgc" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-calico--apiserver--68444b4b45--l4vgc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-calico--apiserver--68444b4b45--l4vgc-eth0", GenerateName:"calico-apiserver-68444b4b45-", Namespace:"calico-apiserver", SelfLink:"", UID:"965767b7-1792-4c91-b4d9-b8c2d202747e", ResourceVersion:"973", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 34, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"68444b4b45", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758", ContainerID:"", Pod:"calico-apiserver-68444b4b45-l4vgc", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.43.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calid1a7f4f4789", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:35:23.661075 env[1212]: 2025-05-17 00:35:23.582 [INFO][3870] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.43.134/32] ContainerID="46c07d14feb7f301bbfd58b31ab295aac5560242c7e48609970c8d7cbe12ba10" Namespace="calico-apiserver" Pod="calico-apiserver-68444b4b45-l4vgc" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-calico--apiserver--68444b4b45--l4vgc-eth0" May 17 00:35:23.661075 env[1212]: 2025-05-17 00:35:23.583 [INFO][3870] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calid1a7f4f4789 ContainerID="46c07d14feb7f301bbfd58b31ab295aac5560242c7e48609970c8d7cbe12ba10" Namespace="calico-apiserver" Pod="calico-apiserver-68444b4b45-l4vgc" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-calico--apiserver--68444b4b45--l4vgc-eth0" May 17 00:35:23.661075 env[1212]: 2025-05-17 00:35:23.633 [INFO][3870] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="46c07d14feb7f301bbfd58b31ab295aac5560242c7e48609970c8d7cbe12ba10" Namespace="calico-apiserver" Pod="calico-apiserver-68444b4b45-l4vgc" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-calico--apiserver--68444b4b45--l4vgc-eth0" May 17 00:35:23.661075 env[1212]: 2025-05-17 00:35:23.633 [INFO][3870] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="46c07d14feb7f301bbfd58b31ab295aac5560242c7e48609970c8d7cbe12ba10" Namespace="calico-apiserver" Pod="calico-apiserver-68444b4b45-l4vgc" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-calico--apiserver--68444b4b45--l4vgc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-calico--apiserver--68444b4b45--l4vgc-eth0", GenerateName:"calico-apiserver-68444b4b45-", Namespace:"calico-apiserver", SelfLink:"", UID:"965767b7-1792-4c91-b4d9-b8c2d202747e", ResourceVersion:"973", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 34, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"68444b4b45", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758", ContainerID:"46c07d14feb7f301bbfd58b31ab295aac5560242c7e48609970c8d7cbe12ba10", Pod:"calico-apiserver-68444b4b45-l4vgc", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.43.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calid1a7f4f4789", MAC:"9e:89:4c:59:c4:cb", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:35:23.661075 env[1212]: 2025-05-17 00:35:23.654 [INFO][3870] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="46c07d14feb7f301bbfd58b31ab295aac5560242c7e48609970c8d7cbe12ba10" Namespace="calico-apiserver" Pod="calico-apiserver-68444b4b45-l4vgc" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-calico--apiserver--68444b4b45--l4vgc-eth0" May 17 00:35:23.686012 systemd[1]: Started cri-containerd-d514889c403002666dda612b4986a3034a57942503428ec928901f46a8fdffa6.scope. May 17 00:35:23.650000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.650000 audit: BPF prog-id=173 op=LOAD May 17 00:35:23.650000 audit[3977]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd979e0a50 a2=98 a3=0 items=0 ppid=3777 pid=3977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:23.650000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:35:23.692000 audit: BPF prog-id=173 op=UNLOAD May 17 00:35:23.692000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.692000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.692000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.692000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.692000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.692000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.692000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.692000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.692000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.692000 audit: BPF prog-id=174 op=LOAD May 17 00:35:23.692000 audit[3977]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd979e0840 a2=94 a3=54428f items=0 ppid=3777 pid=3977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:23.692000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:35:23.698000 audit: BPF prog-id=174 op=UNLOAD May 17 00:35:23.698000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.698000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.698000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.698000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.698000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.698000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.698000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.698000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.698000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.698000 audit: BPF prog-id=175 op=LOAD May 17 00:35:23.698000 audit[3977]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd979e0870 a2=94 a3=2 items=0 ppid=3777 pid=3977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:23.698000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:35:23.698000 audit: BPF prog-id=175 op=UNLOAD May 17 00:35:23.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.750000 audit: BPF prog-id=176 op=LOAD May 17 00:35:23.753000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.753000 audit[3965]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3949 pid=3965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:23.753000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435313438383963343033303032363636646461363132623439383661 May 17 00:35:23.754000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.754000 audit[3965]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3949 pid=3965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:23.754746 env[1212]: time="2025-05-17T00:35:23.754626448Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:35:23.754746 env[1212]: time="2025-05-17T00:35:23.754679472Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:35:23.754746 env[1212]: time="2025-05-17T00:35:23.754698206Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:35:23.755005 env[1212]: time="2025-05-17T00:35:23.754897224Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/46c07d14feb7f301bbfd58b31ab295aac5560242c7e48609970c8d7cbe12ba10 pid=4011 runtime=io.containerd.runc.v2 May 17 00:35:23.754000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435313438383963343033303032363636646461363132623439383661 May 17 00:35:23.754000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.754000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.754000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.754000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.754000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.754000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.754000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.754000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.754000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.754000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.754000 audit: BPF prog-id=177 op=LOAD May 17 00:35:23.754000 audit[3965]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c000302de0 items=0 ppid=3949 pid=3965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:23.754000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435313438383963343033303032363636646461363132623439383661 May 17 00:35:23.756000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.756000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.756000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.756000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.756000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.756000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.756000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.756000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.756000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.756000 audit: BPF prog-id=178 op=LOAD May 17 00:35:23.756000 audit[3965]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c000302e28 items=0 ppid=3949 pid=3965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:23.756000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435313438383963343033303032363636646461363132623439383661 May 17 00:35:23.757000 audit: BPF prog-id=178 op=UNLOAD May 17 00:35:23.757000 audit: BPF prog-id=177 op=UNLOAD May 17 00:35:23.757000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.757000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.757000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.757000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.757000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.757000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.757000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.757000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.757000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.757000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.757000 audit: BPF prog-id=179 op=LOAD May 17 00:35:23.757000 audit[3965]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c000303238 items=0 ppid=3949 pid=3965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:23.757000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435313438383963343033303032363636646461363132623439383661 May 17 00:35:23.822701 systemd[1]: Started cri-containerd-46c07d14feb7f301bbfd58b31ab295aac5560242c7e48609970c8d7cbe12ba10.scope. May 17 00:35:23.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.885000 audit: BPF prog-id=180 op=LOAD May 17 00:35:23.887000 audit[4025]: AVC avc: denied { bpf } for pid=4025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.887000 audit[4025]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4011 pid=4025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:23.887000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436633037643134666562376633303162626664353862333161623239 May 17 00:35:23.887000 audit[4025]: AVC avc: denied { perfmon } for pid=4025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.887000 audit[4025]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4011 pid=4025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:23.887000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436633037643134666562376633303162626664353862333161623239 May 17 00:35:23.888000 audit[4025]: AVC avc: denied { bpf } for pid=4025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.888000 audit[4025]: AVC avc: denied { bpf } for pid=4025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.888000 audit[4025]: AVC avc: denied { bpf } for pid=4025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.888000 audit[4025]: AVC avc: denied { perfmon } for pid=4025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.888000 audit[4025]: AVC avc: denied { perfmon } for pid=4025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.888000 audit[4025]: AVC avc: denied { perfmon } for pid=4025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.888000 audit[4025]: AVC avc: denied { perfmon } for pid=4025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.888000 audit[4025]: AVC avc: denied { perfmon } for pid=4025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.888000 audit[4025]: AVC avc: denied { bpf } for pid=4025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.888000 audit[4025]: AVC avc: denied { bpf } for pid=4025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.888000 audit: BPF prog-id=181 op=LOAD May 17 00:35:23.888000 audit[4025]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0002b1090 items=0 ppid=4011 pid=4025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:23.888000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436633037643134666562376633303162626664353862333161623239 May 17 00:35:23.890000 audit[4025]: AVC avc: denied { bpf } for pid=4025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.890000 audit[4025]: AVC avc: denied { bpf } for pid=4025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.890000 audit[4025]: AVC avc: denied { perfmon } for pid=4025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.890000 audit[4025]: AVC avc: denied { perfmon } for pid=4025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.890000 audit[4025]: AVC avc: denied { perfmon } for pid=4025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.890000 audit[4025]: AVC avc: denied { perfmon } for pid=4025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.890000 audit[4025]: AVC avc: denied { perfmon } for pid=4025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.890000 audit[4025]: AVC avc: denied { bpf } for pid=4025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.890000 audit[4025]: AVC avc: denied { bpf } for pid=4025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.890000 audit: BPF prog-id=182 op=LOAD May 17 00:35:23.890000 audit[4025]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0002b10d8 items=0 ppid=4011 pid=4025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:23.890000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436633037643134666562376633303162626664353862333161623239 May 17 00:35:23.891000 audit: BPF prog-id=182 op=UNLOAD May 17 00:35:23.892000 audit: BPF prog-id=181 op=UNLOAD May 17 00:35:23.892000 audit[4025]: AVC avc: denied { bpf } for pid=4025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.892000 audit[4025]: AVC avc: denied { bpf } for pid=4025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.892000 audit[4025]: AVC avc: denied { bpf } for pid=4025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.892000 audit[4025]: AVC avc: denied { perfmon } for pid=4025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.892000 audit[4025]: AVC avc: denied { perfmon } for pid=4025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.892000 audit[4025]: AVC avc: denied { perfmon } for pid=4025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.892000 audit[4025]: AVC avc: denied { perfmon } for pid=4025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.892000 audit[4025]: AVC avc: denied { perfmon } for pid=4025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.892000 audit[4025]: AVC avc: denied { bpf } for pid=4025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.892000 audit[4025]: AVC avc: denied { bpf } for pid=4025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.892000 audit: BPF prog-id=183 op=LOAD May 17 00:35:23.892000 audit[4025]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0002b14e8 items=0 ppid=4011 pid=4025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:23.892000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436633037643134666562376633303162626664353862333161623239 May 17 00:35:23.981815 env[1212]: time="2025-05-17T00:35:23.981746484Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-78d55f7ddc-8tw2k,Uid:6fdee754-80af-4193-bcf6-93825e6ce6df,Namespace:calico-system,Attempt:1,} returns sandbox id \"d514889c403002666dda612b4986a3034a57942503428ec928901f46a8fdffa6\"" May 17 00:35:24.014035 env[1212]: time="2025-05-17T00:35:24.013975418Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-68444b4b45-l4vgc,Uid:965767b7-1792-4c91-b4d9-b8c2d202747e,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"46c07d14feb7f301bbfd58b31ab295aac5560242c7e48609970c8d7cbe12ba10\"" May 17 00:35:24.041451 env[1212]: 2025-05-17 00:35:23.905 [INFO][4008] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="67f1562eb02da319fa4fd938337ef3a583cef2fe3e70af43746166b722e25914" May 17 00:35:24.041451 env[1212]: 2025-05-17 00:35:23.906 [INFO][4008] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="67f1562eb02da319fa4fd938337ef3a583cef2fe3e70af43746166b722e25914" iface="eth0" netns="/var/run/netns/cni-55ff4924-1dd2-6f03-2e0e-3ef6efcfcf38" May 17 00:35:24.041451 env[1212]: 2025-05-17 00:35:23.908 [INFO][4008] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="67f1562eb02da319fa4fd938337ef3a583cef2fe3e70af43746166b722e25914" iface="eth0" netns="/var/run/netns/cni-55ff4924-1dd2-6f03-2e0e-3ef6efcfcf38" May 17 00:35:24.041451 env[1212]: 2025-05-17 00:35:23.916 [INFO][4008] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="67f1562eb02da319fa4fd938337ef3a583cef2fe3e70af43746166b722e25914" iface="eth0" netns="/var/run/netns/cni-55ff4924-1dd2-6f03-2e0e-3ef6efcfcf38" May 17 00:35:24.041451 env[1212]: 2025-05-17 00:35:23.928 [INFO][4008] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="67f1562eb02da319fa4fd938337ef3a583cef2fe3e70af43746166b722e25914" May 17 00:35:24.041451 env[1212]: 2025-05-17 00:35:23.928 [INFO][4008] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="67f1562eb02da319fa4fd938337ef3a583cef2fe3e70af43746166b722e25914" May 17 00:35:24.041451 env[1212]: 2025-05-17 00:35:24.010 [INFO][4047] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="67f1562eb02da319fa4fd938337ef3a583cef2fe3e70af43746166b722e25914" HandleID="k8s-pod-network.67f1562eb02da319fa4fd938337ef3a583cef2fe3e70af43746166b722e25914" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-coredns--668d6bf9bc--6zjt5-eth0" May 17 00:35:24.041451 env[1212]: 2025-05-17 00:35:24.010 [INFO][4047] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:35:24.041451 env[1212]: 2025-05-17 00:35:24.010 [INFO][4047] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:35:24.041451 env[1212]: 2025-05-17 00:35:24.031 [WARNING][4047] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="67f1562eb02da319fa4fd938337ef3a583cef2fe3e70af43746166b722e25914" HandleID="k8s-pod-network.67f1562eb02da319fa4fd938337ef3a583cef2fe3e70af43746166b722e25914" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-coredns--668d6bf9bc--6zjt5-eth0" May 17 00:35:24.041451 env[1212]: 2025-05-17 00:35:24.032 [INFO][4047] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="67f1562eb02da319fa4fd938337ef3a583cef2fe3e70af43746166b722e25914" HandleID="k8s-pod-network.67f1562eb02da319fa4fd938337ef3a583cef2fe3e70af43746166b722e25914" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-coredns--668d6bf9bc--6zjt5-eth0" May 17 00:35:24.041451 env[1212]: 2025-05-17 00:35:24.037 [INFO][4047] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:35:24.041451 env[1212]: 2025-05-17 00:35:24.039 [INFO][4008] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="67f1562eb02da319fa4fd938337ef3a583cef2fe3e70af43746166b722e25914" May 17 00:35:24.047160 systemd[1]: run-netns-cni\x2d55ff4924\x2d1dd2\x2d6f03\x2d2e0e\x2d3ef6efcfcf38.mount: Deactivated successfully. May 17 00:35:24.047829 env[1212]: time="2025-05-17T00:35:24.047777044Z" level=info msg="TearDown network for sandbox \"67f1562eb02da319fa4fd938337ef3a583cef2fe3e70af43746166b722e25914\" successfully" May 17 00:35:24.048037 env[1212]: time="2025-05-17T00:35:24.048002521Z" level=info msg="StopPodSandbox for \"67f1562eb02da319fa4fd938337ef3a583cef2fe3e70af43746166b722e25914\" returns successfully" May 17 00:35:24.049131 env[1212]: time="2025-05-17T00:35:24.049093521Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-6zjt5,Uid:81c29f47-17e5-4770-9231-d763d86cc377,Namespace:kube-system,Attempt:1,}" May 17 00:35:24.159000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.159000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.159000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.159000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.159000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.159000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.159000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.159000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.159000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.159000 audit: BPF prog-id=184 op=LOAD May 17 00:35:24.159000 audit[3977]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd979e0730 a2=94 a3=1 items=0 ppid=3777 pid=3977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:24.159000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:35:24.159000 audit: BPF prog-id=184 op=UNLOAD May 17 00:35:24.159000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.159000 audit[3977]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd979e0800 a2=50 a3=7ffd979e08e0 items=0 ppid=3777 pid=3977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:24.159000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:35:24.178000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.178000 audit[3977]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd979e0740 a2=28 a3=0 items=0 ppid=3777 pid=3977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:24.178000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:35:24.179000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.179000 audit[3977]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd979e0770 a2=28 a3=0 items=0 ppid=3777 pid=3977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:24.179000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:35:24.179000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.179000 audit[3977]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd979e0680 a2=28 a3=0 items=0 ppid=3777 pid=3977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:24.179000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:35:24.179000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.179000 audit[3977]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd979e0790 a2=28 a3=0 items=0 ppid=3777 pid=3977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:24.179000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:35:24.180000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.180000 audit[3977]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd979e0770 a2=28 a3=0 items=0 ppid=3777 pid=3977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:24.180000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:35:24.180000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.180000 audit[3977]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd979e0760 a2=28 a3=0 items=0 ppid=3777 pid=3977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:24.180000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:35:24.181000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.181000 audit[3977]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd979e0790 a2=28 a3=0 items=0 ppid=3777 pid=3977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:24.181000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:35:24.181000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.181000 audit[3977]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd979e0770 a2=28 a3=0 items=0 ppid=3777 pid=3977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:24.181000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:35:24.181000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.181000 audit[3977]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd979e0790 a2=28 a3=0 items=0 ppid=3777 pid=3977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:24.181000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:35:24.181000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.181000 audit[3977]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd979e0760 a2=28 a3=0 items=0 ppid=3777 pid=3977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:24.181000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:35:24.181000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.181000 audit[3977]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd979e07d0 a2=28 a3=0 items=0 ppid=3777 pid=3977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:24.181000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:35:24.181000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.181000 audit[3977]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd979e0580 a2=50 a3=1 items=0 ppid=3777 pid=3977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:24.181000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:35:24.181000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.181000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.181000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.181000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.181000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.181000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.181000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.181000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.181000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.181000 audit: BPF prog-id=185 op=LOAD May 17 00:35:24.181000 audit[3977]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd979e0580 a2=94 a3=5 items=0 ppid=3777 pid=3977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:24.181000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:35:24.183000 audit: BPF prog-id=185 op=UNLOAD May 17 00:35:24.183000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.183000 audit[3977]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd979e0630 a2=50 a3=1 items=0 ppid=3777 pid=3977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:24.183000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:35:24.183000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.183000 audit[3977]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffd979e0750 a2=4 a3=38 items=0 ppid=3777 pid=3977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:24.183000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:35:24.183000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.183000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.183000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.183000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.183000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.183000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.183000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.183000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.183000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.183000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.183000 audit[3977]: AVC avc: denied { confidentiality } for pid=3977 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:35:24.183000 audit[3977]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd979e07a0 a2=94 a3=6 items=0 ppid=3777 pid=3977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:24.183000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:35:24.185000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.185000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.185000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.185000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.185000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.185000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.185000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.185000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.185000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.185000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.185000 audit[3977]: AVC avc: denied { confidentiality } for pid=3977 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:35:24.185000 audit[3977]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd979dff50 a2=94 a3=88 items=0 ppid=3777 pid=3977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:24.185000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:35:24.192000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.192000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.192000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.192000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.192000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.192000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.192000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.192000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.192000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.192000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.192000 audit[3977]: AVC avc: denied { confidentiality } for pid=3977 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:35:24.192000 audit[3977]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd979dff50 a2=94 a3=88 items=0 ppid=3777 pid=3977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:24.192000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:35:24.196000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.196000 audit[3977]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd979e1980 a2=10 a3=f8f00800 items=0 ppid=3777 pid=3977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:24.196000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:35:24.198000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.198000 audit[3977]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd979e1820 a2=10 a3=3 items=0 ppid=3777 pid=3977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:24.198000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:35:24.199000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.199000 audit[3977]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd979e17c0 a2=10 a3=3 items=0 ppid=3777 pid=3977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:24.199000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:35:24.199000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.199000 audit[3977]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd979e17c0 a2=10 a3=7 items=0 ppid=3777 pid=3977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:24.199000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:35:24.209000 audit: BPF prog-id=172 op=UNLOAD May 17 00:35:24.407832 systemd-networkd[1016]: calia4152bd0b74: Link UP May 17 00:35:24.407000 audit[4107]: NETFILTER_CFG table=mangle:107 family=2 entries=16 op=nft_register_chain pid=4107 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:35:24.418761 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia4152bd0b74: link becomes ready May 17 00:35:24.423006 systemd-networkd[1016]: calia4152bd0b74: Gained carrier May 17 00:35:24.407000 audit[4107]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffc9a55c930 a2=0 a3=7ffc9a55c91c items=0 ppid=3777 pid=4107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:24.407000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:35:24.432000 audit[4106]: NETFILTER_CFG table=nat:108 family=2 entries=15 op=nft_register_chain pid=4106 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:35:24.432000 audit[4106]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffc2e897510 a2=0 a3=7ffc2e8974fc items=0 ppid=3777 pid=4106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:24.432000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:35:24.444000 audit[4105]: NETFILTER_CFG table=raw:109 family=2 entries=21 op=nft_register_chain pid=4105 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:35:24.444000 audit[4105]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffc6ed8b6e0 a2=0 a3=7ffc6ed8b6cc items=0 ppid=3777 pid=4105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:24.444000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:35:24.461852 env[1212]: 2025-05-17 00:35:24.200 [INFO][4061] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-coredns--668d6bf9bc--6zjt5-eth0 coredns-668d6bf9bc- kube-system 81c29f47-17e5-4770-9231-d763d86cc377 982 0 2025-05-17 00:34:44 +0000 UTC map[k8s-app:kube-dns pod-template-hash:668d6bf9bc projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758 coredns-668d6bf9bc-6zjt5 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calia4152bd0b74 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] [] }} ContainerID="f3b093a482c7c2cb1d47485e37cf0f3bb67576a56b2aa932b04fb8f55c239892" Namespace="kube-system" Pod="coredns-668d6bf9bc-6zjt5" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-coredns--668d6bf9bc--6zjt5-" May 17 00:35:24.461852 env[1212]: 2025-05-17 00:35:24.200 [INFO][4061] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="f3b093a482c7c2cb1d47485e37cf0f3bb67576a56b2aa932b04fb8f55c239892" Namespace="kube-system" Pod="coredns-668d6bf9bc-6zjt5" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-coredns--668d6bf9bc--6zjt5-eth0" May 17 00:35:24.461852 env[1212]: 2025-05-17 00:35:24.290 [INFO][4075] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f3b093a482c7c2cb1d47485e37cf0f3bb67576a56b2aa932b04fb8f55c239892" HandleID="k8s-pod-network.f3b093a482c7c2cb1d47485e37cf0f3bb67576a56b2aa932b04fb8f55c239892" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-coredns--668d6bf9bc--6zjt5-eth0" May 17 00:35:24.461852 env[1212]: 2025-05-17 00:35:24.290 [INFO][4075] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="f3b093a482c7c2cb1d47485e37cf0f3bb67576a56b2aa932b04fb8f55c239892" HandleID="k8s-pod-network.f3b093a482c7c2cb1d47485e37cf0f3bb67576a56b2aa932b04fb8f55c239892" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-coredns--668d6bf9bc--6zjt5-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d9770), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758", "pod":"coredns-668d6bf9bc-6zjt5", "timestamp":"2025-05-17 00:35:24.290487555 +0000 UTC"}, Hostname:"ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:35:24.461852 env[1212]: 2025-05-17 00:35:24.290 [INFO][4075] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:35:24.461852 env[1212]: 2025-05-17 00:35:24.291 [INFO][4075] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:35:24.461852 env[1212]: 2025-05-17 00:35:24.291 [INFO][4075] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758' May 17 00:35:24.461852 env[1212]: 2025-05-17 00:35:24.303 [INFO][4075] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.f3b093a482c7c2cb1d47485e37cf0f3bb67576a56b2aa932b04fb8f55c239892" host="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:35:24.461852 env[1212]: 2025-05-17 00:35:24.312 [INFO][4075] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:35:24.461852 env[1212]: 2025-05-17 00:35:24.329 [INFO][4075] ipam/ipam.go 511: Trying affinity for 192.168.43.128/26 host="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:35:24.461852 env[1212]: 2025-05-17 00:35:24.338 [INFO][4075] ipam/ipam.go 158: Attempting to load block cidr=192.168.43.128/26 host="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:35:24.461852 env[1212]: 2025-05-17 00:35:24.350 [INFO][4075] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.43.128/26 host="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:35:24.461852 env[1212]: 2025-05-17 00:35:24.350 [INFO][4075] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.43.128/26 handle="k8s-pod-network.f3b093a482c7c2cb1d47485e37cf0f3bb67576a56b2aa932b04fb8f55c239892" host="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:35:24.461852 env[1212]: 2025-05-17 00:35:24.353 [INFO][4075] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.f3b093a482c7c2cb1d47485e37cf0f3bb67576a56b2aa932b04fb8f55c239892 May 17 00:35:24.461852 env[1212]: 2025-05-17 00:35:24.360 [INFO][4075] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.43.128/26 handle="k8s-pod-network.f3b093a482c7c2cb1d47485e37cf0f3bb67576a56b2aa932b04fb8f55c239892" host="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:35:24.461852 env[1212]: 2025-05-17 00:35:24.390 [INFO][4075] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.43.135/26] block=192.168.43.128/26 handle="k8s-pod-network.f3b093a482c7c2cb1d47485e37cf0f3bb67576a56b2aa932b04fb8f55c239892" host="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:35:24.461852 env[1212]: 2025-05-17 00:35:24.390 [INFO][4075] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.43.135/26] handle="k8s-pod-network.f3b093a482c7c2cb1d47485e37cf0f3bb67576a56b2aa932b04fb8f55c239892" host="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:35:24.461852 env[1212]: 2025-05-17 00:35:24.390 [INFO][4075] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:35:24.461852 env[1212]: 2025-05-17 00:35:24.390 [INFO][4075] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.43.135/26] IPv6=[] ContainerID="f3b093a482c7c2cb1d47485e37cf0f3bb67576a56b2aa932b04fb8f55c239892" HandleID="k8s-pod-network.f3b093a482c7c2cb1d47485e37cf0f3bb67576a56b2aa932b04fb8f55c239892" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-coredns--668d6bf9bc--6zjt5-eth0" May 17 00:35:24.463047 env[1212]: 2025-05-17 00:35:24.392 [INFO][4061] cni-plugin/k8s.go 418: Populated endpoint ContainerID="f3b093a482c7c2cb1d47485e37cf0f3bb67576a56b2aa932b04fb8f55c239892" Namespace="kube-system" Pod="coredns-668d6bf9bc-6zjt5" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-coredns--668d6bf9bc--6zjt5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-coredns--668d6bf9bc--6zjt5-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"81c29f47-17e5-4770-9231-d763d86cc377", ResourceVersion:"982", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 34, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758", ContainerID:"", Pod:"coredns-668d6bf9bc-6zjt5", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.43.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia4152bd0b74", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:35:24.463047 env[1212]: 2025-05-17 00:35:24.393 [INFO][4061] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.43.135/32] ContainerID="f3b093a482c7c2cb1d47485e37cf0f3bb67576a56b2aa932b04fb8f55c239892" Namespace="kube-system" Pod="coredns-668d6bf9bc-6zjt5" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-coredns--668d6bf9bc--6zjt5-eth0" May 17 00:35:24.463047 env[1212]: 2025-05-17 00:35:24.394 [INFO][4061] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calia4152bd0b74 ContainerID="f3b093a482c7c2cb1d47485e37cf0f3bb67576a56b2aa932b04fb8f55c239892" Namespace="kube-system" Pod="coredns-668d6bf9bc-6zjt5" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-coredns--668d6bf9bc--6zjt5-eth0" May 17 00:35:24.463047 env[1212]: 2025-05-17 00:35:24.440 [INFO][4061] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="f3b093a482c7c2cb1d47485e37cf0f3bb67576a56b2aa932b04fb8f55c239892" Namespace="kube-system" Pod="coredns-668d6bf9bc-6zjt5" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-coredns--668d6bf9bc--6zjt5-eth0" May 17 00:35:24.463047 env[1212]: 2025-05-17 00:35:24.441 [INFO][4061] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="f3b093a482c7c2cb1d47485e37cf0f3bb67576a56b2aa932b04fb8f55c239892" Namespace="kube-system" Pod="coredns-668d6bf9bc-6zjt5" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-coredns--668d6bf9bc--6zjt5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-coredns--668d6bf9bc--6zjt5-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"81c29f47-17e5-4770-9231-d763d86cc377", ResourceVersion:"982", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 34, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758", ContainerID:"f3b093a482c7c2cb1d47485e37cf0f3bb67576a56b2aa932b04fb8f55c239892", Pod:"coredns-668d6bf9bc-6zjt5", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.43.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia4152bd0b74", MAC:"4e:cb:b0:f5:90:45", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:35:24.463047 env[1212]: 2025-05-17 00:35:24.458 [INFO][4061] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="f3b093a482c7c2cb1d47485e37cf0f3bb67576a56b2aa932b04fb8f55c239892" Namespace="kube-system" Pod="coredns-668d6bf9bc-6zjt5" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-coredns--668d6bf9bc--6zjt5-eth0" May 17 00:35:24.511894 env[1212]: time="2025-05-17T00:35:24.511797528Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:35:24.512350 env[1212]: time="2025-05-17T00:35:24.512281651Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:35:24.512683 env[1212]: time="2025-05-17T00:35:24.512619169Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:35:24.513261 env[1212]: time="2025-05-17T00:35:24.513205903Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f3b093a482c7c2cb1d47485e37cf0f3bb67576a56b2aa932b04fb8f55c239892 pid=4129 runtime=io.containerd.runc.v2 May 17 00:35:24.502000 audit[4112]: NETFILTER_CFG table=filter:110 family=2 entries=190 op=nft_register_chain pid=4112 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:35:24.502000 audit[4112]: SYSCALL arch=c000003e syscall=46 success=yes exit=108972 a0=3 a1=7ffd8ba90db0 a2=0 a3=7ffd8ba90d9c items=0 ppid=3777 pid=4112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:24.502000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:35:24.573894 systemd[1]: Started cri-containerd-f3b093a482c7c2cb1d47485e37cf0f3bb67576a56b2aa932b04fb8f55c239892.scope. May 17 00:35:24.606485 env[1212]: time="2025-05-17T00:35:24.606432098Z" level=info msg="StopPodSandbox for \"00abf7b6297ce5a7553f42c1fa6a13245c90242046f7dcfe927acc6b856f3689\"" May 17 00:35:24.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.626000 audit: BPF prog-id=186 op=LOAD May 17 00:35:24.626000 audit[4140]: AVC avc: denied { bpf } for pid=4140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.626000 audit[4140]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=4129 pid=4140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:24.626000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633623039336134383263376332636231643437343835653337636630 May 17 00:35:24.626000 audit[4140]: AVC avc: denied { perfmon } for pid=4140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.626000 audit[4140]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=4129 pid=4140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:24.626000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633623039336134383263376332636231643437343835653337636630 May 17 00:35:24.626000 audit[4140]: AVC avc: denied { bpf } for pid=4140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.626000 audit[4140]: AVC avc: denied { bpf } for pid=4140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.626000 audit[4140]: AVC avc: denied { bpf } for pid=4140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.626000 audit[4140]: AVC avc: denied { perfmon } for pid=4140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.626000 audit[4140]: AVC avc: denied { perfmon } for pid=4140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.626000 audit[4140]: AVC avc: denied { perfmon } for pid=4140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.626000 audit[4140]: AVC avc: denied { perfmon } for pid=4140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.626000 audit[4140]: AVC avc: denied { perfmon } for pid=4140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.626000 audit[4140]: AVC avc: denied { bpf } for pid=4140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.626000 audit[4140]: AVC avc: denied { bpf } for pid=4140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.626000 audit: BPF prog-id=187 op=LOAD May 17 00:35:24.626000 audit[4140]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0003012d0 items=0 ppid=4129 pid=4140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:24.626000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633623039336134383263376332636231643437343835653337636630 May 17 00:35:24.627000 audit[4140]: AVC avc: denied { bpf } for pid=4140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.627000 audit[4140]: AVC avc: denied { bpf } for pid=4140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.627000 audit[4140]: AVC avc: denied { perfmon } for pid=4140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.627000 audit[4140]: AVC avc: denied { perfmon } for pid=4140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.627000 audit[4140]: AVC avc: denied { perfmon } for pid=4140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.627000 audit[4140]: AVC avc: denied { perfmon } for pid=4140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.627000 audit[4140]: AVC avc: denied { perfmon } for pid=4140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.627000 audit[4140]: AVC avc: denied { bpf } for pid=4140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.627000 audit[4140]: AVC avc: denied { bpf } for pid=4140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.627000 audit: BPF prog-id=188 op=LOAD May 17 00:35:24.627000 audit[4140]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000301318 items=0 ppid=4129 pid=4140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:24.627000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633623039336134383263376332636231643437343835653337636630 May 17 00:35:24.627000 audit: BPF prog-id=188 op=UNLOAD May 17 00:35:24.627000 audit: BPF prog-id=187 op=UNLOAD May 17 00:35:24.627000 audit[4140]: AVC avc: denied { bpf } for pid=4140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.627000 audit[4140]: AVC avc: denied { bpf } for pid=4140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.627000 audit[4140]: AVC avc: denied { bpf } for pid=4140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.627000 audit[4140]: AVC avc: denied { perfmon } for pid=4140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.627000 audit[4140]: AVC avc: denied { perfmon } for pid=4140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.627000 audit[4140]: AVC avc: denied { perfmon } for pid=4140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.627000 audit[4140]: AVC avc: denied { perfmon } for pid=4140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.627000 audit[4140]: AVC avc: denied { perfmon } for pid=4140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.627000 audit[4140]: AVC avc: denied { bpf } for pid=4140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.627000 audit[4140]: AVC avc: denied { bpf } for pid=4140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.627000 audit: BPF prog-id=189 op=LOAD May 17 00:35:24.627000 audit[4140]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000301728 items=0 ppid=4129 pid=4140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:24.627000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633623039336134383263376332636231643437343835653337636630 May 17 00:35:24.637841 kubelet[2012]: I0517 00:35:24.636849 2012 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:35:24.656000 audit[4168]: NETFILTER_CFG table=filter:111 family=2 entries=118 op=nft_register_chain pid=4168 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:35:24.656000 audit[4168]: SYSCALL arch=c000003e syscall=46 success=yes exit=67916 a0=3 a1=7ffdcb0218b0 a2=0 a3=7ffdcb02189c items=0 ppid=3777 pid=4168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:24.656000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:35:24.741888 env[1212]: time="2025-05-17T00:35:24.741740622Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-6zjt5,Uid:81c29f47-17e5-4770-9231-d763d86cc377,Namespace:kube-system,Attempt:1,} returns sandbox id \"f3b093a482c7c2cb1d47485e37cf0f3bb67576a56b2aa932b04fb8f55c239892\"" May 17 00:35:24.748206 env[1212]: time="2025-05-17T00:35:24.748158043Z" level=info msg="CreateContainer within sandbox \"f3b093a482c7c2cb1d47485e37cf0f3bb67576a56b2aa932b04fb8f55c239892\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 17 00:35:24.777233 env[1212]: time="2025-05-17T00:35:24.777136029Z" level=info msg="CreateContainer within sandbox \"f3b093a482c7c2cb1d47485e37cf0f3bb67576a56b2aa932b04fb8f55c239892\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"9982fcf8cd89e22075248ac18f3557fee92acc1df9b610c708f36a510c6b0646\"" May 17 00:35:24.778510 env[1212]: time="2025-05-17T00:35:24.778453141Z" level=info msg="StartContainer for \"9982fcf8cd89e22075248ac18f3557fee92acc1df9b610c708f36a510c6b0646\"" May 17 00:35:24.856441 systemd[1]: Started cri-containerd-9982fcf8cd89e22075248ac18f3557fee92acc1df9b610c708f36a510c6b0646.scope. May 17 00:35:24.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.905000 audit: BPF prog-id=190 op=LOAD May 17 00:35:24.908000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.908000 audit[4211]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4129 pid=4211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:24.908000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939383266636638636438396532323037353234386163313866333535 May 17 00:35:24.911000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.911000 audit[4211]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=4129 pid=4211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:24.911000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939383266636638636438396532323037353234386163313866333535 May 17 00:35:24.912000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.912000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.912000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.912000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.912000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.912000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.912000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.912000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.912000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.912000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.912000 audit: BPF prog-id=191 op=LOAD May 17 00:35:24.912000 audit[4211]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0001dfbb0 items=0 ppid=4129 pid=4211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:24.912000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939383266636638636438396532323037353234386163313866333535 May 17 00:35:24.913000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.913000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.913000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.913000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.913000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.913000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.913000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.913000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.913000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.913000 audit: BPF prog-id=192 op=LOAD May 17 00:35:24.913000 audit[4211]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0001dfbf8 items=0 ppid=4129 pid=4211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:24.913000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939383266636638636438396532323037353234386163313866333535 May 17 00:35:24.915000 audit: BPF prog-id=192 op=UNLOAD May 17 00:35:24.915000 audit: BPF prog-id=191 op=UNLOAD May 17 00:35:24.915000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.915000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.915000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.915000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.915000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.915000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.915000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.915000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.915000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.915000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:24.915000 audit: BPF prog-id=193 op=LOAD May 17 00:35:24.915000 audit[4211]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00032e008 items=0 ppid=4129 pid=4211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:24.915000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939383266636638636438396532323037353234386163313866333535 May 17 00:35:24.956574 env[1212]: time="2025-05-17T00:35:24.956508094Z" level=info msg="StartContainer for \"9982fcf8cd89e22075248ac18f3557fee92acc1df9b610c708f36a510c6b0646\" returns successfully" May 17 00:35:24.979000 audit[4227]: AVC avc: denied { getattr } for pid=4227 comm="coredns" path="cgroup:[4026532793]" dev="nsfs" ino=4026532793 scontext=system_u:system_r:svirt_lxc_net_t:s0:c148,c619 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 May 17 00:35:24.979000 audit[4227]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c00005a828 a2=c0004ccac8 a3=0 items=0 ppid=4129 pid=4227 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c148,c619 key=(null) May 17 00:35:24.979000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 May 17 00:35:25.023557 env[1212]: 2025-05-17 00:35:24.837 [INFO][4170] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="00abf7b6297ce5a7553f42c1fa6a13245c90242046f7dcfe927acc6b856f3689" May 17 00:35:25.023557 env[1212]: 2025-05-17 00:35:24.837 [INFO][4170] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="00abf7b6297ce5a7553f42c1fa6a13245c90242046f7dcfe927acc6b856f3689" iface="eth0" netns="/var/run/netns/cni-db9be7fa-3285-1e57-5863-2b22518f127d" May 17 00:35:25.023557 env[1212]: 2025-05-17 00:35:24.839 [INFO][4170] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="00abf7b6297ce5a7553f42c1fa6a13245c90242046f7dcfe927acc6b856f3689" iface="eth0" netns="/var/run/netns/cni-db9be7fa-3285-1e57-5863-2b22518f127d" May 17 00:35:25.023557 env[1212]: 2025-05-17 00:35:24.839 [INFO][4170] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="00abf7b6297ce5a7553f42c1fa6a13245c90242046f7dcfe927acc6b856f3689" iface="eth0" netns="/var/run/netns/cni-db9be7fa-3285-1e57-5863-2b22518f127d" May 17 00:35:25.023557 env[1212]: 2025-05-17 00:35:24.839 [INFO][4170] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="00abf7b6297ce5a7553f42c1fa6a13245c90242046f7dcfe927acc6b856f3689" May 17 00:35:25.023557 env[1212]: 2025-05-17 00:35:24.839 [INFO][4170] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="00abf7b6297ce5a7553f42c1fa6a13245c90242046f7dcfe927acc6b856f3689" May 17 00:35:25.023557 env[1212]: 2025-05-17 00:35:24.973 [INFO][4221] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="00abf7b6297ce5a7553f42c1fa6a13245c90242046f7dcfe927acc6b856f3689" HandleID="k8s-pod-network.00abf7b6297ce5a7553f42c1fa6a13245c90242046f7dcfe927acc6b856f3689" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-calico--apiserver--68444b4b45--r6srh-eth0" May 17 00:35:25.023557 env[1212]: 2025-05-17 00:35:24.973 [INFO][4221] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:35:25.023557 env[1212]: 2025-05-17 00:35:24.973 [INFO][4221] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:35:25.023557 env[1212]: 2025-05-17 00:35:25.005 [WARNING][4221] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="00abf7b6297ce5a7553f42c1fa6a13245c90242046f7dcfe927acc6b856f3689" HandleID="k8s-pod-network.00abf7b6297ce5a7553f42c1fa6a13245c90242046f7dcfe927acc6b856f3689" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-calico--apiserver--68444b4b45--r6srh-eth0" May 17 00:35:25.023557 env[1212]: 2025-05-17 00:35:25.006 [INFO][4221] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="00abf7b6297ce5a7553f42c1fa6a13245c90242046f7dcfe927acc6b856f3689" HandleID="k8s-pod-network.00abf7b6297ce5a7553f42c1fa6a13245c90242046f7dcfe927acc6b856f3689" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-calico--apiserver--68444b4b45--r6srh-eth0" May 17 00:35:25.023557 env[1212]: 2025-05-17 00:35:25.014 [INFO][4221] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:35:25.023557 env[1212]: 2025-05-17 00:35:25.018 [INFO][4170] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="00abf7b6297ce5a7553f42c1fa6a13245c90242046f7dcfe927acc6b856f3689" May 17 00:35:25.029337 systemd[1]: run-netns-cni\x2ddb9be7fa\x2d3285\x2d1e57\x2d5863\x2d2b22518f127d.mount: Deactivated successfully. May 17 00:35:25.032839 env[1212]: time="2025-05-17T00:35:25.032767860Z" level=info msg="TearDown network for sandbox \"00abf7b6297ce5a7553f42c1fa6a13245c90242046f7dcfe927acc6b856f3689\" successfully" May 17 00:35:25.033045 env[1212]: time="2025-05-17T00:35:25.033009262Z" level=info msg="StopPodSandbox for \"00abf7b6297ce5a7553f42c1fa6a13245c90242046f7dcfe927acc6b856f3689\" returns successfully" May 17 00:35:25.044287 env[1212]: time="2025-05-17T00:35:25.044234967Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-68444b4b45-r6srh,Uid:908a611b-ce73-4141-bc04-98329eaa22ef,Namespace:calico-apiserver,Attempt:1,}" May 17 00:35:25.125555 systemd-networkd[1016]: calid1a7f4f4789: Gained IPv6LL May 17 00:35:25.318527 systemd-networkd[1016]: calif7497a94ddf: Gained IPv6LL May 17 00:35:25.509585 systemd-networkd[1016]: vxlan.calico: Gained IPv6LL May 17 00:35:25.517610 systemd-networkd[1016]: cali1a9305605d5: Link UP May 17 00:35:25.524421 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:35:25.534528 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali1a9305605d5: link becomes ready May 17 00:35:25.546678 systemd-networkd[1016]: cali1a9305605d5: Gained carrier May 17 00:35:25.589836 env[1212]: 2025-05-17 00:35:25.189 [INFO][4249] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-calico--apiserver--68444b4b45--r6srh-eth0 calico-apiserver-68444b4b45- calico-apiserver 908a611b-ce73-4141-bc04-98329eaa22ef 993 0 2025-05-17 00:34:54 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:68444b4b45 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758 calico-apiserver-68444b4b45-r6srh eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali1a9305605d5 [] [] }} ContainerID="1ab400e1ff567ce85c474b086d3f5e904e3cb0fac8a408d2192fcf3a6865e7f0" Namespace="calico-apiserver" Pod="calico-apiserver-68444b4b45-r6srh" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-calico--apiserver--68444b4b45--r6srh-" May 17 00:35:25.589836 env[1212]: 2025-05-17 00:35:25.189 [INFO][4249] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="1ab400e1ff567ce85c474b086d3f5e904e3cb0fac8a408d2192fcf3a6865e7f0" Namespace="calico-apiserver" Pod="calico-apiserver-68444b4b45-r6srh" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-calico--apiserver--68444b4b45--r6srh-eth0" May 17 00:35:25.589836 env[1212]: 2025-05-17 00:35:25.313 [INFO][4262] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="1ab400e1ff567ce85c474b086d3f5e904e3cb0fac8a408d2192fcf3a6865e7f0" HandleID="k8s-pod-network.1ab400e1ff567ce85c474b086d3f5e904e3cb0fac8a408d2192fcf3a6865e7f0" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-calico--apiserver--68444b4b45--r6srh-eth0" May 17 00:35:25.589836 env[1212]: 2025-05-17 00:35:25.314 [INFO][4262] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="1ab400e1ff567ce85c474b086d3f5e904e3cb0fac8a408d2192fcf3a6865e7f0" HandleID="k8s-pod-network.1ab400e1ff567ce85c474b086d3f5e904e3cb0fac8a408d2192fcf3a6865e7f0" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-calico--apiserver--68444b4b45--r6srh-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d1630), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758", "pod":"calico-apiserver-68444b4b45-r6srh", "timestamp":"2025-05-17 00:35:25.313837673 +0000 UTC"}, Hostname:"ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:35:25.589836 env[1212]: 2025-05-17 00:35:25.314 [INFO][4262] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:35:25.589836 env[1212]: 2025-05-17 00:35:25.314 [INFO][4262] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:35:25.589836 env[1212]: 2025-05-17 00:35:25.320 [INFO][4262] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758' May 17 00:35:25.589836 env[1212]: 2025-05-17 00:35:25.349 [INFO][4262] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.1ab400e1ff567ce85c474b086d3f5e904e3cb0fac8a408d2192fcf3a6865e7f0" host="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:35:25.589836 env[1212]: 2025-05-17 00:35:25.365 [INFO][4262] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:35:25.589836 env[1212]: 2025-05-17 00:35:25.385 [INFO][4262] ipam/ipam.go 511: Trying affinity for 192.168.43.128/26 host="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:35:25.589836 env[1212]: 2025-05-17 00:35:25.402 [INFO][4262] ipam/ipam.go 158: Attempting to load block cidr=192.168.43.128/26 host="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:35:25.589836 env[1212]: 2025-05-17 00:35:25.417 [INFO][4262] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.43.128/26 host="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:35:25.589836 env[1212]: 2025-05-17 00:35:25.417 [INFO][4262] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.43.128/26 handle="k8s-pod-network.1ab400e1ff567ce85c474b086d3f5e904e3cb0fac8a408d2192fcf3a6865e7f0" host="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:35:25.589836 env[1212]: 2025-05-17 00:35:25.431 [INFO][4262] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.1ab400e1ff567ce85c474b086d3f5e904e3cb0fac8a408d2192fcf3a6865e7f0 May 17 00:35:25.589836 env[1212]: 2025-05-17 00:35:25.476 [INFO][4262] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.43.128/26 handle="k8s-pod-network.1ab400e1ff567ce85c474b086d3f5e904e3cb0fac8a408d2192fcf3a6865e7f0" host="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:35:25.589836 env[1212]: 2025-05-17 00:35:25.506 [INFO][4262] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.43.136/26] block=192.168.43.128/26 handle="k8s-pod-network.1ab400e1ff567ce85c474b086d3f5e904e3cb0fac8a408d2192fcf3a6865e7f0" host="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:35:25.589836 env[1212]: 2025-05-17 00:35:25.506 [INFO][4262] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.43.136/26] handle="k8s-pod-network.1ab400e1ff567ce85c474b086d3f5e904e3cb0fac8a408d2192fcf3a6865e7f0" host="ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758" May 17 00:35:25.589836 env[1212]: 2025-05-17 00:35:25.506 [INFO][4262] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:35:25.589836 env[1212]: 2025-05-17 00:35:25.506 [INFO][4262] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.43.136/26] IPv6=[] ContainerID="1ab400e1ff567ce85c474b086d3f5e904e3cb0fac8a408d2192fcf3a6865e7f0" HandleID="k8s-pod-network.1ab400e1ff567ce85c474b086d3f5e904e3cb0fac8a408d2192fcf3a6865e7f0" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-calico--apiserver--68444b4b45--r6srh-eth0" May 17 00:35:25.591188 env[1212]: 2025-05-17 00:35:25.509 [INFO][4249] cni-plugin/k8s.go 418: Populated endpoint ContainerID="1ab400e1ff567ce85c474b086d3f5e904e3cb0fac8a408d2192fcf3a6865e7f0" Namespace="calico-apiserver" Pod="calico-apiserver-68444b4b45-r6srh" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-calico--apiserver--68444b4b45--r6srh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-calico--apiserver--68444b4b45--r6srh-eth0", GenerateName:"calico-apiserver-68444b4b45-", Namespace:"calico-apiserver", SelfLink:"", UID:"908a611b-ce73-4141-bc04-98329eaa22ef", ResourceVersion:"993", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 34, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"68444b4b45", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758", ContainerID:"", Pod:"calico-apiserver-68444b4b45-r6srh", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.43.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali1a9305605d5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:35:25.591188 env[1212]: 2025-05-17 00:35:25.513 [INFO][4249] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.43.136/32] ContainerID="1ab400e1ff567ce85c474b086d3f5e904e3cb0fac8a408d2192fcf3a6865e7f0" Namespace="calico-apiserver" Pod="calico-apiserver-68444b4b45-r6srh" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-calico--apiserver--68444b4b45--r6srh-eth0" May 17 00:35:25.591188 env[1212]: 2025-05-17 00:35:25.513 [INFO][4249] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali1a9305605d5 ContainerID="1ab400e1ff567ce85c474b086d3f5e904e3cb0fac8a408d2192fcf3a6865e7f0" Namespace="calico-apiserver" Pod="calico-apiserver-68444b4b45-r6srh" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-calico--apiserver--68444b4b45--r6srh-eth0" May 17 00:35:25.591188 env[1212]: 2025-05-17 00:35:25.546 [INFO][4249] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="1ab400e1ff567ce85c474b086d3f5e904e3cb0fac8a408d2192fcf3a6865e7f0" Namespace="calico-apiserver" Pod="calico-apiserver-68444b4b45-r6srh" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-calico--apiserver--68444b4b45--r6srh-eth0" May 17 00:35:25.591188 env[1212]: 2025-05-17 00:35:25.547 [INFO][4249] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="1ab400e1ff567ce85c474b086d3f5e904e3cb0fac8a408d2192fcf3a6865e7f0" Namespace="calico-apiserver" Pod="calico-apiserver-68444b4b45-r6srh" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-calico--apiserver--68444b4b45--r6srh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-calico--apiserver--68444b4b45--r6srh-eth0", GenerateName:"calico-apiserver-68444b4b45-", Namespace:"calico-apiserver", SelfLink:"", UID:"908a611b-ce73-4141-bc04-98329eaa22ef", ResourceVersion:"993", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 34, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"68444b4b45", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758", ContainerID:"1ab400e1ff567ce85c474b086d3f5e904e3cb0fac8a408d2192fcf3a6865e7f0", Pod:"calico-apiserver-68444b4b45-r6srh", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.43.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali1a9305605d5", MAC:"06:14:2c:97:a6:25", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:35:25.591188 env[1212]: 2025-05-17 00:35:25.587 [INFO][4249] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="1ab400e1ff567ce85c474b086d3f5e904e3cb0fac8a408d2192fcf3a6865e7f0" Namespace="calico-apiserver" Pod="calico-apiserver-68444b4b45-r6srh" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-calico--apiserver--68444b4b45--r6srh-eth0" May 17 00:35:25.656892 env[1212]: time="2025-05-17T00:35:25.656786923Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:35:25.657107 env[1212]: time="2025-05-17T00:35:25.656895382Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:35:25.657107 env[1212]: time="2025-05-17T00:35:25.656936516Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:35:25.657247 env[1212]: time="2025-05-17T00:35:25.657169822Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1ab400e1ff567ce85c474b086d3f5e904e3cb0fac8a408d2192fcf3a6865e7f0 pid=4299 runtime=io.containerd.runc.v2 May 17 00:35:25.715823 systemd[1]: Started cri-containerd-1ab400e1ff567ce85c474b086d3f5e904e3cb0fac8a408d2192fcf3a6865e7f0.scope. May 17 00:35:25.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:25.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:25.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:25.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:25.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:25.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:25.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:25.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:25.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:25.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:25.778000 audit: BPF prog-id=194 op=LOAD May 17 00:35:25.779000 audit[4311]: AVC avc: denied { bpf } for pid=4311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:25.779000 audit[4311]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4299 pid=4311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:25.779000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161623430306531666635363763653835633437346230383664336635 May 17 00:35:25.779000 audit[4311]: AVC avc: denied { perfmon } for pid=4311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:25.779000 audit[4311]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=4299 pid=4311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:25.779000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161623430306531666635363763653835633437346230383664336635 May 17 00:35:25.779000 audit[4311]: AVC avc: denied { bpf } for pid=4311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:25.779000 audit[4311]: AVC avc: denied { bpf } for pid=4311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:25.779000 audit[4311]: AVC avc: denied { bpf } for pid=4311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:25.779000 audit[4311]: AVC avc: denied { perfmon } for pid=4311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:25.779000 audit[4311]: AVC avc: denied { perfmon } for pid=4311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:25.779000 audit[4311]: AVC avc: denied { perfmon } for pid=4311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:25.779000 audit[4311]: AVC avc: denied { perfmon } for pid=4311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:25.779000 audit[4311]: AVC avc: denied { perfmon } for pid=4311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:25.779000 audit[4311]: AVC avc: denied { bpf } for pid=4311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:25.779000 audit[4311]: AVC avc: denied { bpf } for pid=4311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:25.779000 audit: BPF prog-id=195 op=LOAD May 17 00:35:25.779000 audit[4311]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000259ae0 items=0 ppid=4299 pid=4311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:25.779000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161623430306531666635363763653835633437346230383664336635 May 17 00:35:25.779000 audit[4311]: AVC avc: denied { bpf } for pid=4311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:25.779000 audit[4311]: AVC avc: denied { bpf } for pid=4311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:25.779000 audit[4311]: AVC avc: denied { perfmon } for pid=4311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:25.779000 audit[4311]: AVC avc: denied { perfmon } for pid=4311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:25.779000 audit[4311]: AVC avc: denied { perfmon } for pid=4311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:25.779000 audit[4311]: AVC avc: denied { perfmon } for pid=4311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:25.779000 audit[4311]: AVC avc: denied { perfmon } for pid=4311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:25.779000 audit[4311]: AVC avc: denied { bpf } for pid=4311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:25.779000 audit[4311]: AVC avc: denied { bpf } for pid=4311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:25.779000 audit: BPF prog-id=196 op=LOAD May 17 00:35:25.779000 audit[4311]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000259b28 items=0 ppid=4299 pid=4311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:25.779000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161623430306531666635363763653835633437346230383664336635 May 17 00:35:25.779000 audit: BPF prog-id=196 op=UNLOAD May 17 00:35:25.780000 audit: BPF prog-id=195 op=UNLOAD May 17 00:35:25.780000 audit[4311]: AVC avc: denied { bpf } for pid=4311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:25.780000 audit[4311]: AVC avc: denied { bpf } for pid=4311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:25.780000 audit[4311]: AVC avc: denied { bpf } for pid=4311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:25.780000 audit[4311]: AVC avc: denied { perfmon } for pid=4311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:25.780000 audit[4311]: AVC avc: denied { perfmon } for pid=4311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:25.780000 audit[4311]: AVC avc: denied { perfmon } for pid=4311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:25.780000 audit[4311]: AVC avc: denied { perfmon } for pid=4311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:25.780000 audit[4311]: AVC avc: denied { perfmon } for pid=4311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:25.780000 audit[4311]: AVC avc: denied { bpf } for pid=4311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:25.780000 audit[4311]: AVC avc: denied { bpf } for pid=4311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:25.780000 audit: BPF prog-id=197 op=LOAD May 17 00:35:25.780000 audit[4311]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000259f38 items=0 ppid=4299 pid=4311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:25.780000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161623430306531666635363763653835633437346230383664336635 May 17 00:35:25.805000 audit[4329]: NETFILTER_CFG table=filter:112 family=2 entries=57 op=nft_register_chain pid=4329 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:35:25.805000 audit[4329]: SYSCALL arch=c000003e syscall=46 success=yes exit=27812 a0=3 a1=7ffcbada1860 a2=0 a3=7ffcbada184c items=0 ppid=3777 pid=4329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:25.805000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:35:25.859111 env[1212]: time="2025-05-17T00:35:25.858964625Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-68444b4b45-r6srh,Uid:908a611b-ce73-4141-bc04-98329eaa22ef,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"1ab400e1ff567ce85c474b086d3f5e904e3cb0fac8a408d2192fcf3a6865e7f0\"" May 17 00:35:25.968328 kubelet[2012]: I0517 00:35:25.968222 2012 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-668d6bf9bc-6zjt5" podStartSLOduration=41.968199527 podStartE2EDuration="41.968199527s" podCreationTimestamp="2025-05-17 00:34:44 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:35:25.965482824 +0000 UTC m=+48.646628205" watchObservedRunningTime="2025-05-17 00:35:25.968199527 +0000 UTC m=+48.649344906" May 17 00:35:26.007938 systemd[1]: run-containerd-runc-k8s.io-86937f2fa6aea780273f5e3ebb4de50aad612e8544bc0cd4da674142b77a9c46-runc.x0Z3pR.mount: Deactivated successfully. May 17 00:35:26.066000 audit[4337]: NETFILTER_CFG table=filter:113 family=2 entries=14 op=nft_register_rule pid=4337 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:35:26.066000 audit[4337]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7fff9de7d850 a2=0 a3=7fff9de7d83c items=0 ppid=2172 pid=4337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:26.066000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:35:26.071000 audit[4337]: NETFILTER_CFG table=nat:114 family=2 entries=44 op=nft_register_rule pid=4337 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:35:26.071000 audit[4337]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7fff9de7d850 a2=0 a3=7fff9de7d83c items=0 ppid=2172 pid=4337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:26.071000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:35:26.138000 audit[4339]: NETFILTER_CFG table=filter:115 family=2 entries=14 op=nft_register_rule pid=4339 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:35:26.138000 audit[4339]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7fff81afcb40 a2=0 a3=7fff81afcb2c items=0 ppid=2172 pid=4339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:26.138000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:35:26.168000 audit[4339]: NETFILTER_CFG table=nat:116 family=2 entries=56 op=nft_register_chain pid=4339 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:35:26.168000 audit[4339]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7fff81afcb40 a2=0 a3=7fff81afcb2c items=0 ppid=2172 pid=4339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:26.168000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:35:26.223101 env[1212]: time="2025-05-17T00:35:26.223046423Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:26.225894 env[1212]: time="2025-05-17T00:35:26.225849232Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:094053209304a3d20e6561c18d37ac2dc4c7fbb68c1579d9864c303edebffa50,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:26.227817 env[1212]: time="2025-05-17T00:35:26.227781737Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:26.229732 env[1212]: time="2025-05-17T00:35:26.229695988Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:eb5bc5c9e7a71f1d8ea69bbcc8e54b84fb7ec1e32d919c8b148f80b770f20182,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:26.231512 env[1212]: time="2025-05-17T00:35:26.230511272Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.0\" returns image reference \"sha256:094053209304a3d20e6561c18d37ac2dc4c7fbb68c1579d9864c303edebffa50\"" May 17 00:35:26.233244 env[1212]: time="2025-05-17T00:35:26.233205564Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.0\"" May 17 00:35:26.266190 env[1212]: time="2025-05-17T00:35:26.266129656Z" level=info msg="CreateContainer within sandbox \"d1ad55d169eedb1da98455b18bcb3a06d6962e829f4e29730ca9c0dd90f9f477\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" May 17 00:35:26.287356 env[1212]: time="2025-05-17T00:35:26.287304315Z" level=info msg="CreateContainer within sandbox \"d1ad55d169eedb1da98455b18bcb3a06d6962e829f4e29730ca9c0dd90f9f477\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"aafd819f18ab642d11159955ae004c151c3b617b0e508441e4969562b1e4f02e\"" May 17 00:35:26.290521 env[1212]: time="2025-05-17T00:35:26.290474153Z" level=info msg="StartContainer for \"aafd819f18ab642d11159955ae004c151c3b617b0e508441e4969562b1e4f02e\"" May 17 00:35:26.299687 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2182732987.mount: Deactivated successfully. May 17 00:35:26.331669 systemd[1]: Started cri-containerd-aafd819f18ab642d11159955ae004c151c3b617b0e508441e4969562b1e4f02e.scope. May 17 00:35:26.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:26.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:26.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:26.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:26.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:26.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:26.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:26.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:26.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:26.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:26.372000 audit: BPF prog-id=198 op=LOAD May 17 00:35:26.374000 audit[4351]: AVC avc: denied { bpf } for pid=4351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:26.374000 audit[4351]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3538 pid=4351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:26.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161666438313966313861623634326431313135393935356165303034 May 17 00:35:26.374000 audit[4351]: AVC avc: denied { perfmon } for pid=4351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:26.374000 audit[4351]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=3538 pid=4351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:26.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161666438313966313861623634326431313135393935356165303034 May 17 00:35:26.375000 audit[4351]: AVC avc: denied { bpf } for pid=4351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:26.375000 audit[4351]: AVC avc: denied { bpf } for pid=4351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:26.375000 audit[4351]: AVC avc: denied { bpf } for pid=4351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:26.375000 audit[4351]: AVC avc: denied { perfmon } for pid=4351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:26.375000 audit[4351]: AVC avc: denied { perfmon } for pid=4351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:26.375000 audit[4351]: AVC avc: denied { perfmon } for pid=4351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:26.375000 audit[4351]: AVC avc: denied { perfmon } for pid=4351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:26.375000 audit[4351]: AVC avc: denied { perfmon } for pid=4351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:26.375000 audit[4351]: AVC avc: denied { bpf } for pid=4351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:26.375000 audit[4351]: AVC avc: denied { bpf } for pid=4351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:26.375000 audit: BPF prog-id=199 op=LOAD May 17 00:35:26.375000 audit[4351]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c00030c370 items=0 ppid=3538 pid=4351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:26.375000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161666438313966313861623634326431313135393935356165303034 May 17 00:35:26.376000 audit[4351]: AVC avc: denied { bpf } for pid=4351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:26.376000 audit[4351]: AVC avc: denied { bpf } for pid=4351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:26.376000 audit[4351]: AVC avc: denied { perfmon } for pid=4351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:26.376000 audit[4351]: AVC avc: denied { perfmon } for pid=4351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:26.376000 audit[4351]: AVC avc: denied { perfmon } for pid=4351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:26.376000 audit[4351]: AVC avc: denied { perfmon } for pid=4351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:26.376000 audit[4351]: AVC avc: denied { perfmon } for pid=4351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:26.376000 audit[4351]: AVC avc: denied { bpf } for pid=4351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:26.376000 audit[4351]: AVC avc: denied { bpf } for pid=4351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:26.376000 audit: BPF prog-id=200 op=LOAD May 17 00:35:26.376000 audit[4351]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c00030c3b8 items=0 ppid=3538 pid=4351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:26.376000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161666438313966313861623634326431313135393935356165303034 May 17 00:35:26.377000 audit: BPF prog-id=200 op=UNLOAD May 17 00:35:26.378000 audit: BPF prog-id=199 op=UNLOAD May 17 00:35:26.378000 audit[4351]: AVC avc: denied { bpf } for pid=4351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:26.378000 audit[4351]: AVC avc: denied { bpf } for pid=4351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:26.378000 audit[4351]: AVC avc: denied { bpf } for pid=4351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:26.378000 audit[4351]: AVC avc: denied { perfmon } for pid=4351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:26.378000 audit[4351]: AVC avc: denied { perfmon } for pid=4351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:26.378000 audit[4351]: AVC avc: denied { perfmon } for pid=4351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:26.378000 audit[4351]: AVC avc: denied { perfmon } for pid=4351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:26.378000 audit[4351]: AVC avc: denied { perfmon } for pid=4351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:26.378000 audit[4351]: AVC avc: denied { bpf } for pid=4351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:26.378000 audit[4351]: AVC avc: denied { bpf } for pid=4351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:26.378000 audit: BPF prog-id=201 op=LOAD May 17 00:35:26.378000 audit[4351]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c00030c7c8 items=0 ppid=3538 pid=4351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:26.378000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161666438313966313861623634326431313135393935356165303034 May 17 00:35:26.405594 systemd-networkd[1016]: calia4152bd0b74: Gained IPv6LL May 17 00:35:26.445260 env[1212]: time="2025-05-17T00:35:26.445202955Z" level=info msg="StartContainer for \"aafd819f18ab642d11159955ae004c151c3b617b0e508441e4969562b1e4f02e\" returns successfully" May 17 00:35:26.662113 systemd-networkd[1016]: cali1a9305605d5: Gained IPv6LL May 17 00:35:26.953710 kubelet[2012]: I0517 00:35:26.953524 2012 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-5dfd77fb7d-55blf" podStartSLOduration=23.153486993 podStartE2EDuration="28.953499919s" podCreationTimestamp="2025-05-17 00:34:58 +0000 UTC" firstStartedPulling="2025-05-17 00:35:20.432974129 +0000 UTC m=+43.114119495" lastFinishedPulling="2025-05-17 00:35:26.232987057 +0000 UTC m=+48.914132421" observedRunningTime="2025-05-17 00:35:26.950524361 +0000 UTC m=+49.631669746" watchObservedRunningTime="2025-05-17 00:35:26.953499919 +0000 UTC m=+49.634645304" May 17 00:35:27.319845 env[1212]: time="2025-05-17T00:35:27.319786591Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:27.322723 env[1212]: time="2025-05-17T00:35:27.322663646Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d5b08093b7928c0ac1122e59edf69b2e58c6d10ecc8b9e5cffeb809a956dc48e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:27.325056 env[1212]: time="2025-05-17T00:35:27.325003186Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:27.327110 env[1212]: time="2025-05-17T00:35:27.327067361Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:27883a4104876fe239311dd93ce6efd0c4a87de7163d57a4c8d96bd65a287ffd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:27.328140 env[1212]: time="2025-05-17T00:35:27.328075960Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.0\" returns image reference \"sha256:d5b08093b7928c0ac1122e59edf69b2e58c6d10ecc8b9e5cffeb809a956dc48e\"" May 17 00:35:27.330988 env[1212]: time="2025-05-17T00:35:27.330948775Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\"" May 17 00:35:27.332703 env[1212]: time="2025-05-17T00:35:27.332654508Z" level=info msg="CreateContainer within sandbox \"bb107d470c9792b792c0a8cc56dc38513f86f4cd856146d650c48504effd925f\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 17 00:35:27.359182 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2029266028.mount: Deactivated successfully. May 17 00:35:27.367864 env[1212]: time="2025-05-17T00:35:27.367796042Z" level=info msg="CreateContainer within sandbox \"bb107d470c9792b792c0a8cc56dc38513f86f4cd856146d650c48504effd925f\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"886e2d24f30045ef83a3f6b770f2245195a45740ba4cbe2939c845022e60e7fe\"" May 17 00:35:27.368934 env[1212]: time="2025-05-17T00:35:27.368892751Z" level=info msg="StartContainer for \"886e2d24f30045ef83a3f6b770f2245195a45740ba4cbe2939c845022e60e7fe\"" May 17 00:35:27.414868 systemd[1]: Started cri-containerd-886e2d24f30045ef83a3f6b770f2245195a45740ba4cbe2939c845022e60e7fe.scope. May 17 00:35:27.435000 audit[4418]: AVC avc: denied { perfmon } for pid=4418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:27.442274 kernel: kauditd_printk_skb: 839 callbacks suppressed May 17 00:35:27.442405 kernel: audit: type=1400 audit(1747442127.435:1306): avc: denied { perfmon } for pid=4418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:27.463625 kernel: audit: type=1300 audit(1747442127.435:1306): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f4a4aeba7b8 items=0 ppid=3724 pid=4418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:27.435000 audit[4418]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f4a4aeba7b8 items=0 ppid=3724 pid=4418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:27.464220 env[1212]: time="2025-05-17T00:35:27.464153458Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:35:27.525147 kernel: audit: type=1327 audit(1747442127.435:1306): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838366532643234663330303435656638336133663662373730663232 May 17 00:35:27.435000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838366532643234663330303435656638336133663662373730663232 May 17 00:35:27.435000 audit[4418]: AVC avc: denied { bpf } for pid=4418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:27.546390 kernel: audit: type=1400 audit(1747442127.435:1307): avc: denied { bpf } for pid=4418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:27.435000 audit[4418]: AVC avc: denied { bpf } for pid=4418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:27.547464 env[1212]: time="2025-05-17T00:35:27.547393865Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:35:27.550404 kubelet[2012]: E0517 00:35:27.547882 2012 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:35:27.550404 kubelet[2012]: E0517 00:35:27.547953 2012 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:35:27.550404 kubelet[2012]: E0517 00:35:27.548275 2012 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-9zz59,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-78d55f7ddc-8tw2k_calico-system(6fdee754-80af-4193-bcf6-93825e6ce6df): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:35:27.551419 kubelet[2012]: E0517 00:35:27.551330 2012 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-8tw2k" podUID="6fdee754-80af-4193-bcf6-93825e6ce6df" May 17 00:35:27.551936 env[1212]: time="2025-05-17T00:35:27.551896032Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\"" May 17 00:35:27.568445 kernel: audit: type=1400 audit(1747442127.435:1307): avc: denied { bpf } for pid=4418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:27.568562 kernel: audit: type=1400 audit(1747442127.435:1307): avc: denied { bpf } for pid=4418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:27.435000 audit[4418]: AVC avc: denied { bpf } for pid=4418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:27.591423 kernel: audit: type=1400 audit(1747442127.435:1307): avc: denied { perfmon } for pid=4418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:27.435000 audit[4418]: AVC avc: denied { perfmon } for pid=4418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:27.435000 audit[4418]: AVC avc: denied { perfmon } for pid=4418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:27.614605 env[1212]: time="2025-05-17T00:35:27.613417522Z" level=info msg="StartContainer for \"886e2d24f30045ef83a3f6b770f2245195a45740ba4cbe2939c845022e60e7fe\" returns successfully" May 17 00:35:27.632423 kernel: audit: type=1400 audit(1747442127.435:1307): avc: denied { perfmon } for pid=4418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:27.435000 audit[4418]: AVC avc: denied { perfmon } for pid=4418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:27.657426 kernel: audit: type=1400 audit(1747442127.435:1307): avc: denied { perfmon } for pid=4418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:27.657554 kernel: audit: type=1400 audit(1747442127.435:1307): avc: denied { perfmon } for pid=4418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:27.435000 audit[4418]: AVC avc: denied { perfmon } for pid=4418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:27.435000 audit[4418]: AVC avc: denied { perfmon } for pid=4418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:27.435000 audit[4418]: AVC avc: denied { bpf } for pid=4418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:27.435000 audit[4418]: AVC avc: denied { bpf } for pid=4418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:27.435000 audit: BPF prog-id=202 op=LOAD May 17 00:35:27.435000 audit[4418]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00032d178 items=0 ppid=3724 pid=4418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:27.435000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838366532643234663330303435656638336133663662373730663232 May 17 00:35:27.463000 audit[4418]: AVC avc: denied { bpf } for pid=4418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:27.463000 audit[4418]: AVC avc: denied { bpf } for pid=4418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:27.463000 audit[4418]: AVC avc: denied { perfmon } for pid=4418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:27.463000 audit[4418]: AVC avc: denied { perfmon } for pid=4418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:27.463000 audit[4418]: AVC avc: denied { perfmon } for pid=4418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:27.463000 audit[4418]: AVC avc: denied { perfmon } for pid=4418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:27.463000 audit[4418]: AVC avc: denied { perfmon } for pid=4418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:27.463000 audit[4418]: AVC avc: denied { bpf } for pid=4418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:27.463000 audit[4418]: AVC avc: denied { bpf } for pid=4418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:27.463000 audit: BPF prog-id=203 op=LOAD May 17 00:35:27.463000 audit[4418]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00032d1c8 items=0 ppid=3724 pid=4418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:27.463000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838366532643234663330303435656638336133663662373730663232 May 17 00:35:27.494000 audit: BPF prog-id=203 op=UNLOAD May 17 00:35:27.495000 audit: BPF prog-id=202 op=UNLOAD May 17 00:35:27.495000 audit[4418]: AVC avc: denied { bpf } for pid=4418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:27.495000 audit[4418]: AVC avc: denied { bpf } for pid=4418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:27.495000 audit[4418]: AVC avc: denied { bpf } for pid=4418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:27.495000 audit[4418]: AVC avc: denied { perfmon } for pid=4418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:27.495000 audit[4418]: AVC avc: denied { perfmon } for pid=4418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:27.495000 audit[4418]: AVC avc: denied { perfmon } for pid=4418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:27.495000 audit[4418]: AVC avc: denied { perfmon } for pid=4418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:27.495000 audit[4418]: AVC avc: denied { perfmon } for pid=4418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:27.495000 audit[4418]: AVC avc: denied { bpf } for pid=4418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:27.495000 audit[4418]: AVC avc: denied { bpf } for pid=4418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:27.495000 audit: BPF prog-id=204 op=LOAD May 17 00:35:27.495000 audit[4418]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00032d258 items=0 ppid=3724 pid=4418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:27.495000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838366532643234663330303435656638336133663662373730663232 May 17 00:35:27.939303 kubelet[2012]: E0517 00:35:27.937141 2012 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-8tw2k" podUID="6fdee754-80af-4193-bcf6-93825e6ce6df" May 17 00:35:27.971000 audit[4447]: NETFILTER_CFG table=filter:117 family=2 entries=14 op=nft_register_rule pid=4447 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:35:27.971000 audit[4447]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffeba290d20 a2=0 a3=7ffeba290d0c items=0 ppid=2172 pid=4447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:27.971000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:35:27.975000 audit[4447]: NETFILTER_CFG table=nat:118 family=2 entries=20 op=nft_register_rule pid=4447 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:35:27.975000 audit[4447]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffeba290d20 a2=0 a3=7ffeba290d0c items=0 ppid=2172 pid=4447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:27.975000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:35:31.020760 env[1212]: time="2025-05-17T00:35:31.020692427Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:31.024648 env[1212]: time="2025-05-17T00:35:31.024572123Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5fa544b30bbe7e24458b21b80890f8834eebe8bcb99071f6caded1a39fc59082,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:31.028067 env[1212]: time="2025-05-17T00:35:31.028021869Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:31.031305 env[1212]: time="2025-05-17T00:35:31.031257237Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:ad7d2e76f15777636c5d91c108d7655659b38fe8970255050ffa51223eb96ff4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:31.033303 env[1212]: time="2025-05-17T00:35:31.032358913Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\" returns image reference \"sha256:5fa544b30bbe7e24458b21b80890f8834eebe8bcb99071f6caded1a39fc59082\"" May 17 00:35:31.035399 env[1212]: time="2025-05-17T00:35:31.035342639Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\"" May 17 00:35:31.037508 env[1212]: time="2025-05-17T00:35:31.037469249Z" level=info msg="CreateContainer within sandbox \"46c07d14feb7f301bbfd58b31ab295aac5560242c7e48609970c8d7cbe12ba10\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 17 00:35:31.061564 env[1212]: time="2025-05-17T00:35:31.061498310Z" level=info msg="CreateContainer within sandbox \"46c07d14feb7f301bbfd58b31ab295aac5560242c7e48609970c8d7cbe12ba10\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"c231f76829216fd8f3f0ace1e47936afd164eab08172fb00cb9a05d3fe2bd4d6\"" May 17 00:35:31.062469 env[1212]: time="2025-05-17T00:35:31.062422648Z" level=info msg="StartContainer for \"c231f76829216fd8f3f0ace1e47936afd164eab08172fb00cb9a05d3fe2bd4d6\"" May 17 00:35:31.124104 systemd[1]: Started cri-containerd-c231f76829216fd8f3f0ace1e47936afd164eab08172fb00cb9a05d3fe2bd4d6.scope. May 17 00:35:31.152818 systemd[1]: run-containerd-runc-k8s.io-c231f76829216fd8f3f0ace1e47936afd164eab08172fb00cb9a05d3fe2bd4d6-runc.xrE3ba.mount: Deactivated successfully. May 17 00:35:31.199000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.199000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.199000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.199000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.199000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.199000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.199000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.199000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.199000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.199000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.199000 audit: BPF prog-id=205 op=LOAD May 17 00:35:31.204000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.204000 audit[4463]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=4011 pid=4463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:31.204000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332333166373638323932313666643866336630616365316534373933 May 17 00:35:31.205000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.205000 audit[4463]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=4011 pid=4463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:31.205000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332333166373638323932313666643866336630616365316534373933 May 17 00:35:31.206000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.206000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.206000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.206000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.206000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.206000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.206000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.206000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.206000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.206000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.206000 audit: BPF prog-id=206 op=LOAD May 17 00:35:31.206000 audit[4463]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0003c0010 items=0 ppid=4011 pid=4463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:31.206000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332333166373638323932313666643866336630616365316534373933 May 17 00:35:31.207000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.207000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.207000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.207000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.207000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.207000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.207000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.207000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.207000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.207000 audit: BPF prog-id=207 op=LOAD May 17 00:35:31.207000 audit[4463]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0003c0058 items=0 ppid=4011 pid=4463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:31.207000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332333166373638323932313666643866336630616365316534373933 May 17 00:35:31.208000 audit: BPF prog-id=207 op=UNLOAD May 17 00:35:31.209000 audit: BPF prog-id=206 op=UNLOAD May 17 00:35:31.209000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.209000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.209000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.209000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.209000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.209000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.209000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.209000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.209000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.209000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.209000 audit: BPF prog-id=208 op=LOAD May 17 00:35:31.209000 audit[4463]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0003c0468 items=0 ppid=4011 pid=4463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:31.209000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332333166373638323932313666643866336630616365316534373933 May 17 00:35:31.239511 env[1212]: time="2025-05-17T00:35:31.239449938Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:31.242781 env[1212]: time="2025-05-17T00:35:31.242732386Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:5fa544b30bbe7e24458b21b80890f8834eebe8bcb99071f6caded1a39fc59082,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:31.246014 env[1212]: time="2025-05-17T00:35:31.245920438Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:31.248928 env[1212]: time="2025-05-17T00:35:31.248871569Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:ad7d2e76f15777636c5d91c108d7655659b38fe8970255050ffa51223eb96ff4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:31.249823 env[1212]: time="2025-05-17T00:35:31.249772670Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\" returns image reference \"sha256:5fa544b30bbe7e24458b21b80890f8834eebe8bcb99071f6caded1a39fc59082\"" May 17 00:35:31.253437 env[1212]: time="2025-05-17T00:35:31.253391410Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0\"" May 17 00:35:31.255553 env[1212]: time="2025-05-17T00:35:31.255507327Z" level=info msg="CreateContainer within sandbox \"1ab400e1ff567ce85c474b086d3f5e904e3cb0fac8a408d2192fcf3a6865e7f0\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 17 00:35:31.285627 env[1212]: time="2025-05-17T00:35:31.285493380Z" level=info msg="CreateContainer within sandbox \"1ab400e1ff567ce85c474b086d3f5e904e3cb0fac8a408d2192fcf3a6865e7f0\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"ed544ac63a864e26497f7bd16b408a8337c1daca668587bd955228257609f371\"" May 17 00:35:31.289290 env[1212]: time="2025-05-17T00:35:31.286561911Z" level=info msg="StartContainer for \"ed544ac63a864e26497f7bd16b408a8337c1daca668587bd955228257609f371\"" May 17 00:35:31.304515 env[1212]: time="2025-05-17T00:35:31.304460155Z" level=info msg="StartContainer for \"c231f76829216fd8f3f0ace1e47936afd164eab08172fb00cb9a05d3fe2bd4d6\" returns successfully" May 17 00:35:31.335129 systemd[1]: Started cri-containerd-ed544ac63a864e26497f7bd16b408a8337c1daca668587bd955228257609f371.scope. May 17 00:35:31.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.487000 audit: BPF prog-id=209 op=LOAD May 17 00:35:31.489000 audit[4496]: AVC avc: denied { bpf } for pid=4496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.489000 audit[4496]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4299 pid=4496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:31.489000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564353434616336336138363465323634393766376264313662343038 May 17 00:35:31.489000 audit[4496]: AVC avc: denied { perfmon } for pid=4496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.489000 audit[4496]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4299 pid=4496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:31.489000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564353434616336336138363465323634393766376264313662343038 May 17 00:35:31.490000 audit[4496]: AVC avc: denied { bpf } for pid=4496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.490000 audit[4496]: AVC avc: denied { bpf } for pid=4496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.490000 audit[4496]: AVC avc: denied { bpf } for pid=4496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.490000 audit[4496]: AVC avc: denied { perfmon } for pid=4496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.490000 audit[4496]: AVC avc: denied { perfmon } for pid=4496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.490000 audit[4496]: AVC avc: denied { perfmon } for pid=4496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.490000 audit[4496]: AVC avc: denied { perfmon } for pid=4496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.490000 audit[4496]: AVC avc: denied { perfmon } for pid=4496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.490000 audit[4496]: AVC avc: denied { bpf } for pid=4496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.490000 audit[4496]: AVC avc: denied { bpf } for pid=4496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.490000 audit: BPF prog-id=210 op=LOAD May 17 00:35:31.490000 audit[4496]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002ebeb0 items=0 ppid=4299 pid=4496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:31.490000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564353434616336336138363465323634393766376264313662343038 May 17 00:35:31.491000 audit[4496]: AVC avc: denied { bpf } for pid=4496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.491000 audit[4496]: AVC avc: denied { bpf } for pid=4496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.491000 audit[4496]: AVC avc: denied { perfmon } for pid=4496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.491000 audit[4496]: AVC avc: denied { perfmon } for pid=4496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.491000 audit[4496]: AVC avc: denied { perfmon } for pid=4496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.491000 audit[4496]: AVC avc: denied { perfmon } for pid=4496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.491000 audit[4496]: AVC avc: denied { perfmon } for pid=4496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.491000 audit[4496]: AVC avc: denied { bpf } for pid=4496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.491000 audit[4496]: AVC avc: denied { bpf } for pid=4496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.491000 audit: BPF prog-id=211 op=LOAD May 17 00:35:31.491000 audit[4496]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002ebef8 items=0 ppid=4299 pid=4496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:31.491000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564353434616336336138363465323634393766376264313662343038 May 17 00:35:31.494000 audit: BPF prog-id=211 op=UNLOAD May 17 00:35:31.494000 audit: BPF prog-id=210 op=UNLOAD May 17 00:35:31.495000 audit[4496]: AVC avc: denied { bpf } for pid=4496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.495000 audit[4496]: AVC avc: denied { bpf } for pid=4496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.495000 audit[4496]: AVC avc: denied { bpf } for pid=4496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.495000 audit[4496]: AVC avc: denied { perfmon } for pid=4496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.495000 audit[4496]: AVC avc: denied { perfmon } for pid=4496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.495000 audit[4496]: AVC avc: denied { perfmon } for pid=4496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.495000 audit[4496]: AVC avc: denied { perfmon } for pid=4496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.495000 audit[4496]: AVC avc: denied { perfmon } for pid=4496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.495000 audit[4496]: AVC avc: denied { bpf } for pid=4496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.495000 audit[4496]: AVC avc: denied { bpf } for pid=4496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.495000 audit: BPF prog-id=212 op=LOAD May 17 00:35:31.495000 audit[4496]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000346308 items=0 ppid=4299 pid=4496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:31.495000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564353434616336336138363465323634393766376264313662343038 May 17 00:35:31.554585 env[1212]: time="2025-05-17T00:35:31.554454702Z" level=info msg="StartContainer for \"ed544ac63a864e26497f7bd16b408a8337c1daca668587bd955228257609f371\" returns successfully" May 17 00:35:31.992886 kubelet[2012]: I0517 00:35:31.992803 2012 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-68444b4b45-l4vgc" podStartSLOduration=30.976182042 podStartE2EDuration="37.992776019s" podCreationTimestamp="2025-05-17 00:34:54 +0000 UTC" firstStartedPulling="2025-05-17 00:35:24.017811522 +0000 UTC m=+46.698956881" lastFinishedPulling="2025-05-17 00:35:31.034405483 +0000 UTC m=+53.715550858" observedRunningTime="2025-05-17 00:35:31.970319835 +0000 UTC m=+54.651465223" watchObservedRunningTime="2025-05-17 00:35:31.992776019 +0000 UTC m=+54.673921404" May 17 00:35:32.062961 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3233206479.mount: Deactivated successfully. May 17 00:35:32.126000 audit[4539]: NETFILTER_CFG table=filter:119 family=2 entries=14 op=nft_register_rule pid=4539 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:35:32.126000 audit[4539]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffde4c3e1c0 a2=0 a3=7ffde4c3e1ac items=0 ppid=2172 pid=4539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:32.126000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:35:32.135000 audit[4539]: NETFILTER_CFG table=nat:120 family=2 entries=20 op=nft_register_rule pid=4539 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:35:32.135000 audit[4539]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffde4c3e1c0 a2=0 a3=7ffde4c3e1ac items=0 ppid=2172 pid=4539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:32.135000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:35:32.587109 kernel: kauditd_printk_skb: 159 callbacks suppressed May 17 00:35:32.587278 kernel: audit: type=1325 audit(1747442132.564:1352): table=filter:121 family=2 entries=14 op=nft_register_rule pid=4541 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:35:32.564000 audit[4541]: NETFILTER_CFG table=filter:121 family=2 entries=14 op=nft_register_rule pid=4541 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:35:32.564000 audit[4541]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffcdb7db9d0 a2=0 a3=7ffcdb7db9bc items=0 ppid=2172 pid=4541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:32.636462 kernel: audit: type=1300 audit(1747442132.564:1352): arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffcdb7db9d0 a2=0 a3=7ffcdb7db9bc items=0 ppid=2172 pid=4541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:32.564000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:35:32.662823 kernel: audit: type=1327 audit(1747442132.564:1352): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:35:32.662985 kernel: audit: type=1325 audit(1747442132.596:1353): table=nat:122 family=2 entries=20 op=nft_register_rule pid=4541 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:35:32.596000 audit[4541]: NETFILTER_CFG table=nat:122 family=2 entries=20 op=nft_register_rule pid=4541 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:35:32.596000 audit[4541]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffcdb7db9d0 a2=0 a3=7ffcdb7db9bc items=0 ppid=2172 pid=4541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:32.694993 kubelet[2012]: I0517 00:35:32.694041 2012 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-68444b4b45-r6srh" podStartSLOduration=33.303651486 podStartE2EDuration="38.694016253s" podCreationTimestamp="2025-05-17 00:34:54 +0000 UTC" firstStartedPulling="2025-05-17 00:35:25.861563083 +0000 UTC m=+48.542708459" lastFinishedPulling="2025-05-17 00:35:31.251927851 +0000 UTC m=+53.933073226" observedRunningTime="2025-05-17 00:35:31.995511701 +0000 UTC m=+54.676657121" watchObservedRunningTime="2025-05-17 00:35:32.694016253 +0000 UTC m=+55.375161639" May 17 00:35:32.716672 kernel: audit: type=1300 audit(1747442132.596:1353): arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffcdb7db9d0 a2=0 a3=7ffcdb7db9bc items=0 ppid=2172 pid=4541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:32.716848 kernel: audit: type=1327 audit(1747442132.596:1353): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:35:32.596000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:35:32.931801 env[1212]: time="2025-05-17T00:35:32.931665669Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:32.936964 env[1212]: time="2025-05-17T00:35:32.936917158Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:45c8692ffc029387ee93ba83da8ad26da9749cf2ba6ed03981f8f9933ed5a5b0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:32.940944 env[1212]: time="2025-05-17T00:35:32.940900341Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:32.944569 env[1212]: time="2025-05-17T00:35:32.944524966Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:dca5c16181edde2e860463615523ce457cd9dcfca85b7cfdcd6f3ea7de6f2ac8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:32.945829 env[1212]: time="2025-05-17T00:35:32.945773523Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0\" returns image reference \"sha256:45c8692ffc029387ee93ba83da8ad26da9749cf2ba6ed03981f8f9933ed5a5b0\"" May 17 00:35:32.949538 env[1212]: time="2025-05-17T00:35:32.949483856Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\"" May 17 00:35:32.951100 env[1212]: time="2025-05-17T00:35:32.951058102Z" level=info msg="CreateContainer within sandbox \"bb107d470c9792b792c0a8cc56dc38513f86f4cd856146d650c48504effd925f\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 17 00:35:32.978714 env[1212]: time="2025-05-17T00:35:32.978651164Z" level=info msg="CreateContainer within sandbox \"bb107d470c9792b792c0a8cc56dc38513f86f4cd856146d650c48504effd925f\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"800e18bc2092c1322d4152d7ff0fd5652594fff5f2faeade8c94fca81cf8a8d0\"" May 17 00:35:32.979831 env[1212]: time="2025-05-17T00:35:32.979787316Z" level=info msg="StartContainer for \"800e18bc2092c1322d4152d7ff0fd5652594fff5f2faeade8c94fca81cf8a8d0\"" May 17 00:35:33.057638 systemd[1]: Started cri-containerd-800e18bc2092c1322d4152d7ff0fd5652594fff5f2faeade8c94fca81cf8a8d0.scope. May 17 00:35:33.069350 systemd[1]: run-containerd-runc-k8s.io-800e18bc2092c1322d4152d7ff0fd5652594fff5f2faeade8c94fca81cf8a8d0-runc.q6I6s1.mount: Deactivated successfully. May 17 00:35:33.073726 env[1212]: time="2025-05-17T00:35:33.073669924Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:35:33.075610 env[1212]: time="2025-05-17T00:35:33.075550676Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:35:33.076706 kubelet[2012]: E0517 00:35:33.075953 2012 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:35:33.076706 kubelet[2012]: E0517 00:35:33.076017 2012 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:35:33.076706 kubelet[2012]: E0517 00:35:33.076163 2012 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.0,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:dc356148a25040b2be34d2920fa2f436,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-xhw88,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-7ffdff5fc8-9slj8_calico-system(3dcc79a4-50c4-40e3-9eb9-e25e3953688a): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:35:33.078736 env[1212]: time="2025-05-17T00:35:33.078703826Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\"" May 17 00:35:33.131000 audit[4549]: AVC avc: denied { perfmon } for pid=4549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:33.153530 kernel: audit: type=1400 audit(1747442133.131:1354): avc: denied { perfmon } for pid=4549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:33.131000 audit[4549]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7fda3b569578 items=0 ppid=3724 pid=4549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:33.197527 kernel: audit: type=1300 audit(1747442133.131:1354): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7fda3b569578 items=0 ppid=3724 pid=4549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:33.131000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830306531386263323039326331333232643431353264376666306664 May 17 00:35:33.228408 kernel: audit: type=1327 audit(1747442133.131:1354): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830306531386263323039326331333232643431353264376666306664 May 17 00:35:33.230788 env[1212]: time="2025-05-17T00:35:33.230709270Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:35:33.131000 audit[4549]: AVC avc: denied { bpf } for pid=4549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:33.252509 kernel: audit: type=1400 audit(1747442133.131:1355): avc: denied { bpf } for pid=4549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:33.252983 env[1212]: time="2025-05-17T00:35:33.252905850Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:35:33.131000 audit[4549]: AVC avc: denied { bpf } for pid=4549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:33.131000 audit[4549]: AVC avc: denied { bpf } for pid=4549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:33.131000 audit[4549]: AVC avc: denied { perfmon } for pid=4549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:33.131000 audit[4549]: AVC avc: denied { perfmon } for pid=4549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:33.131000 audit[4549]: AVC avc: denied { perfmon } for pid=4549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:33.131000 audit[4549]: AVC avc: denied { perfmon } for pid=4549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:33.131000 audit[4549]: AVC avc: denied { perfmon } for pid=4549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:33.131000 audit[4549]: AVC avc: denied { bpf } for pid=4549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:33.131000 audit[4549]: AVC avc: denied { bpf } for pid=4549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:33.131000 audit: BPF prog-id=213 op=LOAD May 17 00:35:33.131000 audit[4549]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c0003de358 items=0 ppid=3724 pid=4549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:33.131000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830306531386263323039326331333232643431353264376666306664 May 17 00:35:33.155000 audit[4549]: AVC avc: denied { bpf } for pid=4549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:33.155000 audit[4549]: AVC avc: denied { bpf } for pid=4549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:33.155000 audit[4549]: AVC avc: denied { perfmon } for pid=4549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:33.155000 audit[4549]: AVC avc: denied { perfmon } for pid=4549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:33.155000 audit[4549]: AVC avc: denied { perfmon } for pid=4549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:33.155000 audit[4549]: AVC avc: denied { perfmon } for pid=4549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:33.155000 audit[4549]: AVC avc: denied { perfmon } for pid=4549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:33.155000 audit[4549]: AVC avc: denied { bpf } for pid=4549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:33.155000 audit[4549]: AVC avc: denied { bpf } for pid=4549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:33.155000 audit: BPF prog-id=214 op=LOAD May 17 00:35:33.155000 audit[4549]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c0003006d8 items=0 ppid=3724 pid=4549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:33.155000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830306531386263323039326331333232643431353264376666306664 May 17 00:35:33.155000 audit: BPF prog-id=214 op=UNLOAD May 17 00:35:33.155000 audit: BPF prog-id=213 op=UNLOAD May 17 00:35:33.155000 audit[4549]: AVC avc: denied { bpf } for pid=4549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:33.155000 audit[4549]: AVC avc: denied { bpf } for pid=4549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:33.155000 audit[4549]: AVC avc: denied { bpf } for pid=4549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:33.155000 audit[4549]: AVC avc: denied { perfmon } for pid=4549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:33.155000 audit[4549]: AVC avc: denied { perfmon } for pid=4549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:33.155000 audit[4549]: AVC avc: denied { perfmon } for pid=4549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:33.155000 audit[4549]: AVC avc: denied { perfmon } for pid=4549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:33.155000 audit[4549]: AVC avc: denied { perfmon } for pid=4549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:33.155000 audit[4549]: AVC avc: denied { bpf } for pid=4549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:33.155000 audit[4549]: AVC avc: denied { bpf } for pid=4549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:33.155000 audit: BPF prog-id=215 op=LOAD May 17 00:35:33.155000 audit[4549]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c000300768 items=0 ppid=3724 pid=4549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:33.155000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830306531386263323039326331333232643431353264376666306664 May 17 00:35:33.256809 kubelet[2012]: E0517 00:35:33.253210 2012 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:35:33.256809 kubelet[2012]: E0517 00:35:33.253278 2012 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:35:33.256809 kubelet[2012]: E0517 00:35:33.253500 2012 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-xhw88,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-7ffdff5fc8-9slj8_calico-system(3dcc79a4-50c4-40e3-9eb9-e25e3953688a): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:35:33.257131 env[1212]: time="2025-05-17T00:35:33.254427392Z" level=info msg="StartContainer for \"800e18bc2092c1322d4152d7ff0fd5652594fff5f2faeade8c94fca81cf8a8d0\" returns successfully" May 17 00:35:33.257416 kubelet[2012]: E0517 00:35:33.257310 2012 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-7ffdff5fc8-9slj8" podUID="3dcc79a4-50c4-40e3-9eb9-e25e3953688a" May 17 00:35:33.535000 audit[1887]: AVC avc: denied { watch } for pid=1887 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7331 scontext=system_u:system_r:svirt_lxc_net_t:s0:c34,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:35:33.535000 audit[1887]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00249db20 a2=fc6 a3=0 items=0 ppid=1759 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c34,c1023 key=(null) May 17 00:35:33.535000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:35:33.535000 audit[1887]: AVC avc: denied { watch } for pid=1887 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7337 scontext=system_u:system_r:svirt_lxc_net_t:s0:c34,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:35:33.535000 audit[1887]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000c80f60 a2=fc6 a3=0 items=0 ppid=1759 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c34,c1023 key=(null) May 17 00:35:33.535000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:35:33.744963 kubelet[2012]: I0517 00:35:33.744923 2012 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 17 00:35:33.744963 kubelet[2012]: I0517 00:35:33.744973 2012 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 17 00:35:33.962918 kubelet[2012]: I0517 00:35:33.962877 2012 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:35:33.963843 kubelet[2012]: I0517 00:35:33.963683 2012 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:35:34.252000 audit[1848]: AVC avc: denied { watch } for pid=1848 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7337 scontext=system_u:system_r:svirt_lxc_net_t:s0:c513,c545 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:35:34.252000 audit[1848]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c011114b70 a2=fc6 a3=0 items=0 ppid=1715 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c513,c545 key=(null) May 17 00:35:34.252000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3234002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:35:34.252000 audit[1848]: AVC avc: denied { watch } for pid=1848 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7331 scontext=system_u:system_r:svirt_lxc_net_t:s0:c513,c545 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:35:34.252000 audit[1848]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c00a1e9b20 a2=fc6 a3=0 items=0 ppid=1715 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c513,c545 key=(null) May 17 00:35:34.252000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3234002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:35:34.254000 audit[1848]: AVC avc: denied { watch } for pid=1848 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7333 scontext=system_u:system_r:svirt_lxc_net_t:s0:c513,c545 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:35:34.254000 audit[1848]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c000b5e1e0 a2=fc6 a3=0 items=0 ppid=1715 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c513,c545 key=(null) May 17 00:35:34.254000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3234002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:35:34.262000 audit[1848]: AVC avc: denied { watch } for pid=1848 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7339 scontext=system_u:system_r:svirt_lxc_net_t:s0:c513,c545 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:35:34.262000 audit[1848]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c011114d50 a2=fc6 a3=0 items=0 ppid=1715 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c513,c545 key=(null) May 17 00:35:34.262000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3234002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:35:34.273000 audit[1848]: AVC avc: denied { watch } for pid=1848 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7331 scontext=system_u:system_r:svirt_lxc_net_t:s0:c513,c545 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:35:34.273000 audit[1848]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c0131cab80 a2=fc6 a3=0 items=0 ppid=1715 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c513,c545 key=(null) May 17 00:35:34.273000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3234002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:35:34.273000 audit[1848]: AVC avc: denied { watch } for pid=1848 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7337 scontext=system_u:system_r:svirt_lxc_net_t:s0:c513,c545 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:35:34.273000 audit[1848]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c007b93d10 a2=fc6 a3=0 items=0 ppid=1715 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c513,c545 key=(null) May 17 00:35:34.273000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3234002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:35:36.852000 audit[4476]: AVC avc: denied { watch } for pid=4476 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_35_07.4177024089/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c685,c994 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c685,c994 tclass=file permissive=0 May 17 00:35:36.852000 audit[4476]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000bc20c0 a2=fc6 a3=0 items=0 ppid=4011 pid=4476 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c685,c994 key=(null) May 17 00:35:36.852000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:35:36.904346 kubelet[2012]: I0517 00:35:36.904257 2012 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-kpjdk" podStartSLOduration=27.138199091 podStartE2EDuration="38.904229514s" podCreationTimestamp="2025-05-17 00:34:58 +0000 UTC" firstStartedPulling="2025-05-17 00:35:21.182160353 +0000 UTC m=+43.863305723" lastFinishedPulling="2025-05-17 00:35:32.948190775 +0000 UTC m=+55.629336146" observedRunningTime="2025-05-17 00:35:33.996314042 +0000 UTC m=+56.677459427" watchObservedRunningTime="2025-05-17 00:35:36.904229514 +0000 UTC m=+59.585374899" May 17 00:35:37.153000 audit[4589]: NETFILTER_CFG table=filter:123 family=2 entries=13 op=nft_register_rule pid=4589 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:35:37.153000 audit[4589]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffe635d77b0 a2=0 a3=7ffe635d779c items=0 ppid=2172 pid=4589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:37.153000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:35:37.163000 audit[4589]: NETFILTER_CFG table=nat:124 family=2 entries=27 op=nft_register_chain pid=4589 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:35:37.163000 audit[4589]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffe635d77b0 a2=0 a3=7ffe635d779c items=0 ppid=2172 pid=4589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:37.163000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:35:37.519701 env[1212]: time="2025-05-17T00:35:37.519554450Z" level=info msg="StopPodSandbox for \"00abf7b6297ce5a7553f42c1fa6a13245c90242046f7dcfe927acc6b856f3689\"" May 17 00:35:37.683633 env[1212]: 2025-05-17 00:35:37.612 [WARNING][4598] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="00abf7b6297ce5a7553f42c1fa6a13245c90242046f7dcfe927acc6b856f3689" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-calico--apiserver--68444b4b45--r6srh-eth0", GenerateName:"calico-apiserver-68444b4b45-", Namespace:"calico-apiserver", SelfLink:"", UID:"908a611b-ce73-4141-bc04-98329eaa22ef", ResourceVersion:"1056", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 34, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"68444b4b45", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758", ContainerID:"1ab400e1ff567ce85c474b086d3f5e904e3cb0fac8a408d2192fcf3a6865e7f0", Pod:"calico-apiserver-68444b4b45-r6srh", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.43.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali1a9305605d5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:35:37.683633 env[1212]: 2025-05-17 00:35:37.614 [INFO][4598] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="00abf7b6297ce5a7553f42c1fa6a13245c90242046f7dcfe927acc6b856f3689" May 17 00:35:37.683633 env[1212]: 2025-05-17 00:35:37.614 [INFO][4598] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="00abf7b6297ce5a7553f42c1fa6a13245c90242046f7dcfe927acc6b856f3689" iface="eth0" netns="" May 17 00:35:37.683633 env[1212]: 2025-05-17 00:35:37.614 [INFO][4598] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="00abf7b6297ce5a7553f42c1fa6a13245c90242046f7dcfe927acc6b856f3689" May 17 00:35:37.683633 env[1212]: 2025-05-17 00:35:37.615 [INFO][4598] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="00abf7b6297ce5a7553f42c1fa6a13245c90242046f7dcfe927acc6b856f3689" May 17 00:35:37.683633 env[1212]: 2025-05-17 00:35:37.668 [INFO][4605] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="00abf7b6297ce5a7553f42c1fa6a13245c90242046f7dcfe927acc6b856f3689" HandleID="k8s-pod-network.00abf7b6297ce5a7553f42c1fa6a13245c90242046f7dcfe927acc6b856f3689" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-calico--apiserver--68444b4b45--r6srh-eth0" May 17 00:35:37.683633 env[1212]: 2025-05-17 00:35:37.669 [INFO][4605] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:35:37.683633 env[1212]: 2025-05-17 00:35:37.669 [INFO][4605] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:35:37.683633 env[1212]: 2025-05-17 00:35:37.676 [WARNING][4605] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="00abf7b6297ce5a7553f42c1fa6a13245c90242046f7dcfe927acc6b856f3689" HandleID="k8s-pod-network.00abf7b6297ce5a7553f42c1fa6a13245c90242046f7dcfe927acc6b856f3689" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-calico--apiserver--68444b4b45--r6srh-eth0" May 17 00:35:37.683633 env[1212]: 2025-05-17 00:35:37.676 [INFO][4605] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="00abf7b6297ce5a7553f42c1fa6a13245c90242046f7dcfe927acc6b856f3689" HandleID="k8s-pod-network.00abf7b6297ce5a7553f42c1fa6a13245c90242046f7dcfe927acc6b856f3689" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-calico--apiserver--68444b4b45--r6srh-eth0" May 17 00:35:37.683633 env[1212]: 2025-05-17 00:35:37.678 [INFO][4605] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:35:37.683633 env[1212]: 2025-05-17 00:35:37.680 [INFO][4598] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="00abf7b6297ce5a7553f42c1fa6a13245c90242046f7dcfe927acc6b856f3689" May 17 00:35:37.684533 env[1212]: time="2025-05-17T00:35:37.683675947Z" level=info msg="TearDown network for sandbox \"00abf7b6297ce5a7553f42c1fa6a13245c90242046f7dcfe927acc6b856f3689\" successfully" May 17 00:35:37.684533 env[1212]: time="2025-05-17T00:35:37.683722323Z" level=info msg="StopPodSandbox for \"00abf7b6297ce5a7553f42c1fa6a13245c90242046f7dcfe927acc6b856f3689\" returns successfully" May 17 00:35:37.685270 env[1212]: time="2025-05-17T00:35:37.685217278Z" level=info msg="RemovePodSandbox for \"00abf7b6297ce5a7553f42c1fa6a13245c90242046f7dcfe927acc6b856f3689\"" May 17 00:35:37.685430 env[1212]: time="2025-05-17T00:35:37.685273113Z" level=info msg="Forcibly stopping sandbox \"00abf7b6297ce5a7553f42c1fa6a13245c90242046f7dcfe927acc6b856f3689\"" May 17 00:35:37.875951 env[1212]: 2025-05-17 00:35:37.790 [WARNING][4621] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="00abf7b6297ce5a7553f42c1fa6a13245c90242046f7dcfe927acc6b856f3689" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-calico--apiserver--68444b4b45--r6srh-eth0", GenerateName:"calico-apiserver-68444b4b45-", Namespace:"calico-apiserver", SelfLink:"", UID:"908a611b-ce73-4141-bc04-98329eaa22ef", ResourceVersion:"1056", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 34, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"68444b4b45", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758", ContainerID:"1ab400e1ff567ce85c474b086d3f5e904e3cb0fac8a408d2192fcf3a6865e7f0", Pod:"calico-apiserver-68444b4b45-r6srh", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.43.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali1a9305605d5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:35:37.875951 env[1212]: 2025-05-17 00:35:37.791 [INFO][4621] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="00abf7b6297ce5a7553f42c1fa6a13245c90242046f7dcfe927acc6b856f3689" May 17 00:35:37.875951 env[1212]: 2025-05-17 00:35:37.791 [INFO][4621] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="00abf7b6297ce5a7553f42c1fa6a13245c90242046f7dcfe927acc6b856f3689" iface="eth0" netns="" May 17 00:35:37.875951 env[1212]: 2025-05-17 00:35:37.791 [INFO][4621] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="00abf7b6297ce5a7553f42c1fa6a13245c90242046f7dcfe927acc6b856f3689" May 17 00:35:37.875951 env[1212]: 2025-05-17 00:35:37.791 [INFO][4621] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="00abf7b6297ce5a7553f42c1fa6a13245c90242046f7dcfe927acc6b856f3689" May 17 00:35:37.875951 env[1212]: 2025-05-17 00:35:37.843 [INFO][4628] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="00abf7b6297ce5a7553f42c1fa6a13245c90242046f7dcfe927acc6b856f3689" HandleID="k8s-pod-network.00abf7b6297ce5a7553f42c1fa6a13245c90242046f7dcfe927acc6b856f3689" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-calico--apiserver--68444b4b45--r6srh-eth0" May 17 00:35:37.875951 env[1212]: 2025-05-17 00:35:37.844 [INFO][4628] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:35:37.875951 env[1212]: 2025-05-17 00:35:37.844 [INFO][4628] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:35:37.875951 env[1212]: 2025-05-17 00:35:37.861 [WARNING][4628] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="00abf7b6297ce5a7553f42c1fa6a13245c90242046f7dcfe927acc6b856f3689" HandleID="k8s-pod-network.00abf7b6297ce5a7553f42c1fa6a13245c90242046f7dcfe927acc6b856f3689" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-calico--apiserver--68444b4b45--r6srh-eth0" May 17 00:35:37.875951 env[1212]: 2025-05-17 00:35:37.861 [INFO][4628] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="00abf7b6297ce5a7553f42c1fa6a13245c90242046f7dcfe927acc6b856f3689" HandleID="k8s-pod-network.00abf7b6297ce5a7553f42c1fa6a13245c90242046f7dcfe927acc6b856f3689" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-calico--apiserver--68444b4b45--r6srh-eth0" May 17 00:35:37.875951 env[1212]: 2025-05-17 00:35:37.872 [INFO][4628] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:35:37.875951 env[1212]: 2025-05-17 00:35:37.874 [INFO][4621] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="00abf7b6297ce5a7553f42c1fa6a13245c90242046f7dcfe927acc6b856f3689" May 17 00:35:37.877271 env[1212]: time="2025-05-17T00:35:37.877214129Z" level=info msg="TearDown network for sandbox \"00abf7b6297ce5a7553f42c1fa6a13245c90242046f7dcfe927acc6b856f3689\" successfully" May 17 00:35:37.882760 env[1212]: time="2025-05-17T00:35:37.882687956Z" level=info msg="RemovePodSandbox \"00abf7b6297ce5a7553f42c1fa6a13245c90242046f7dcfe927acc6b856f3689\" returns successfully" May 17 00:35:37.883822 env[1212]: time="2025-05-17T00:35:37.883765226Z" level=info msg="StopPodSandbox for \"32cc285900e6dcd205b9f41d7d3f2e75a044bfcd11a475e4197aa67f0a1085c6\"" May 17 00:35:38.173837 env[1212]: 2025-05-17 00:35:38.072 [WARNING][4642] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="32cc285900e6dcd205b9f41d7d3f2e75a044bfcd11a475e4197aa67f0a1085c6" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-coredns--668d6bf9bc--6kzm4-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"0b840cb1-eedd-48bf-b8ec-581041390cbc", ResourceVersion:"951", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 34, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758", ContainerID:"27f61e72aba93d488c80329f93b65777188a45f2c1551e2e7b3ac32a83622f37", Pod:"coredns-668d6bf9bc-6kzm4", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.43.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib9951cfd5c4", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:35:38.173837 env[1212]: 2025-05-17 00:35:38.073 [INFO][4642] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="32cc285900e6dcd205b9f41d7d3f2e75a044bfcd11a475e4197aa67f0a1085c6" May 17 00:35:38.173837 env[1212]: 2025-05-17 00:35:38.073 [INFO][4642] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="32cc285900e6dcd205b9f41d7d3f2e75a044bfcd11a475e4197aa67f0a1085c6" iface="eth0" netns="" May 17 00:35:38.173837 env[1212]: 2025-05-17 00:35:38.073 [INFO][4642] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="32cc285900e6dcd205b9f41d7d3f2e75a044bfcd11a475e4197aa67f0a1085c6" May 17 00:35:38.173837 env[1212]: 2025-05-17 00:35:38.073 [INFO][4642] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="32cc285900e6dcd205b9f41d7d3f2e75a044bfcd11a475e4197aa67f0a1085c6" May 17 00:35:38.173837 env[1212]: 2025-05-17 00:35:38.144 [INFO][4650] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="32cc285900e6dcd205b9f41d7d3f2e75a044bfcd11a475e4197aa67f0a1085c6" HandleID="k8s-pod-network.32cc285900e6dcd205b9f41d7d3f2e75a044bfcd11a475e4197aa67f0a1085c6" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-coredns--668d6bf9bc--6kzm4-eth0" May 17 00:35:38.173837 env[1212]: 2025-05-17 00:35:38.146 [INFO][4650] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:35:38.173837 env[1212]: 2025-05-17 00:35:38.146 [INFO][4650] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:35:38.173837 env[1212]: 2025-05-17 00:35:38.167 [WARNING][4650] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="32cc285900e6dcd205b9f41d7d3f2e75a044bfcd11a475e4197aa67f0a1085c6" HandleID="k8s-pod-network.32cc285900e6dcd205b9f41d7d3f2e75a044bfcd11a475e4197aa67f0a1085c6" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-coredns--668d6bf9bc--6kzm4-eth0" May 17 00:35:38.173837 env[1212]: 2025-05-17 00:35:38.167 [INFO][4650] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="32cc285900e6dcd205b9f41d7d3f2e75a044bfcd11a475e4197aa67f0a1085c6" HandleID="k8s-pod-network.32cc285900e6dcd205b9f41d7d3f2e75a044bfcd11a475e4197aa67f0a1085c6" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-coredns--668d6bf9bc--6kzm4-eth0" May 17 00:35:38.173837 env[1212]: 2025-05-17 00:35:38.170 [INFO][4650] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:35:38.173837 env[1212]: 2025-05-17 00:35:38.172 [INFO][4642] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="32cc285900e6dcd205b9f41d7d3f2e75a044bfcd11a475e4197aa67f0a1085c6" May 17 00:35:38.174955 env[1212]: time="2025-05-17T00:35:38.174896378Z" level=info msg="TearDown network for sandbox \"32cc285900e6dcd205b9f41d7d3f2e75a044bfcd11a475e4197aa67f0a1085c6\" successfully" May 17 00:35:38.175121 env[1212]: time="2025-05-17T00:35:38.175091692Z" level=info msg="StopPodSandbox for \"32cc285900e6dcd205b9f41d7d3f2e75a044bfcd11a475e4197aa67f0a1085c6\" returns successfully" May 17 00:35:38.177971 env[1212]: time="2025-05-17T00:35:38.177929527Z" level=info msg="RemovePodSandbox for \"32cc285900e6dcd205b9f41d7d3f2e75a044bfcd11a475e4197aa67f0a1085c6\"" May 17 00:35:38.178462 env[1212]: time="2025-05-17T00:35:38.178400627Z" level=info msg="Forcibly stopping sandbox \"32cc285900e6dcd205b9f41d7d3f2e75a044bfcd11a475e4197aa67f0a1085c6\"" May 17 00:35:38.378547 env[1212]: 2025-05-17 00:35:38.268 [WARNING][4666] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="32cc285900e6dcd205b9f41d7d3f2e75a044bfcd11a475e4197aa67f0a1085c6" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-coredns--668d6bf9bc--6kzm4-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"0b840cb1-eedd-48bf-b8ec-581041390cbc", ResourceVersion:"951", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 34, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758", ContainerID:"27f61e72aba93d488c80329f93b65777188a45f2c1551e2e7b3ac32a83622f37", Pod:"coredns-668d6bf9bc-6kzm4", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.43.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib9951cfd5c4", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:35:38.378547 env[1212]: 2025-05-17 00:35:38.290 [INFO][4666] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="32cc285900e6dcd205b9f41d7d3f2e75a044bfcd11a475e4197aa67f0a1085c6" May 17 00:35:38.378547 env[1212]: 2025-05-17 00:35:38.290 [INFO][4666] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="32cc285900e6dcd205b9f41d7d3f2e75a044bfcd11a475e4197aa67f0a1085c6" iface="eth0" netns="" May 17 00:35:38.378547 env[1212]: 2025-05-17 00:35:38.291 [INFO][4666] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="32cc285900e6dcd205b9f41d7d3f2e75a044bfcd11a475e4197aa67f0a1085c6" May 17 00:35:38.378547 env[1212]: 2025-05-17 00:35:38.291 [INFO][4666] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="32cc285900e6dcd205b9f41d7d3f2e75a044bfcd11a475e4197aa67f0a1085c6" May 17 00:35:38.378547 env[1212]: 2025-05-17 00:35:38.361 [INFO][4673] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="32cc285900e6dcd205b9f41d7d3f2e75a044bfcd11a475e4197aa67f0a1085c6" HandleID="k8s-pod-network.32cc285900e6dcd205b9f41d7d3f2e75a044bfcd11a475e4197aa67f0a1085c6" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-coredns--668d6bf9bc--6kzm4-eth0" May 17 00:35:38.378547 env[1212]: 2025-05-17 00:35:38.361 [INFO][4673] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:35:38.378547 env[1212]: 2025-05-17 00:35:38.361 [INFO][4673] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:35:38.378547 env[1212]: 2025-05-17 00:35:38.372 [WARNING][4673] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="32cc285900e6dcd205b9f41d7d3f2e75a044bfcd11a475e4197aa67f0a1085c6" HandleID="k8s-pod-network.32cc285900e6dcd205b9f41d7d3f2e75a044bfcd11a475e4197aa67f0a1085c6" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-coredns--668d6bf9bc--6kzm4-eth0" May 17 00:35:38.378547 env[1212]: 2025-05-17 00:35:38.372 [INFO][4673] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="32cc285900e6dcd205b9f41d7d3f2e75a044bfcd11a475e4197aa67f0a1085c6" HandleID="k8s-pod-network.32cc285900e6dcd205b9f41d7d3f2e75a044bfcd11a475e4197aa67f0a1085c6" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-coredns--668d6bf9bc--6kzm4-eth0" May 17 00:35:38.378547 env[1212]: 2025-05-17 00:35:38.374 [INFO][4673] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:35:38.378547 env[1212]: 2025-05-17 00:35:38.376 [INFO][4666] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="32cc285900e6dcd205b9f41d7d3f2e75a044bfcd11a475e4197aa67f0a1085c6" May 17 00:35:38.379661 env[1212]: time="2025-05-17T00:35:38.379607780Z" level=info msg="TearDown network for sandbox \"32cc285900e6dcd205b9f41d7d3f2e75a044bfcd11a475e4197aa67f0a1085c6\" successfully" May 17 00:35:38.735675 env[1212]: time="2025-05-17T00:35:38.735593423Z" level=info msg="RemovePodSandbox \"32cc285900e6dcd205b9f41d7d3f2e75a044bfcd11a475e4197aa67f0a1085c6\" returns successfully" May 17 00:35:38.736830 env[1212]: time="2025-05-17T00:35:38.736784411Z" level=info msg="StopPodSandbox for \"f14ba2115524ea20392546b4b007b25bca35212c09d8bc580b78280805199eaf\"" May 17 00:35:38.911037 env[1212]: 2025-05-17 00:35:38.811 [WARNING][4689] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f14ba2115524ea20392546b4b007b25bca35212c09d8bc580b78280805199eaf" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-calico--apiserver--68444b4b45--l4vgc-eth0", GenerateName:"calico-apiserver-68444b4b45-", Namespace:"calico-apiserver", SelfLink:"", UID:"965767b7-1792-4c91-b4d9-b8c2d202747e", ResourceVersion:"1090", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 34, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"68444b4b45", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758", ContainerID:"46c07d14feb7f301bbfd58b31ab295aac5560242c7e48609970c8d7cbe12ba10", Pod:"calico-apiserver-68444b4b45-l4vgc", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.43.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calid1a7f4f4789", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:35:38.911037 env[1212]: 2025-05-17 00:35:38.812 [INFO][4689] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="f14ba2115524ea20392546b4b007b25bca35212c09d8bc580b78280805199eaf" May 17 00:35:38.911037 env[1212]: 2025-05-17 00:35:38.812 [INFO][4689] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f14ba2115524ea20392546b4b007b25bca35212c09d8bc580b78280805199eaf" iface="eth0" netns="" May 17 00:35:38.911037 env[1212]: 2025-05-17 00:35:38.812 [INFO][4689] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="f14ba2115524ea20392546b4b007b25bca35212c09d8bc580b78280805199eaf" May 17 00:35:38.911037 env[1212]: 2025-05-17 00:35:38.812 [INFO][4689] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f14ba2115524ea20392546b4b007b25bca35212c09d8bc580b78280805199eaf" May 17 00:35:38.911037 env[1212]: 2025-05-17 00:35:38.890 [INFO][4696] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f14ba2115524ea20392546b4b007b25bca35212c09d8bc580b78280805199eaf" HandleID="k8s-pod-network.f14ba2115524ea20392546b4b007b25bca35212c09d8bc580b78280805199eaf" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-calico--apiserver--68444b4b45--l4vgc-eth0" May 17 00:35:38.911037 env[1212]: 2025-05-17 00:35:38.891 [INFO][4696] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:35:38.911037 env[1212]: 2025-05-17 00:35:38.891 [INFO][4696] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:35:38.911037 env[1212]: 2025-05-17 00:35:38.901 [WARNING][4696] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f14ba2115524ea20392546b4b007b25bca35212c09d8bc580b78280805199eaf" HandleID="k8s-pod-network.f14ba2115524ea20392546b4b007b25bca35212c09d8bc580b78280805199eaf" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-calico--apiserver--68444b4b45--l4vgc-eth0" May 17 00:35:38.911037 env[1212]: 2025-05-17 00:35:38.901 [INFO][4696] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f14ba2115524ea20392546b4b007b25bca35212c09d8bc580b78280805199eaf" HandleID="k8s-pod-network.f14ba2115524ea20392546b4b007b25bca35212c09d8bc580b78280805199eaf" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-calico--apiserver--68444b4b45--l4vgc-eth0" May 17 00:35:38.911037 env[1212]: 2025-05-17 00:35:38.905 [INFO][4696] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:35:38.911037 env[1212]: 2025-05-17 00:35:38.906 [INFO][4689] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="f14ba2115524ea20392546b4b007b25bca35212c09d8bc580b78280805199eaf" May 17 00:35:38.912141 env[1212]: time="2025-05-17T00:35:38.912072649Z" level=info msg="TearDown network for sandbox \"f14ba2115524ea20392546b4b007b25bca35212c09d8bc580b78280805199eaf\" successfully" May 17 00:35:38.912328 env[1212]: time="2025-05-17T00:35:38.912294725Z" level=info msg="StopPodSandbox for \"f14ba2115524ea20392546b4b007b25bca35212c09d8bc580b78280805199eaf\" returns successfully" May 17 00:35:38.913167 env[1212]: time="2025-05-17T00:35:38.913122072Z" level=info msg="RemovePodSandbox for \"f14ba2115524ea20392546b4b007b25bca35212c09d8bc580b78280805199eaf\"" May 17 00:35:38.913597 env[1212]: time="2025-05-17T00:35:38.913536462Z" level=info msg="Forcibly stopping sandbox \"f14ba2115524ea20392546b4b007b25bca35212c09d8bc580b78280805199eaf\"" May 17 00:35:39.135489 env[1212]: 2025-05-17 00:35:39.036 [WARNING][4712] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f14ba2115524ea20392546b4b007b25bca35212c09d8bc580b78280805199eaf" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-calico--apiserver--68444b4b45--l4vgc-eth0", GenerateName:"calico-apiserver-68444b4b45-", Namespace:"calico-apiserver", SelfLink:"", UID:"965767b7-1792-4c91-b4d9-b8c2d202747e", ResourceVersion:"1090", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 34, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"68444b4b45", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758", ContainerID:"46c07d14feb7f301bbfd58b31ab295aac5560242c7e48609970c8d7cbe12ba10", Pod:"calico-apiserver-68444b4b45-l4vgc", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.43.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calid1a7f4f4789", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:35:39.135489 env[1212]: 2025-05-17 00:35:39.039 [INFO][4712] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="f14ba2115524ea20392546b4b007b25bca35212c09d8bc580b78280805199eaf" May 17 00:35:39.135489 env[1212]: 2025-05-17 00:35:39.039 [INFO][4712] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f14ba2115524ea20392546b4b007b25bca35212c09d8bc580b78280805199eaf" iface="eth0" netns="" May 17 00:35:39.135489 env[1212]: 2025-05-17 00:35:39.039 [INFO][4712] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="f14ba2115524ea20392546b4b007b25bca35212c09d8bc580b78280805199eaf" May 17 00:35:39.135489 env[1212]: 2025-05-17 00:35:39.039 [INFO][4712] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f14ba2115524ea20392546b4b007b25bca35212c09d8bc580b78280805199eaf" May 17 00:35:39.135489 env[1212]: 2025-05-17 00:35:39.090 [INFO][4719] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f14ba2115524ea20392546b4b007b25bca35212c09d8bc580b78280805199eaf" HandleID="k8s-pod-network.f14ba2115524ea20392546b4b007b25bca35212c09d8bc580b78280805199eaf" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-calico--apiserver--68444b4b45--l4vgc-eth0" May 17 00:35:39.135489 env[1212]: 2025-05-17 00:35:39.091 [INFO][4719] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:35:39.135489 env[1212]: 2025-05-17 00:35:39.091 [INFO][4719] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:35:39.135489 env[1212]: 2025-05-17 00:35:39.121 [WARNING][4719] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f14ba2115524ea20392546b4b007b25bca35212c09d8bc580b78280805199eaf" HandleID="k8s-pod-network.f14ba2115524ea20392546b4b007b25bca35212c09d8bc580b78280805199eaf" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-calico--apiserver--68444b4b45--l4vgc-eth0" May 17 00:35:39.135489 env[1212]: 2025-05-17 00:35:39.121 [INFO][4719] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f14ba2115524ea20392546b4b007b25bca35212c09d8bc580b78280805199eaf" HandleID="k8s-pod-network.f14ba2115524ea20392546b4b007b25bca35212c09d8bc580b78280805199eaf" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-calico--apiserver--68444b4b45--l4vgc-eth0" May 17 00:35:39.135489 env[1212]: 2025-05-17 00:35:39.131 [INFO][4719] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:35:39.135489 env[1212]: 2025-05-17 00:35:39.133 [INFO][4712] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="f14ba2115524ea20392546b4b007b25bca35212c09d8bc580b78280805199eaf" May 17 00:35:39.136521 env[1212]: time="2025-05-17T00:35:39.136455401Z" level=info msg="TearDown network for sandbox \"f14ba2115524ea20392546b4b007b25bca35212c09d8bc580b78280805199eaf\" successfully" May 17 00:35:39.530154 env[1212]: time="2025-05-17T00:35:39.530003893Z" level=info msg="RemovePodSandbox \"f14ba2115524ea20392546b4b007b25bca35212c09d8bc580b78280805199eaf\" returns successfully" May 17 00:35:39.534610 env[1212]: time="2025-05-17T00:35:39.534555857Z" level=info msg="StopPodSandbox for \"c1a481d13254c4e8710ceefc02b6916ba1ddd857c222b6cd383453c4f3ebd596\"" May 17 00:35:39.700190 env[1212]: 2025-05-17 00:35:39.627 [WARNING][4733] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="c1a481d13254c4e8710ceefc02b6916ba1ddd857c222b6cd383453c4f3ebd596" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-whisker--84fff46d56--dqntj-eth0" May 17 00:35:39.700190 env[1212]: 2025-05-17 00:35:39.627 [INFO][4733] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="c1a481d13254c4e8710ceefc02b6916ba1ddd857c222b6cd383453c4f3ebd596" May 17 00:35:39.700190 env[1212]: 2025-05-17 00:35:39.627 [INFO][4733] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="c1a481d13254c4e8710ceefc02b6916ba1ddd857c222b6cd383453c4f3ebd596" iface="eth0" netns="" May 17 00:35:39.700190 env[1212]: 2025-05-17 00:35:39.627 [INFO][4733] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="c1a481d13254c4e8710ceefc02b6916ba1ddd857c222b6cd383453c4f3ebd596" May 17 00:35:39.700190 env[1212]: 2025-05-17 00:35:39.627 [INFO][4733] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c1a481d13254c4e8710ceefc02b6916ba1ddd857c222b6cd383453c4f3ebd596" May 17 00:35:39.700190 env[1212]: 2025-05-17 00:35:39.683 [INFO][4740] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c1a481d13254c4e8710ceefc02b6916ba1ddd857c222b6cd383453c4f3ebd596" HandleID="k8s-pod-network.c1a481d13254c4e8710ceefc02b6916ba1ddd857c222b6cd383453c4f3ebd596" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-whisker--84fff46d56--dqntj-eth0" May 17 00:35:39.700190 env[1212]: 2025-05-17 00:35:39.683 [INFO][4740] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:35:39.700190 env[1212]: 2025-05-17 00:35:39.683 [INFO][4740] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:35:39.700190 env[1212]: 2025-05-17 00:35:39.694 [WARNING][4740] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c1a481d13254c4e8710ceefc02b6916ba1ddd857c222b6cd383453c4f3ebd596" HandleID="k8s-pod-network.c1a481d13254c4e8710ceefc02b6916ba1ddd857c222b6cd383453c4f3ebd596" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-whisker--84fff46d56--dqntj-eth0" May 17 00:35:39.700190 env[1212]: 2025-05-17 00:35:39.694 [INFO][4740] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c1a481d13254c4e8710ceefc02b6916ba1ddd857c222b6cd383453c4f3ebd596" HandleID="k8s-pod-network.c1a481d13254c4e8710ceefc02b6916ba1ddd857c222b6cd383453c4f3ebd596" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-whisker--84fff46d56--dqntj-eth0" May 17 00:35:39.700190 env[1212]: 2025-05-17 00:35:39.697 [INFO][4740] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:35:39.700190 env[1212]: 2025-05-17 00:35:39.698 [INFO][4733] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="c1a481d13254c4e8710ceefc02b6916ba1ddd857c222b6cd383453c4f3ebd596" May 17 00:35:39.701193 env[1212]: time="2025-05-17T00:35:39.701137689Z" level=info msg="TearDown network for sandbox \"c1a481d13254c4e8710ceefc02b6916ba1ddd857c222b6cd383453c4f3ebd596\" successfully" May 17 00:35:39.701392 env[1212]: time="2025-05-17T00:35:39.701327608Z" level=info msg="StopPodSandbox for \"c1a481d13254c4e8710ceefc02b6916ba1ddd857c222b6cd383453c4f3ebd596\" returns successfully" May 17 00:35:39.702294 env[1212]: time="2025-05-17T00:35:39.702253941Z" level=info msg="RemovePodSandbox for \"c1a481d13254c4e8710ceefc02b6916ba1ddd857c222b6cd383453c4f3ebd596\"" May 17 00:35:39.702759 env[1212]: time="2025-05-17T00:35:39.702683672Z" level=info msg="Forcibly stopping sandbox \"c1a481d13254c4e8710ceefc02b6916ba1ddd857c222b6cd383453c4f3ebd596\"" May 17 00:35:39.853286 env[1212]: 2025-05-17 00:35:39.780 [WARNING][4755] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="c1a481d13254c4e8710ceefc02b6916ba1ddd857c222b6cd383453c4f3ebd596" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-whisker--84fff46d56--dqntj-eth0" May 17 00:35:39.853286 env[1212]: 2025-05-17 00:35:39.780 [INFO][4755] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="c1a481d13254c4e8710ceefc02b6916ba1ddd857c222b6cd383453c4f3ebd596" May 17 00:35:39.853286 env[1212]: 2025-05-17 00:35:39.780 [INFO][4755] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="c1a481d13254c4e8710ceefc02b6916ba1ddd857c222b6cd383453c4f3ebd596" iface="eth0" netns="" May 17 00:35:39.853286 env[1212]: 2025-05-17 00:35:39.780 [INFO][4755] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="c1a481d13254c4e8710ceefc02b6916ba1ddd857c222b6cd383453c4f3ebd596" May 17 00:35:39.853286 env[1212]: 2025-05-17 00:35:39.780 [INFO][4755] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c1a481d13254c4e8710ceefc02b6916ba1ddd857c222b6cd383453c4f3ebd596" May 17 00:35:39.853286 env[1212]: 2025-05-17 00:35:39.832 [INFO][4762] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c1a481d13254c4e8710ceefc02b6916ba1ddd857c222b6cd383453c4f3ebd596" HandleID="k8s-pod-network.c1a481d13254c4e8710ceefc02b6916ba1ddd857c222b6cd383453c4f3ebd596" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-whisker--84fff46d56--dqntj-eth0" May 17 00:35:39.853286 env[1212]: 2025-05-17 00:35:39.833 [INFO][4762] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:35:39.853286 env[1212]: 2025-05-17 00:35:39.833 [INFO][4762] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:35:39.853286 env[1212]: 2025-05-17 00:35:39.845 [WARNING][4762] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c1a481d13254c4e8710ceefc02b6916ba1ddd857c222b6cd383453c4f3ebd596" HandleID="k8s-pod-network.c1a481d13254c4e8710ceefc02b6916ba1ddd857c222b6cd383453c4f3ebd596" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-whisker--84fff46d56--dqntj-eth0" May 17 00:35:39.853286 env[1212]: 2025-05-17 00:35:39.846 [INFO][4762] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c1a481d13254c4e8710ceefc02b6916ba1ddd857c222b6cd383453c4f3ebd596" HandleID="k8s-pod-network.c1a481d13254c4e8710ceefc02b6916ba1ddd857c222b6cd383453c4f3ebd596" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-whisker--84fff46d56--dqntj-eth0" May 17 00:35:39.853286 env[1212]: 2025-05-17 00:35:39.849 [INFO][4762] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:35:39.853286 env[1212]: 2025-05-17 00:35:39.851 [INFO][4755] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="c1a481d13254c4e8710ceefc02b6916ba1ddd857c222b6cd383453c4f3ebd596" May 17 00:35:39.854713 env[1212]: time="2025-05-17T00:35:39.854613944Z" level=info msg="TearDown network for sandbox \"c1a481d13254c4e8710ceefc02b6916ba1ddd857c222b6cd383453c4f3ebd596\" successfully" May 17 00:35:39.860297 env[1212]: time="2025-05-17T00:35:39.860240668Z" level=info msg="RemovePodSandbox \"c1a481d13254c4e8710ceefc02b6916ba1ddd857c222b6cd383453c4f3ebd596\" returns successfully" May 17 00:35:39.861046 env[1212]: time="2025-05-17T00:35:39.861017089Z" level=info msg="StopPodSandbox for \"0bcf44e68d1237e0478c4818c985fe24d782e0d7dc964b90b8545553594addc8\"" May 17 00:35:39.999696 env[1212]: 2025-05-17 00:35:39.927 [WARNING][4777] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="0bcf44e68d1237e0478c4818c985fe24d782e0d7dc964b90b8545553594addc8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-calico--kube--controllers--5dfd77fb7d--55blf-eth0", GenerateName:"calico-kube-controllers-5dfd77fb7d-", Namespace:"calico-system", SelfLink:"", UID:"fd78bca1-b6af-4311-93c6-d48694e45dc4", ResourceVersion:"1021", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 34, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5dfd77fb7d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758", ContainerID:"d1ad55d169eedb1da98455b18bcb3a06d6962e829f4e29730ca9c0dd90f9f477", Pod:"calico-kube-controllers-5dfd77fb7d-55blf", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.43.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"caliec1af03241e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:35:39.999696 env[1212]: 2025-05-17 00:35:39.928 [INFO][4777] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="0bcf44e68d1237e0478c4818c985fe24d782e0d7dc964b90b8545553594addc8" May 17 00:35:39.999696 env[1212]: 2025-05-17 00:35:39.928 [INFO][4777] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="0bcf44e68d1237e0478c4818c985fe24d782e0d7dc964b90b8545553594addc8" iface="eth0" netns="" May 17 00:35:39.999696 env[1212]: 2025-05-17 00:35:39.928 [INFO][4777] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="0bcf44e68d1237e0478c4818c985fe24d782e0d7dc964b90b8545553594addc8" May 17 00:35:39.999696 env[1212]: 2025-05-17 00:35:39.928 [INFO][4777] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0bcf44e68d1237e0478c4818c985fe24d782e0d7dc964b90b8545553594addc8" May 17 00:35:39.999696 env[1212]: 2025-05-17 00:35:39.980 [INFO][4784] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0bcf44e68d1237e0478c4818c985fe24d782e0d7dc964b90b8545553594addc8" HandleID="k8s-pod-network.0bcf44e68d1237e0478c4818c985fe24d782e0d7dc964b90b8545553594addc8" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-calico--kube--controllers--5dfd77fb7d--55blf-eth0" May 17 00:35:39.999696 env[1212]: 2025-05-17 00:35:39.980 [INFO][4784] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:35:39.999696 env[1212]: 2025-05-17 00:35:39.980 [INFO][4784] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:35:39.999696 env[1212]: 2025-05-17 00:35:39.992 [WARNING][4784] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0bcf44e68d1237e0478c4818c985fe24d782e0d7dc964b90b8545553594addc8" HandleID="k8s-pod-network.0bcf44e68d1237e0478c4818c985fe24d782e0d7dc964b90b8545553594addc8" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-calico--kube--controllers--5dfd77fb7d--55blf-eth0" May 17 00:35:39.999696 env[1212]: 2025-05-17 00:35:39.992 [INFO][4784] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0bcf44e68d1237e0478c4818c985fe24d782e0d7dc964b90b8545553594addc8" HandleID="k8s-pod-network.0bcf44e68d1237e0478c4818c985fe24d782e0d7dc964b90b8545553594addc8" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-calico--kube--controllers--5dfd77fb7d--55blf-eth0" May 17 00:35:39.999696 env[1212]: 2025-05-17 00:35:39.995 [INFO][4784] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:35:39.999696 env[1212]: 2025-05-17 00:35:39.997 [INFO][4777] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="0bcf44e68d1237e0478c4818c985fe24d782e0d7dc964b90b8545553594addc8" May 17 00:35:40.001108 env[1212]: time="2025-05-17T00:35:40.001048932Z" level=info msg="TearDown network for sandbox \"0bcf44e68d1237e0478c4818c985fe24d782e0d7dc964b90b8545553594addc8\" successfully" May 17 00:35:40.002006 env[1212]: time="2025-05-17T00:35:40.001916925Z" level=info msg="StopPodSandbox for \"0bcf44e68d1237e0478c4818c985fe24d782e0d7dc964b90b8545553594addc8\" returns successfully" May 17 00:35:40.002816 env[1212]: time="2025-05-17T00:35:40.002777939Z" level=info msg="RemovePodSandbox for \"0bcf44e68d1237e0478c4818c985fe24d782e0d7dc964b90b8545553594addc8\"" May 17 00:35:40.006218 env[1212]: time="2025-05-17T00:35:40.006145558Z" level=info msg="Forcibly stopping sandbox \"0bcf44e68d1237e0478c4818c985fe24d782e0d7dc964b90b8545553594addc8\"" May 17 00:35:40.169507 env[1212]: 2025-05-17 00:35:40.093 [WARNING][4798] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="0bcf44e68d1237e0478c4818c985fe24d782e0d7dc964b90b8545553594addc8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-calico--kube--controllers--5dfd77fb7d--55blf-eth0", GenerateName:"calico-kube-controllers-5dfd77fb7d-", Namespace:"calico-system", SelfLink:"", UID:"fd78bca1-b6af-4311-93c6-d48694e45dc4", ResourceVersion:"1021", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 34, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5dfd77fb7d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758", ContainerID:"d1ad55d169eedb1da98455b18bcb3a06d6962e829f4e29730ca9c0dd90f9f477", Pod:"calico-kube-controllers-5dfd77fb7d-55blf", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.43.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"caliec1af03241e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:35:40.169507 env[1212]: 2025-05-17 00:35:40.093 [INFO][4798] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="0bcf44e68d1237e0478c4818c985fe24d782e0d7dc964b90b8545553594addc8" May 17 00:35:40.169507 env[1212]: 2025-05-17 00:35:40.093 [INFO][4798] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="0bcf44e68d1237e0478c4818c985fe24d782e0d7dc964b90b8545553594addc8" iface="eth0" netns="" May 17 00:35:40.169507 env[1212]: 2025-05-17 00:35:40.093 [INFO][4798] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="0bcf44e68d1237e0478c4818c985fe24d782e0d7dc964b90b8545553594addc8" May 17 00:35:40.169507 env[1212]: 2025-05-17 00:35:40.094 [INFO][4798] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0bcf44e68d1237e0478c4818c985fe24d782e0d7dc964b90b8545553594addc8" May 17 00:35:40.169507 env[1212]: 2025-05-17 00:35:40.139 [INFO][4805] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0bcf44e68d1237e0478c4818c985fe24d782e0d7dc964b90b8545553594addc8" HandleID="k8s-pod-network.0bcf44e68d1237e0478c4818c985fe24d782e0d7dc964b90b8545553594addc8" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-calico--kube--controllers--5dfd77fb7d--55blf-eth0" May 17 00:35:40.169507 env[1212]: 2025-05-17 00:35:40.143 [INFO][4805] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:35:40.169507 env[1212]: 2025-05-17 00:35:40.143 [INFO][4805] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:35:40.169507 env[1212]: 2025-05-17 00:35:40.157 [WARNING][4805] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0bcf44e68d1237e0478c4818c985fe24d782e0d7dc964b90b8545553594addc8" HandleID="k8s-pod-network.0bcf44e68d1237e0478c4818c985fe24d782e0d7dc964b90b8545553594addc8" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-calico--kube--controllers--5dfd77fb7d--55blf-eth0" May 17 00:35:40.169507 env[1212]: 2025-05-17 00:35:40.157 [INFO][4805] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0bcf44e68d1237e0478c4818c985fe24d782e0d7dc964b90b8545553594addc8" HandleID="k8s-pod-network.0bcf44e68d1237e0478c4818c985fe24d782e0d7dc964b90b8545553594addc8" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-calico--kube--controllers--5dfd77fb7d--55blf-eth0" May 17 00:35:40.169507 env[1212]: 2025-05-17 00:35:40.163 [INFO][4805] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:35:40.169507 env[1212]: 2025-05-17 00:35:40.165 [INFO][4798] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="0bcf44e68d1237e0478c4818c985fe24d782e0d7dc964b90b8545553594addc8" May 17 00:35:40.170656 env[1212]: time="2025-05-17T00:35:40.170590461Z" level=info msg="TearDown network for sandbox \"0bcf44e68d1237e0478c4818c985fe24d782e0d7dc964b90b8545553594addc8\" successfully" May 17 00:35:40.178177 env[1212]: time="2025-05-17T00:35:40.178077859Z" level=info msg="RemovePodSandbox \"0bcf44e68d1237e0478c4818c985fe24d782e0d7dc964b90b8545553594addc8\" returns successfully" May 17 00:35:40.179219 env[1212]: time="2025-05-17T00:35:40.179179160Z" level=info msg="StopPodSandbox for \"ae6f816b5036db3784b9a7d5e70abd4eee780e7fed3ae1db3d7f7c255a52a286\"" May 17 00:35:40.306773 env[1212]: 2025-05-17 00:35:40.255 [WARNING][4821] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ae6f816b5036db3784b9a7d5e70abd4eee780e7fed3ae1db3d7f7c255a52a286" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-csi--node--driver--kpjdk-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"9a0b64da-0bec-4455-813d-7708414d174b", ResourceVersion:"1079", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 34, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758", ContainerID:"bb107d470c9792b792c0a8cc56dc38513f86f4cd856146d650c48504effd925f", Pod:"csi-node-driver-kpjdk", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.43.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calic0e0f164190", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:35:40.306773 env[1212]: 2025-05-17 00:35:40.255 [INFO][4821] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="ae6f816b5036db3784b9a7d5e70abd4eee780e7fed3ae1db3d7f7c255a52a286" May 17 00:35:40.306773 env[1212]: 2025-05-17 00:35:40.255 [INFO][4821] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ae6f816b5036db3784b9a7d5e70abd4eee780e7fed3ae1db3d7f7c255a52a286" iface="eth0" netns="" May 17 00:35:40.306773 env[1212]: 2025-05-17 00:35:40.255 [INFO][4821] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="ae6f816b5036db3784b9a7d5e70abd4eee780e7fed3ae1db3d7f7c255a52a286" May 17 00:35:40.306773 env[1212]: 2025-05-17 00:35:40.256 [INFO][4821] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ae6f816b5036db3784b9a7d5e70abd4eee780e7fed3ae1db3d7f7c255a52a286" May 17 00:35:40.306773 env[1212]: 2025-05-17 00:35:40.290 [INFO][4828] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ae6f816b5036db3784b9a7d5e70abd4eee780e7fed3ae1db3d7f7c255a52a286" HandleID="k8s-pod-network.ae6f816b5036db3784b9a7d5e70abd4eee780e7fed3ae1db3d7f7c255a52a286" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-csi--node--driver--kpjdk-eth0" May 17 00:35:40.306773 env[1212]: 2025-05-17 00:35:40.290 [INFO][4828] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:35:40.306773 env[1212]: 2025-05-17 00:35:40.290 [INFO][4828] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:35:40.306773 env[1212]: 2025-05-17 00:35:40.300 [WARNING][4828] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ae6f816b5036db3784b9a7d5e70abd4eee780e7fed3ae1db3d7f7c255a52a286" HandleID="k8s-pod-network.ae6f816b5036db3784b9a7d5e70abd4eee780e7fed3ae1db3d7f7c255a52a286" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-csi--node--driver--kpjdk-eth0" May 17 00:35:40.306773 env[1212]: 2025-05-17 00:35:40.300 [INFO][4828] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ae6f816b5036db3784b9a7d5e70abd4eee780e7fed3ae1db3d7f7c255a52a286" HandleID="k8s-pod-network.ae6f816b5036db3784b9a7d5e70abd4eee780e7fed3ae1db3d7f7c255a52a286" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-csi--node--driver--kpjdk-eth0" May 17 00:35:40.306773 env[1212]: 2025-05-17 00:35:40.303 [INFO][4828] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:35:40.306773 env[1212]: 2025-05-17 00:35:40.304 [INFO][4821] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="ae6f816b5036db3784b9a7d5e70abd4eee780e7fed3ae1db3d7f7c255a52a286" May 17 00:35:40.307873 env[1212]: time="2025-05-17T00:35:40.307800909Z" level=info msg="TearDown network for sandbox \"ae6f816b5036db3784b9a7d5e70abd4eee780e7fed3ae1db3d7f7c255a52a286\" successfully" May 17 00:35:40.308045 env[1212]: time="2025-05-17T00:35:40.308012705Z" level=info msg="StopPodSandbox for \"ae6f816b5036db3784b9a7d5e70abd4eee780e7fed3ae1db3d7f7c255a52a286\" returns successfully" May 17 00:35:40.308892 env[1212]: time="2025-05-17T00:35:40.308852932Z" level=info msg="RemovePodSandbox for \"ae6f816b5036db3784b9a7d5e70abd4eee780e7fed3ae1db3d7f7c255a52a286\"" May 17 00:35:40.309162 env[1212]: time="2025-05-17T00:35:40.309084613Z" level=info msg="Forcibly stopping sandbox \"ae6f816b5036db3784b9a7d5e70abd4eee780e7fed3ae1db3d7f7c255a52a286\"" May 17 00:35:40.455750 env[1212]: 2025-05-17 00:35:40.382 [WARNING][4843] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ae6f816b5036db3784b9a7d5e70abd4eee780e7fed3ae1db3d7f7c255a52a286" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-csi--node--driver--kpjdk-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"9a0b64da-0bec-4455-813d-7708414d174b", ResourceVersion:"1079", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 34, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758", ContainerID:"bb107d470c9792b792c0a8cc56dc38513f86f4cd856146d650c48504effd925f", Pod:"csi-node-driver-kpjdk", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.43.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calic0e0f164190", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:35:40.455750 env[1212]: 2025-05-17 00:35:40.383 [INFO][4843] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="ae6f816b5036db3784b9a7d5e70abd4eee780e7fed3ae1db3d7f7c255a52a286" May 17 00:35:40.455750 env[1212]: 2025-05-17 00:35:40.383 [INFO][4843] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ae6f816b5036db3784b9a7d5e70abd4eee780e7fed3ae1db3d7f7c255a52a286" iface="eth0" netns="" May 17 00:35:40.455750 env[1212]: 2025-05-17 00:35:40.383 [INFO][4843] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="ae6f816b5036db3784b9a7d5e70abd4eee780e7fed3ae1db3d7f7c255a52a286" May 17 00:35:40.455750 env[1212]: 2025-05-17 00:35:40.383 [INFO][4843] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ae6f816b5036db3784b9a7d5e70abd4eee780e7fed3ae1db3d7f7c255a52a286" May 17 00:35:40.455750 env[1212]: 2025-05-17 00:35:40.436 [INFO][4850] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ae6f816b5036db3784b9a7d5e70abd4eee780e7fed3ae1db3d7f7c255a52a286" HandleID="k8s-pod-network.ae6f816b5036db3784b9a7d5e70abd4eee780e7fed3ae1db3d7f7c255a52a286" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-csi--node--driver--kpjdk-eth0" May 17 00:35:40.455750 env[1212]: 2025-05-17 00:35:40.437 [INFO][4850] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:35:40.455750 env[1212]: 2025-05-17 00:35:40.437 [INFO][4850] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:35:40.455750 env[1212]: 2025-05-17 00:35:40.445 [WARNING][4850] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ae6f816b5036db3784b9a7d5e70abd4eee780e7fed3ae1db3d7f7c255a52a286" HandleID="k8s-pod-network.ae6f816b5036db3784b9a7d5e70abd4eee780e7fed3ae1db3d7f7c255a52a286" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-csi--node--driver--kpjdk-eth0" May 17 00:35:40.455750 env[1212]: 2025-05-17 00:35:40.445 [INFO][4850] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ae6f816b5036db3784b9a7d5e70abd4eee780e7fed3ae1db3d7f7c255a52a286" HandleID="k8s-pod-network.ae6f816b5036db3784b9a7d5e70abd4eee780e7fed3ae1db3d7f7c255a52a286" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-csi--node--driver--kpjdk-eth0" May 17 00:35:40.455750 env[1212]: 2025-05-17 00:35:40.448 [INFO][4850] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:35:40.455750 env[1212]: 2025-05-17 00:35:40.451 [INFO][4843] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="ae6f816b5036db3784b9a7d5e70abd4eee780e7fed3ae1db3d7f7c255a52a286" May 17 00:35:40.456924 env[1212]: time="2025-05-17T00:35:40.456865367Z" level=info msg="TearDown network for sandbox \"ae6f816b5036db3784b9a7d5e70abd4eee780e7fed3ae1db3d7f7c255a52a286\" successfully" May 17 00:35:40.464689 env[1212]: time="2025-05-17T00:35:40.464622716Z" level=info msg="RemovePodSandbox \"ae6f816b5036db3784b9a7d5e70abd4eee780e7fed3ae1db3d7f7c255a52a286\" returns successfully" May 17 00:35:40.465662 env[1212]: time="2025-05-17T00:35:40.465623503Z" level=info msg="StopPodSandbox for \"67f1562eb02da319fa4fd938337ef3a583cef2fe3e70af43746166b722e25914\"" May 17 00:35:40.503000 audit[1887]: AVC avc: denied { watch } for pid=1887 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7331 scontext=system_u:system_r:svirt_lxc_net_t:s0:c34,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:35:40.535983 kernel: kauditd_printk_skb: 72 callbacks suppressed May 17 00:35:40.536177 kernel: audit: type=1400 audit(1747442140.503:1371): avc: denied { watch } for pid=1887 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7331 scontext=system_u:system_r:svirt_lxc_net_t:s0:c34,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:35:40.503000 audit[1887]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000a5ad00 a2=fc6 a3=0 items=0 ppid=1759 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c34,c1023 key=(null) May 17 00:35:40.574457 kernel: audit: type=1300 audit(1747442140.503:1371): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000a5ad00 a2=fc6 a3=0 items=0 ppid=1759 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c34,c1023 key=(null) May 17 00:35:40.503000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:35:40.607409 kernel: audit: type=1327 audit(1747442140.503:1371): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:35:40.503000 audit[1887]: AVC avc: denied { watch } for pid=1887 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7331 scontext=system_u:system_r:svirt_lxc_net_t:s0:c34,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:35:40.633460 kernel: audit: type=1400 audit(1747442140.503:1372): avc: denied { watch } for pid=1887 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7331 scontext=system_u:system_r:svirt_lxc_net_t:s0:c34,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:35:40.633547 env[1212]: time="2025-05-17T00:35:40.609605503Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\"" May 17 00:35:40.503000 audit[1887]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000a5ad20 a2=fc6 a3=0 items=0 ppid=1759 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c34,c1023 key=(null) May 17 00:35:40.668542 kernel: audit: type=1300 audit(1747442140.503:1372): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000a5ad20 a2=fc6 a3=0 items=0 ppid=1759 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c34,c1023 key=(null) May 17 00:35:40.503000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:35:40.723587 kernel: audit: type=1327 audit(1747442140.503:1372): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:35:40.723752 kernel: audit: type=1400 audit(1747442140.503:1373): avc: denied { watch } for pid=1887 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7331 scontext=system_u:system_r:svirt_lxc_net_t:s0:c34,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:35:40.503000 audit[1887]: AVC avc: denied { watch } for pid=1887 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7331 scontext=system_u:system_r:svirt_lxc_net_t:s0:c34,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:35:40.503000 audit[1887]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0023430c0 a2=fc6 a3=0 items=0 ppid=1759 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c34,c1023 key=(null) May 17 00:35:40.760584 kernel: audit: type=1300 audit(1747442140.503:1373): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0023430c0 a2=fc6 a3=0 items=0 ppid=1759 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c34,c1023 key=(null) May 17 00:35:40.503000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:35:40.503000 audit[1887]: AVC avc: denied { watch } for pid=1887 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7331 scontext=system_u:system_r:svirt_lxc_net_t:s0:c34,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:35:40.815442 kernel: audit: type=1327 audit(1747442140.503:1373): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:35:40.815612 kernel: audit: type=1400 audit(1747442140.503:1374): avc: denied { watch } for pid=1887 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7331 scontext=system_u:system_r:svirt_lxc_net_t:s0:c34,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:35:40.503000 audit[1887]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000a5b360 a2=fc6 a3=0 items=0 ppid=1759 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c34,c1023 key=(null) May 17 00:35:40.503000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:35:40.823813 env[1212]: 2025-05-17 00:35:40.575 [WARNING][4865] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="67f1562eb02da319fa4fd938337ef3a583cef2fe3e70af43746166b722e25914" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-coredns--668d6bf9bc--6zjt5-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"81c29f47-17e5-4770-9231-d763d86cc377", ResourceVersion:"1006", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 34, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758", ContainerID:"f3b093a482c7c2cb1d47485e37cf0f3bb67576a56b2aa932b04fb8f55c239892", Pod:"coredns-668d6bf9bc-6zjt5", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.43.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia4152bd0b74", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:35:40.823813 env[1212]: 2025-05-17 00:35:40.576 [INFO][4865] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="67f1562eb02da319fa4fd938337ef3a583cef2fe3e70af43746166b722e25914" May 17 00:35:40.823813 env[1212]: 2025-05-17 00:35:40.576 [INFO][4865] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="67f1562eb02da319fa4fd938337ef3a583cef2fe3e70af43746166b722e25914" iface="eth0" netns="" May 17 00:35:40.823813 env[1212]: 2025-05-17 00:35:40.576 [INFO][4865] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="67f1562eb02da319fa4fd938337ef3a583cef2fe3e70af43746166b722e25914" May 17 00:35:40.823813 env[1212]: 2025-05-17 00:35:40.576 [INFO][4865] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="67f1562eb02da319fa4fd938337ef3a583cef2fe3e70af43746166b722e25914" May 17 00:35:40.823813 env[1212]: 2025-05-17 00:35:40.709 [INFO][4872] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="67f1562eb02da319fa4fd938337ef3a583cef2fe3e70af43746166b722e25914" HandleID="k8s-pod-network.67f1562eb02da319fa4fd938337ef3a583cef2fe3e70af43746166b722e25914" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-coredns--668d6bf9bc--6zjt5-eth0" May 17 00:35:40.823813 env[1212]: 2025-05-17 00:35:40.709 [INFO][4872] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:35:40.823813 env[1212]: 2025-05-17 00:35:40.709 [INFO][4872] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:35:40.823813 env[1212]: 2025-05-17 00:35:40.773 [WARNING][4872] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="67f1562eb02da319fa4fd938337ef3a583cef2fe3e70af43746166b722e25914" HandleID="k8s-pod-network.67f1562eb02da319fa4fd938337ef3a583cef2fe3e70af43746166b722e25914" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-coredns--668d6bf9bc--6zjt5-eth0" May 17 00:35:40.823813 env[1212]: 2025-05-17 00:35:40.774 [INFO][4872] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="67f1562eb02da319fa4fd938337ef3a583cef2fe3e70af43746166b722e25914" HandleID="k8s-pod-network.67f1562eb02da319fa4fd938337ef3a583cef2fe3e70af43746166b722e25914" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-coredns--668d6bf9bc--6zjt5-eth0" May 17 00:35:40.823813 env[1212]: 2025-05-17 00:35:40.820 [INFO][4872] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:35:40.823813 env[1212]: 2025-05-17 00:35:40.821 [INFO][4865] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="67f1562eb02da319fa4fd938337ef3a583cef2fe3e70af43746166b722e25914" May 17 00:35:40.824853 env[1212]: time="2025-05-17T00:35:40.824803562Z" level=info msg="TearDown network for sandbox \"67f1562eb02da319fa4fd938337ef3a583cef2fe3e70af43746166b722e25914\" successfully" May 17 00:35:40.824999 env[1212]: time="2025-05-17T00:35:40.824971938Z" level=info msg="StopPodSandbox for \"67f1562eb02da319fa4fd938337ef3a583cef2fe3e70af43746166b722e25914\" returns successfully" May 17 00:35:40.826471 env[1212]: time="2025-05-17T00:35:40.825889128Z" level=info msg="RemovePodSandbox for \"67f1562eb02da319fa4fd938337ef3a583cef2fe3e70af43746166b722e25914\"" May 17 00:35:40.826471 env[1212]: time="2025-05-17T00:35:40.825936657Z" level=info msg="Forcibly stopping sandbox \"67f1562eb02da319fa4fd938337ef3a583cef2fe3e70af43746166b722e25914\"" May 17 00:35:40.828241 env[1212]: time="2025-05-17T00:35:40.828175539Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:35:40.833392 env[1212]: time="2025-05-17T00:35:40.830157503Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:35:40.833532 kubelet[2012]: E0517 00:35:40.830482 2012 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:35:40.833532 kubelet[2012]: E0517 00:35:40.830592 2012 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:35:40.833532 kubelet[2012]: E0517 00:35:40.831448 2012 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-9zz59,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-78d55f7ddc-8tw2k_calico-system(6fdee754-80af-4193-bcf6-93825e6ce6df): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:35:40.833532 kubelet[2012]: E0517 00:35:40.832739 2012 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-8tw2k" podUID="6fdee754-80af-4193-bcf6-93825e6ce6df" May 17 00:35:41.000518 env[1212]: 2025-05-17 00:35:40.897 [WARNING][4886] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="67f1562eb02da319fa4fd938337ef3a583cef2fe3e70af43746166b722e25914" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-coredns--668d6bf9bc--6zjt5-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"81c29f47-17e5-4770-9231-d763d86cc377", ResourceVersion:"1006", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 34, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758", ContainerID:"f3b093a482c7c2cb1d47485e37cf0f3bb67576a56b2aa932b04fb8f55c239892", Pod:"coredns-668d6bf9bc-6zjt5", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.43.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia4152bd0b74", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:35:41.000518 env[1212]: 2025-05-17 00:35:40.898 [INFO][4886] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="67f1562eb02da319fa4fd938337ef3a583cef2fe3e70af43746166b722e25914" May 17 00:35:41.000518 env[1212]: 2025-05-17 00:35:40.898 [INFO][4886] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="67f1562eb02da319fa4fd938337ef3a583cef2fe3e70af43746166b722e25914" iface="eth0" netns="" May 17 00:35:41.000518 env[1212]: 2025-05-17 00:35:40.898 [INFO][4886] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="67f1562eb02da319fa4fd938337ef3a583cef2fe3e70af43746166b722e25914" May 17 00:35:41.000518 env[1212]: 2025-05-17 00:35:40.898 [INFO][4886] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="67f1562eb02da319fa4fd938337ef3a583cef2fe3e70af43746166b722e25914" May 17 00:35:41.000518 env[1212]: 2025-05-17 00:35:40.971 [INFO][4893] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="67f1562eb02da319fa4fd938337ef3a583cef2fe3e70af43746166b722e25914" HandleID="k8s-pod-network.67f1562eb02da319fa4fd938337ef3a583cef2fe3e70af43746166b722e25914" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-coredns--668d6bf9bc--6zjt5-eth0" May 17 00:35:41.000518 env[1212]: 2025-05-17 00:35:40.972 [INFO][4893] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:35:41.000518 env[1212]: 2025-05-17 00:35:40.972 [INFO][4893] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:35:41.000518 env[1212]: 2025-05-17 00:35:40.993 [WARNING][4893] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="67f1562eb02da319fa4fd938337ef3a583cef2fe3e70af43746166b722e25914" HandleID="k8s-pod-network.67f1562eb02da319fa4fd938337ef3a583cef2fe3e70af43746166b722e25914" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-coredns--668d6bf9bc--6zjt5-eth0" May 17 00:35:41.000518 env[1212]: 2025-05-17 00:35:40.993 [INFO][4893] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="67f1562eb02da319fa4fd938337ef3a583cef2fe3e70af43746166b722e25914" HandleID="k8s-pod-network.67f1562eb02da319fa4fd938337ef3a583cef2fe3e70af43746166b722e25914" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-coredns--668d6bf9bc--6zjt5-eth0" May 17 00:35:41.000518 env[1212]: 2025-05-17 00:35:40.996 [INFO][4893] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:35:41.000518 env[1212]: 2025-05-17 00:35:40.998 [INFO][4886] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="67f1562eb02da319fa4fd938337ef3a583cef2fe3e70af43746166b722e25914" May 17 00:35:41.003226 env[1212]: time="2025-05-17T00:35:41.000473529Z" level=info msg="TearDown network for sandbox \"67f1562eb02da319fa4fd938337ef3a583cef2fe3e70af43746166b722e25914\" successfully" May 17 00:35:41.008901 env[1212]: time="2025-05-17T00:35:41.008814635Z" level=info msg="RemovePodSandbox \"67f1562eb02da319fa4fd938337ef3a583cef2fe3e70af43746166b722e25914\" returns successfully" May 17 00:35:41.009632 env[1212]: time="2025-05-17T00:35:41.009592871Z" level=info msg="StopPodSandbox for \"7eccfb45669ec6645d158891b10a770ecdedbe69d219b47e4d21a3e9c0413b0d\"" May 17 00:35:41.198833 env[1212]: 2025-05-17 00:35:41.086 [WARNING][4907] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7eccfb45669ec6645d158891b10a770ecdedbe69d219b47e4d21a3e9c0413b0d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-goldmane--78d55f7ddc--8tw2k-eth0", GenerateName:"goldmane-78d55f7ddc-", Namespace:"calico-system", SelfLink:"", UID:"6fdee754-80af-4193-bcf6-93825e6ce6df", ResourceVersion:"1108", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 34, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"78d55f7ddc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758", ContainerID:"d514889c403002666dda612b4986a3034a57942503428ec928901f46a8fdffa6", Pod:"goldmane-78d55f7ddc-8tw2k", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.43.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"calif7497a94ddf", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:35:41.198833 env[1212]: 2025-05-17 00:35:41.087 [INFO][4907] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="7eccfb45669ec6645d158891b10a770ecdedbe69d219b47e4d21a3e9c0413b0d" May 17 00:35:41.198833 env[1212]: 2025-05-17 00:35:41.087 [INFO][4907] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7eccfb45669ec6645d158891b10a770ecdedbe69d219b47e4d21a3e9c0413b0d" iface="eth0" netns="" May 17 00:35:41.198833 env[1212]: 2025-05-17 00:35:41.087 [INFO][4907] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="7eccfb45669ec6645d158891b10a770ecdedbe69d219b47e4d21a3e9c0413b0d" May 17 00:35:41.198833 env[1212]: 2025-05-17 00:35:41.087 [INFO][4907] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7eccfb45669ec6645d158891b10a770ecdedbe69d219b47e4d21a3e9c0413b0d" May 17 00:35:41.198833 env[1212]: 2025-05-17 00:35:41.155 [INFO][4913] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7eccfb45669ec6645d158891b10a770ecdedbe69d219b47e4d21a3e9c0413b0d" HandleID="k8s-pod-network.7eccfb45669ec6645d158891b10a770ecdedbe69d219b47e4d21a3e9c0413b0d" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-goldmane--78d55f7ddc--8tw2k-eth0" May 17 00:35:41.198833 env[1212]: 2025-05-17 00:35:41.155 [INFO][4913] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:35:41.198833 env[1212]: 2025-05-17 00:35:41.155 [INFO][4913] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:35:41.198833 env[1212]: 2025-05-17 00:35:41.188 [WARNING][4913] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7eccfb45669ec6645d158891b10a770ecdedbe69d219b47e4d21a3e9c0413b0d" HandleID="k8s-pod-network.7eccfb45669ec6645d158891b10a770ecdedbe69d219b47e4d21a3e9c0413b0d" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-goldmane--78d55f7ddc--8tw2k-eth0" May 17 00:35:41.198833 env[1212]: 2025-05-17 00:35:41.188 [INFO][4913] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7eccfb45669ec6645d158891b10a770ecdedbe69d219b47e4d21a3e9c0413b0d" HandleID="k8s-pod-network.7eccfb45669ec6645d158891b10a770ecdedbe69d219b47e4d21a3e9c0413b0d" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-goldmane--78d55f7ddc--8tw2k-eth0" May 17 00:35:41.198833 env[1212]: 2025-05-17 00:35:41.195 [INFO][4913] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:35:41.198833 env[1212]: 2025-05-17 00:35:41.197 [INFO][4907] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="7eccfb45669ec6645d158891b10a770ecdedbe69d219b47e4d21a3e9c0413b0d" May 17 00:35:41.199893 env[1212]: time="2025-05-17T00:35:41.198875378Z" level=info msg="TearDown network for sandbox \"7eccfb45669ec6645d158891b10a770ecdedbe69d219b47e4d21a3e9c0413b0d\" successfully" May 17 00:35:41.199893 env[1212]: time="2025-05-17T00:35:41.198919277Z" level=info msg="StopPodSandbox for \"7eccfb45669ec6645d158891b10a770ecdedbe69d219b47e4d21a3e9c0413b0d\" returns successfully" May 17 00:35:41.199893 env[1212]: time="2025-05-17T00:35:41.199800606Z" level=info msg="RemovePodSandbox for \"7eccfb45669ec6645d158891b10a770ecdedbe69d219b47e4d21a3e9c0413b0d\"" May 17 00:35:41.199893 env[1212]: time="2025-05-17T00:35:41.199849245Z" level=info msg="Forcibly stopping sandbox \"7eccfb45669ec6645d158891b10a770ecdedbe69d219b47e4d21a3e9c0413b0d\"" May 17 00:35:41.290000 audit[4511]: AVC avc: denied { watch } for pid=4511 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_35_07.704624549/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c525,c842 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c525,c842 tclass=file permissive=0 May 17 00:35:41.290000 audit[4511]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00285aac0 a2=fc6 a3=0 items=0 ppid=4299 pid=4511 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c525,c842 key=(null) May 17 00:35:41.290000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:35:41.347569 env[1212]: 2025-05-17 00:35:41.271 [WARNING][4929] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7eccfb45669ec6645d158891b10a770ecdedbe69d219b47e4d21a3e9c0413b0d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-goldmane--78d55f7ddc--8tw2k-eth0", GenerateName:"goldmane-78d55f7ddc-", Namespace:"calico-system", SelfLink:"", UID:"6fdee754-80af-4193-bcf6-93825e6ce6df", ResourceVersion:"1108", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 34, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"78d55f7ddc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250516-2100-689093e84be69a409758", ContainerID:"d514889c403002666dda612b4986a3034a57942503428ec928901f46a8fdffa6", Pod:"goldmane-78d55f7ddc-8tw2k", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.43.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"calif7497a94ddf", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:35:41.347569 env[1212]: 2025-05-17 00:35:41.271 [INFO][4929] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="7eccfb45669ec6645d158891b10a770ecdedbe69d219b47e4d21a3e9c0413b0d" May 17 00:35:41.347569 env[1212]: 2025-05-17 00:35:41.272 [INFO][4929] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7eccfb45669ec6645d158891b10a770ecdedbe69d219b47e4d21a3e9c0413b0d" iface="eth0" netns="" May 17 00:35:41.347569 env[1212]: 2025-05-17 00:35:41.272 [INFO][4929] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="7eccfb45669ec6645d158891b10a770ecdedbe69d219b47e4d21a3e9c0413b0d" May 17 00:35:41.347569 env[1212]: 2025-05-17 00:35:41.272 [INFO][4929] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7eccfb45669ec6645d158891b10a770ecdedbe69d219b47e4d21a3e9c0413b0d" May 17 00:35:41.347569 env[1212]: 2025-05-17 00:35:41.318 [INFO][4936] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7eccfb45669ec6645d158891b10a770ecdedbe69d219b47e4d21a3e9c0413b0d" HandleID="k8s-pod-network.7eccfb45669ec6645d158891b10a770ecdedbe69d219b47e4d21a3e9c0413b0d" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-goldmane--78d55f7ddc--8tw2k-eth0" May 17 00:35:41.347569 env[1212]: 2025-05-17 00:35:41.319 [INFO][4936] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:35:41.347569 env[1212]: 2025-05-17 00:35:41.319 [INFO][4936] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:35:41.347569 env[1212]: 2025-05-17 00:35:41.340 [WARNING][4936] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7eccfb45669ec6645d158891b10a770ecdedbe69d219b47e4d21a3e9c0413b0d" HandleID="k8s-pod-network.7eccfb45669ec6645d158891b10a770ecdedbe69d219b47e4d21a3e9c0413b0d" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-goldmane--78d55f7ddc--8tw2k-eth0" May 17 00:35:41.347569 env[1212]: 2025-05-17 00:35:41.340 [INFO][4936] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7eccfb45669ec6645d158891b10a770ecdedbe69d219b47e4d21a3e9c0413b0d" HandleID="k8s-pod-network.7eccfb45669ec6645d158891b10a770ecdedbe69d219b47e4d21a3e9c0413b0d" Workload="ci--3510--3--7--nightly--20250516--2100--689093e84be69a409758-k8s-goldmane--78d55f7ddc--8tw2k-eth0" May 17 00:35:41.347569 env[1212]: 2025-05-17 00:35:41.343 [INFO][4936] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:35:41.347569 env[1212]: 2025-05-17 00:35:41.345 [INFO][4929] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="7eccfb45669ec6645d158891b10a770ecdedbe69d219b47e4d21a3e9c0413b0d" May 17 00:35:41.348634 env[1212]: time="2025-05-17T00:35:41.348569141Z" level=info msg="TearDown network for sandbox \"7eccfb45669ec6645d158891b10a770ecdedbe69d219b47e4d21a3e9c0413b0d\" successfully" May 17 00:35:41.354288 env[1212]: time="2025-05-17T00:35:41.354232204Z" level=info msg="RemovePodSandbox \"7eccfb45669ec6645d158891b10a770ecdedbe69d219b47e4d21a3e9c0413b0d\" returns successfully" May 17 00:35:41.426000 audit[4943]: NETFILTER_CFG table=filter:125 family=2 entries=12 op=nft_register_rule pid=4943 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:35:41.426000 audit[4943]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffd23f35a00 a2=0 a3=7ffd23f359ec items=0 ppid=2172 pid=4943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:41.426000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:35:41.431000 audit[4943]: NETFILTER_CFG table=nat:126 family=2 entries=34 op=nft_register_chain pid=4943 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:35:41.431000 audit[4943]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffd23f35a00 a2=0 a3=7ffd23f359ec items=0 ppid=2172 pid=4943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:41.431000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:35:47.791212 systemd[1]: Started sshd@7-10.128.0.24:22-139.178.89.65:53348.service. May 17 00:35:47.799000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.128.0.24:22-139.178.89.65:53348 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:47.805992 kernel: kauditd_printk_skb: 11 callbacks suppressed May 17 00:35:47.806141 kernel: audit: type=1130 audit(1747442147.799:1378): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.128.0.24:22-139.178.89.65:53348 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:48.137000 audit[4958]: USER_ACCT pid=4958 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:35:48.169394 kernel: audit: type=1101 audit(1747442148.137:1379): pid=4958 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:35:48.171272 sshd[4958]: Accepted publickey for core from 139.178.89.65 port 53348 ssh2: RSA SHA256:jyE3lnafiBGDGJK6dHnApyF/jgfCnjVgkPORJQqM9Ps May 17 00:35:48.172780 sshd[4958]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:35:48.170000 audit[4958]: CRED_ACQ pid=4958 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:35:48.216982 kernel: audit: type=1103 audit(1747442148.170:1380): pid=4958 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:35:48.217137 kernel: audit: type=1006 audit(1747442148.170:1381): pid=4958 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=8 res=1 May 17 00:35:48.218195 kernel: audit: type=1300 audit(1747442148.170:1381): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcb4f5a8e0 a2=3 a3=0 items=0 ppid=1 pid=4958 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:48.170000 audit[4958]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcb4f5a8e0 a2=3 a3=0 items=0 ppid=1 pid=4958 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:48.218681 systemd-logind[1221]: New session 8 of user core. May 17 00:35:48.228410 systemd[1]: Started session-8.scope. May 17 00:35:48.170000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:35:48.260402 kernel: audit: type=1327 audit(1747442148.170:1381): proctitle=737368643A20636F7265205B707269765D May 17 00:35:48.246000 audit[4958]: USER_START pid=4958 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:35:48.293405 kernel: audit: type=1105 audit(1747442148.246:1382): pid=4958 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:35:48.293591 kernel: audit: type=1103 audit(1747442148.258:1383): pid=4963 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:35:48.258000 audit[4963]: CRED_ACQ pid=4963 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:35:48.602662 sshd[4958]: pam_unix(sshd:session): session closed for user core May 17 00:35:48.602000 audit[4958]: USER_END pid=4958 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:35:48.609686 kubelet[2012]: E0517 00:35:48.609621 2012 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-7ffdff5fc8-9slj8" podUID="3dcc79a4-50c4-40e3-9eb9-e25e3953688a" May 17 00:35:48.639405 kernel: audit: type=1106 audit(1747442148.602:1384): pid=4958 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:35:48.639828 systemd-logind[1221]: Session 8 logged out. Waiting for processes to exit. May 17 00:35:48.640546 systemd[1]: sshd@7-10.128.0.24:22-139.178.89.65:53348.service: Deactivated successfully. May 17 00:35:48.641852 systemd[1]: session-8.scope: Deactivated successfully. May 17 00:35:48.643804 systemd-logind[1221]: Removed session 8. May 17 00:35:48.602000 audit[4958]: CRED_DISP pid=4958 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:35:48.676445 kernel: audit: type=1104 audit(1747442148.602:1385): pid=4958 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:35:48.639000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.128.0.24:22-139.178.89.65:53348 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:52.607439 kubelet[2012]: E0517 00:35:52.607353 2012 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-8tw2k" podUID="6fdee754-80af-4193-bcf6-93825e6ce6df" May 17 00:35:53.349271 systemd[1]: run-containerd-runc-k8s.io-aafd819f18ab642d11159955ae004c151c3b617b0e508441e4969562b1e4f02e-runc.9V9XY1.mount: Deactivated successfully. May 17 00:35:53.651825 systemd[1]: Started sshd@8-10.128.0.24:22-139.178.89.65:53364.service. May 17 00:35:53.661464 kernel: kauditd_printk_skb: 1 callbacks suppressed May 17 00:35:53.661604 kernel: audit: type=1130 audit(1747442153.650:1387): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.128.0.24:22-139.178.89.65:53364 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:53.650000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.128.0.24:22-139.178.89.65:53364 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:53.984000 audit[4998]: USER_ACCT pid=4998 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:35:53.988547 sshd[4998]: Accepted publickey for core from 139.178.89.65 port 53364 ssh2: RSA SHA256:jyE3lnafiBGDGJK6dHnApyF/jgfCnjVgkPORJQqM9Ps May 17 00:35:54.001746 sshd[4998]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:35:54.015510 kernel: audit: type=1101 audit(1747442153.984:1388): pid=4998 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:35:53.999000 audit[4998]: CRED_ACQ pid=4998 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:35:54.025522 systemd[1]: Started session-9.scope. May 17 00:35:54.033492 systemd-logind[1221]: New session 9 of user core. May 17 00:35:54.046461 kernel: audit: type=1103 audit(1747442153.999:1389): pid=4998 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:35:54.063725 kernel: audit: type=1006 audit(1747442153.999:1390): pid=4998 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 May 17 00:35:53.999000 audit[4998]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffea7020e40 a2=3 a3=0 items=0 ppid=1 pid=4998 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:54.092408 kernel: audit: type=1300 audit(1747442153.999:1390): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffea7020e40 a2=3 a3=0 items=0 ppid=1 pid=4998 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:54.092583 kernel: audit: type=1327 audit(1747442153.999:1390): proctitle=737368643A20636F7265205B707269765D May 17 00:35:53.999000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:35:54.040000 audit[4998]: USER_START pid=4998 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:35:54.134233 kernel: audit: type=1105 audit(1747442154.040:1391): pid=4998 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:35:54.046000 audit[5000]: CRED_ACQ pid=5000 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:35:54.159491 kernel: audit: type=1103 audit(1747442154.046:1392): pid=5000 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:35:54.393035 sshd[4998]: pam_unix(sshd:session): session closed for user core May 17 00:35:54.429496 kernel: audit: type=1106 audit(1747442154.393:1393): pid=4998 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:35:54.393000 audit[4998]: USER_END pid=4998 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:35:54.430957 systemd-logind[1221]: Session 9 logged out. Waiting for processes to exit. May 17 00:35:54.432817 systemd[1]: sshd@8-10.128.0.24:22-139.178.89.65:53364.service: Deactivated successfully. May 17 00:35:54.434045 systemd[1]: session-9.scope: Deactivated successfully. May 17 00:35:54.436597 systemd-logind[1221]: Removed session 9. May 17 00:35:54.393000 audit[4998]: CRED_DISP pid=4998 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:35:54.473401 kernel: audit: type=1104 audit(1747442154.393:1394): pid=4998 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:35:54.431000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.128.0.24:22-139.178.89.65:53364 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:55.256493 systemd[1]: run-containerd-runc-k8s.io-86937f2fa6aea780273f5e3ebb4de50aad612e8544bc0cd4da674142b77a9c46-runc.Lok4kN.mount: Deactivated successfully. May 17 00:35:56.972352 systemd[1]: run-containerd-runc-k8s.io-aafd819f18ab642d11159955ae004c151c3b617b0e508441e4969562b1e4f02e-runc.bgN0Gc.mount: Deactivated successfully. May 17 00:35:59.481708 kernel: kauditd_printk_skb: 1 callbacks suppressed May 17 00:35:59.481870 kernel: audit: type=1130 audit(1747442159.450:1396): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.128.0.24:22-139.178.89.65:40998 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:59.450000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.128.0.24:22-139.178.89.65:40998 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:59.450765 systemd[1]: Started sshd@9-10.128.0.24:22-139.178.89.65:40998.service. May 17 00:35:59.776000 audit[5050]: USER_ACCT pid=5050 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:35:59.777708 sshd[5050]: Accepted publickey for core from 139.178.89.65 port 40998 ssh2: RSA SHA256:jyE3lnafiBGDGJK6dHnApyF/jgfCnjVgkPORJQqM9Ps May 17 00:35:59.807405 kernel: audit: type=1101 audit(1747442159.776:1397): pid=5050 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:35:59.807000 audit[5050]: CRED_ACQ pid=5050 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:35:59.808774 sshd[5050]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:35:59.834447 kernel: audit: type=1103 audit(1747442159.807:1398): pid=5050 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:35:59.852772 kernel: audit: type=1006 audit(1747442159.807:1399): pid=5050 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 May 17 00:35:59.852884 kernel: audit: type=1300 audit(1747442159.807:1399): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffb948c560 a2=3 a3=0 items=0 ppid=1 pid=5050 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:59.807000 audit[5050]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffb948c560 a2=3 a3=0 items=0 ppid=1 pid=5050 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:59.855299 systemd-logind[1221]: New session 10 of user core. May 17 00:35:59.857195 systemd[1]: Started session-10.scope. May 17 00:35:59.888087 kernel: audit: type=1327 audit(1747442159.807:1399): proctitle=737368643A20636F7265205B707269765D May 17 00:35:59.807000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:35:59.871000 audit[5050]: USER_START pid=5050 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:35:59.922126 kernel: audit: type=1105 audit(1747442159.871:1400): pid=5050 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:35:59.875000 audit[5052]: CRED_ACQ pid=5052 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:35:59.947432 kernel: audit: type=1103 audit(1747442159.875:1401): pid=5052 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:00.217937 sshd[5050]: pam_unix(sshd:session): session closed for user core May 17 00:36:00.219000 audit[5050]: USER_END pid=5050 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:00.233317 systemd[1]: sshd@9-10.128.0.24:22-139.178.89.65:40998.service: Deactivated successfully. May 17 00:36:00.234625 systemd[1]: session-10.scope: Deactivated successfully. May 17 00:36:00.236433 systemd-logind[1221]: Session 10 logged out. Waiting for processes to exit. May 17 00:36:00.238090 systemd-logind[1221]: Removed session 10. May 17 00:36:00.219000 audit[5050]: CRED_DISP pid=5050 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:00.276976 kernel: audit: type=1106 audit(1747442160.219:1402): pid=5050 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:00.277163 kernel: audit: type=1104 audit(1747442160.219:1403): pid=5050 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:00.229000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.128.0.24:22-139.178.89.65:40998 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:00.283602 systemd[1]: Started sshd@10-10.128.0.24:22-139.178.89.65:41010.service. May 17 00:36:00.283000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.128.0.24:22-139.178.89.65:41010 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:00.605000 audit[5062]: USER_ACCT pid=5062 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:00.608155 sshd[5062]: Accepted publickey for core from 139.178.89.65 port 41010 ssh2: RSA SHA256:jyE3lnafiBGDGJK6dHnApyF/jgfCnjVgkPORJQqM9Ps May 17 00:36:00.608000 audit[5062]: CRED_ACQ pid=5062 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:00.608000 audit[5062]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff2a176190 a2=3 a3=0 items=0 ppid=1 pid=5062 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:00.608000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:36:00.609330 sshd[5062]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:36:00.619621 systemd-logind[1221]: New session 11 of user core. May 17 00:36:00.621587 systemd[1]: Started session-11.scope. May 17 00:36:00.634000 audit[5062]: USER_START pid=5062 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:00.637000 audit[5064]: CRED_ACQ pid=5064 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:01.055594 sshd[5062]: pam_unix(sshd:session): session closed for user core May 17 00:36:01.057000 audit[5062]: USER_END pid=5062 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:01.057000 audit[5062]: CRED_DISP pid=5062 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:01.060456 systemd-logind[1221]: Session 11 logged out. Waiting for processes to exit. May 17 00:36:01.062799 systemd[1]: sshd@10-10.128.0.24:22-139.178.89.65:41010.service: Deactivated successfully. May 17 00:36:01.064120 systemd[1]: session-11.scope: Deactivated successfully. May 17 00:36:01.062000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.128.0.24:22-139.178.89.65:41010 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:01.066776 systemd-logind[1221]: Removed session 11. May 17 00:36:01.112000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.128.0.24:22-139.178.89.65:41018 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:01.112186 systemd[1]: Started sshd@11-10.128.0.24:22-139.178.89.65:41018.service. May 17 00:36:01.400000 audit[5072]: USER_ACCT pid=5072 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:01.404057 sshd[5072]: Accepted publickey for core from 139.178.89.65 port 41018 ssh2: RSA SHA256:jyE3lnafiBGDGJK6dHnApyF/jgfCnjVgkPORJQqM9Ps May 17 00:36:01.402000 audit[5072]: CRED_ACQ pid=5072 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:01.403000 audit[5072]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe67f32520 a2=3 a3=0 items=0 ppid=1 pid=5072 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:01.403000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:36:01.404982 sshd[5072]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:36:01.415797 systemd[1]: Started session-12.scope. May 17 00:36:01.419268 systemd-logind[1221]: New session 12 of user core. May 17 00:36:01.428000 audit[5072]: USER_START pid=5072 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:01.431000 audit[5074]: CRED_ACQ pid=5074 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:01.769734 sshd[5072]: pam_unix(sshd:session): session closed for user core May 17 00:36:01.769000 audit[5072]: USER_END pid=5072 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:01.769000 audit[5072]: CRED_DISP pid=5072 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:01.774000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.128.0.24:22-139.178.89.65:41018 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:01.775500 systemd[1]: sshd@11-10.128.0.24:22-139.178.89.65:41018.service: Deactivated successfully. May 17 00:36:01.778169 systemd[1]: session-12.scope: Deactivated successfully. May 17 00:36:01.779066 systemd-logind[1221]: Session 12 logged out. Waiting for processes to exit. May 17 00:36:01.781091 systemd-logind[1221]: Removed session 12. May 17 00:36:03.614188 env[1212]: time="2025-05-17T00:36:03.613812275Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\"" May 17 00:36:03.766898 env[1212]: time="2025-05-17T00:36:03.766613329Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:36:03.768253 env[1212]: time="2025-05-17T00:36:03.768093154Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:36:03.768659 kubelet[2012]: E0517 00:36:03.768609 2012 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:36:03.769341 kubelet[2012]: E0517 00:36:03.769308 2012 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:36:03.770275 kubelet[2012]: E0517 00:36:03.769764 2012 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-9zz59,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-78d55f7ddc-8tw2k_calico-system(6fdee754-80af-4193-bcf6-93825e6ce6df): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:36:03.770567 env[1212]: time="2025-05-17T00:36:03.769997611Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\"" May 17 00:36:03.771028 kubelet[2012]: E0517 00:36:03.770990 2012 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-8tw2k" podUID="6fdee754-80af-4193-bcf6-93825e6ce6df" May 17 00:36:03.898068 env[1212]: time="2025-05-17T00:36:03.897901820Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:36:03.899508 env[1212]: time="2025-05-17T00:36:03.899426993Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:36:03.899959 kubelet[2012]: E0517 00:36:03.899898 2012 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:36:03.900110 kubelet[2012]: E0517 00:36:03.899977 2012 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:36:03.900190 kubelet[2012]: E0517 00:36:03.900128 2012 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.0,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:dc356148a25040b2be34d2920fa2f436,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-xhw88,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-7ffdff5fc8-9slj8_calico-system(3dcc79a4-50c4-40e3-9eb9-e25e3953688a): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:36:03.902989 env[1212]: time="2025-05-17T00:36:03.902942228Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\"" May 17 00:36:04.028508 env[1212]: time="2025-05-17T00:36:04.028412794Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:36:04.030287 env[1212]: time="2025-05-17T00:36:04.030185357Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:36:04.030646 kubelet[2012]: E0517 00:36:04.030580 2012 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:36:04.030774 kubelet[2012]: E0517 00:36:04.030665 2012 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:36:04.030897 kubelet[2012]: E0517 00:36:04.030831 2012 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-xhw88,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-7ffdff5fc8-9slj8_calico-system(3dcc79a4-50c4-40e3-9eb9-e25e3953688a): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:36:04.032553 kubelet[2012]: E0517 00:36:04.032494 2012 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-7ffdff5fc8-9slj8" podUID="3dcc79a4-50c4-40e3-9eb9-e25e3953688a" May 17 00:36:06.820985 systemd[1]: Started sshd@12-10.128.0.24:22-139.178.89.65:50846.service. May 17 00:36:06.851927 kernel: kauditd_printk_skb: 23 callbacks suppressed May 17 00:36:06.852105 kernel: audit: type=1130 audit(1747442166.820:1423): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.128.0.24:22-139.178.89.65:50846 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:06.820000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.128.0.24:22-139.178.89.65:50846 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:07.132000 audit[5094]: USER_ACCT pid=5094 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:07.165974 kernel: audit: type=1101 audit(1747442167.132:1424): pid=5094 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:07.166211 sshd[5094]: Accepted publickey for core from 139.178.89.65 port 50846 ssh2: RSA SHA256:jyE3lnafiBGDGJK6dHnApyF/jgfCnjVgkPORJQqM9Ps May 17 00:36:07.167932 sshd[5094]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:36:07.178166 systemd[1]: Started session-13.scope. May 17 00:36:07.180885 systemd-logind[1221]: New session 13 of user core. May 17 00:36:07.165000 audit[5094]: CRED_ACQ pid=5094 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:07.226460 kernel: audit: type=1103 audit(1747442167.165:1425): pid=5094 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:07.165000 audit[5094]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffed7a8b360 a2=3 a3=0 items=0 ppid=1 pid=5094 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:07.287734 kernel: audit: type=1006 audit(1747442167.165:1426): pid=5094 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 May 17 00:36:07.287912 kernel: audit: type=1300 audit(1747442167.165:1426): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffed7a8b360 a2=3 a3=0 items=0 ppid=1 pid=5094 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:07.165000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:36:07.297452 kernel: audit: type=1327 audit(1747442167.165:1426): proctitle=737368643A20636F7265205B707269765D May 17 00:36:07.193000 audit[5094]: USER_START pid=5094 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:07.329866 kernel: audit: type=1105 audit(1747442167.193:1427): pid=5094 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:07.196000 audit[5096]: CRED_ACQ pid=5096 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:07.370392 kernel: audit: type=1103 audit(1747442167.196:1428): pid=5096 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:07.538174 sshd[5094]: pam_unix(sshd:session): session closed for user core May 17 00:36:07.540000 audit[5094]: USER_END pid=5094 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:07.575400 kernel: audit: type=1106 audit(1747442167.540:1429): pid=5094 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:07.581357 systemd[1]: sshd@12-10.128.0.24:22-139.178.89.65:50846.service: Deactivated successfully. May 17 00:36:07.582694 systemd[1]: session-13.scope: Deactivated successfully. May 17 00:36:07.584427 systemd-logind[1221]: Session 13 logged out. Waiting for processes to exit. May 17 00:36:07.586795 systemd-logind[1221]: Removed session 13. May 17 00:36:07.575000 audit[5094]: CRED_DISP pid=5094 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:07.612396 kernel: audit: type=1104 audit(1747442167.575:1430): pid=5094 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:07.580000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.128.0.24:22-139.178.89.65:50846 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:12.586955 systemd[1]: Started sshd@13-10.128.0.24:22-139.178.89.65:50856.service. May 17 00:36:12.587000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.128.0.24:22-139.178.89.65:50856 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:12.617730 kernel: kauditd_printk_skb: 1 callbacks suppressed May 17 00:36:12.617908 kernel: audit: type=1130 audit(1747442172.587:1432): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.128.0.24:22-139.178.89.65:50856 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:12.915000 audit[5109]: USER_ACCT pid=5109 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:12.918130 sshd[5109]: Accepted publickey for core from 139.178.89.65 port 50856 ssh2: RSA SHA256:jyE3lnafiBGDGJK6dHnApyF/jgfCnjVgkPORJQqM9Ps May 17 00:36:12.946431 kernel: audit: type=1101 audit(1747442172.915:1433): pid=5109 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:12.946000 audit[5109]: CRED_ACQ pid=5109 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:12.947690 sshd[5109]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:36:12.963739 systemd[1]: Started session-14.scope. May 17 00:36:12.965865 systemd-logind[1221]: New session 14 of user core. May 17 00:36:12.973393 kernel: audit: type=1103 audit(1747442172.946:1434): pid=5109 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:12.993442 kernel: audit: type=1006 audit(1747442172.946:1435): pid=5109 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 May 17 00:36:12.946000 audit[5109]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc20810f60 a2=3 a3=0 items=0 ppid=1 pid=5109 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:13.030440 kernel: audit: type=1300 audit(1747442172.946:1435): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc20810f60 a2=3 a3=0 items=0 ppid=1 pid=5109 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:12.946000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:36:13.040391 kernel: audit: type=1327 audit(1747442172.946:1435): proctitle=737368643A20636F7265205B707269765D May 17 00:36:12.975000 audit[5109]: USER_START pid=5109 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:13.073796 kernel: audit: type=1105 audit(1747442172.975:1436): pid=5109 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:12.995000 audit[5111]: CRED_ACQ pid=5111 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:13.098421 kernel: audit: type=1103 audit(1747442172.995:1437): pid=5111 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:13.336000 audit[5109]: USER_END pid=5109 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:13.335645 sshd[5109]: pam_unix(sshd:session): session closed for user core May 17 00:36:13.370487 kernel: audit: type=1106 audit(1747442173.336:1438): pid=5109 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:13.372752 systemd[1]: sshd@13-10.128.0.24:22-139.178.89.65:50856.service: Deactivated successfully. May 17 00:36:13.336000 audit[5109]: CRED_DISP pid=5109 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:13.374639 systemd[1]: session-14.scope: Deactivated successfully. May 17 00:36:13.374669 systemd-logind[1221]: Session 14 logged out. Waiting for processes to exit. May 17 00:36:13.399389 kernel: audit: type=1104 audit(1747442173.336:1439): pid=5109 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:13.372000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.128.0.24:22-139.178.89.65:50856 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:13.400584 systemd-logind[1221]: Removed session 14. May 17 00:36:16.608181 kubelet[2012]: E0517 00:36:16.608112 2012 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-7ffdff5fc8-9slj8" podUID="3dcc79a4-50c4-40e3-9eb9-e25e3953688a" May 17 00:36:17.613620 kubelet[2012]: E0517 00:36:17.613534 2012 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-8tw2k" podUID="6fdee754-80af-4193-bcf6-93825e6ce6df" May 17 00:36:18.390415 systemd[1]: Started sshd@14-10.128.0.24:22-139.178.89.65:34310.service. May 17 00:36:18.389000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.128.0.24:22-139.178.89.65:34310 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:18.396046 kernel: kauditd_printk_skb: 1 callbacks suppressed May 17 00:36:18.396175 kernel: audit: type=1130 audit(1747442178.389:1441): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.128.0.24:22-139.178.89.65:34310 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:18.722000 audit[5122]: USER_ACCT pid=5122 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:18.754404 kernel: audit: type=1101 audit(1747442178.722:1442): pid=5122 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:18.755969 sshd[5122]: Accepted publickey for core from 139.178.89.65 port 34310 ssh2: RSA SHA256:jyE3lnafiBGDGJK6dHnApyF/jgfCnjVgkPORJQqM9Ps May 17 00:36:18.757166 sshd[5122]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:36:18.755000 audit[5122]: CRED_ACQ pid=5122 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:18.783402 kernel: audit: type=1103 audit(1747442178.755:1443): pid=5122 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:18.755000 audit[5122]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe6d9ed280 a2=3 a3=0 items=0 ppid=1 pid=5122 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:18.829159 kernel: audit: type=1006 audit(1747442178.755:1444): pid=5122 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 May 17 00:36:18.829390 kernel: audit: type=1300 audit(1747442178.755:1444): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe6d9ed280 a2=3 a3=0 items=0 ppid=1 pid=5122 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:18.755000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:36:18.840648 kernel: audit: type=1327 audit(1747442178.755:1444): proctitle=737368643A20636F7265205B707269765D May 17 00:36:18.844685 systemd-logind[1221]: New session 15 of user core. May 17 00:36:18.847548 systemd[1]: Started session-15.scope. May 17 00:36:18.857000 audit[5122]: USER_START pid=5122 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:18.891663 kernel: audit: type=1105 audit(1747442178.857:1445): pid=5122 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:18.860000 audit[5124]: CRED_ACQ pid=5124 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:18.916510 kernel: audit: type=1103 audit(1747442178.860:1446): pid=5124 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:19.185919 sshd[5122]: pam_unix(sshd:session): session closed for user core May 17 00:36:19.186000 audit[5122]: USER_END pid=5122 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:19.186000 audit[5122]: CRED_DISP pid=5122 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:19.222106 systemd[1]: sshd@14-10.128.0.24:22-139.178.89.65:34310.service: Deactivated successfully. May 17 00:36:19.224424 systemd[1]: session-15.scope: Deactivated successfully. May 17 00:36:19.225848 systemd-logind[1221]: Session 15 logged out. Waiting for processes to exit. May 17 00:36:19.227665 systemd-logind[1221]: Removed session 15. May 17 00:36:19.246941 kernel: audit: type=1106 audit(1747442179.186:1447): pid=5122 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:19.247077 kernel: audit: type=1104 audit(1747442179.186:1448): pid=5122 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:19.221000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.128.0.24:22-139.178.89.65:34310 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:24.234244 systemd[1]: Started sshd@15-10.128.0.24:22-139.178.89.65:34318.service. May 17 00:36:24.234000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.128.0.24:22-139.178.89.65:34318 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:24.240507 kernel: kauditd_printk_skb: 1 callbacks suppressed May 17 00:36:24.240616 kernel: audit: type=1130 audit(1747442184.234:1450): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.128.0.24:22-139.178.89.65:34318 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:24.535000 audit[5134]: USER_ACCT pid=5134 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:24.567431 kernel: audit: type=1101 audit(1747442184.535:1451): pid=5134 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:24.549095 sshd[5134]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:36:24.568051 sshd[5134]: Accepted publickey for core from 139.178.89.65 port 34318 ssh2: RSA SHA256:jyE3lnafiBGDGJK6dHnApyF/jgfCnjVgkPORJQqM9Ps May 17 00:36:24.546000 audit[5134]: CRED_ACQ pid=5134 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:24.578097 systemd[1]: Started session-16.scope. May 17 00:36:24.579855 systemd-logind[1221]: New session 16 of user core. May 17 00:36:24.603551 kernel: audit: type=1103 audit(1747442184.546:1452): pid=5134 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:24.621404 kernel: audit: type=1006 audit(1747442184.546:1453): pid=5134 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 May 17 00:36:24.546000 audit[5134]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe682d97b0 a2=3 a3=0 items=0 ppid=1 pid=5134 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:24.653406 kernel: audit: type=1300 audit(1747442184.546:1453): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe682d97b0 a2=3 a3=0 items=0 ppid=1 pid=5134 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:24.546000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:36:24.614000 audit[5134]: USER_START pid=5134 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:24.695522 kernel: audit: type=1327 audit(1747442184.546:1453): proctitle=737368643A20636F7265205B707269765D May 17 00:36:24.695716 kernel: audit: type=1105 audit(1747442184.614:1454): pid=5134 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:24.623000 audit[5136]: CRED_ACQ pid=5136 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:24.719981 kernel: audit: type=1103 audit(1747442184.623:1455): pid=5136 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:24.967660 sshd[5134]: pam_unix(sshd:session): session closed for user core May 17 00:36:24.969000 audit[5134]: USER_END pid=5134 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:25.005083 kernel: audit: type=1106 audit(1747442184.969:1456): pid=5134 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:25.006078 systemd-logind[1221]: Session 16 logged out. Waiting for processes to exit. May 17 00:36:25.006346 systemd[1]: sshd@15-10.128.0.24:22-139.178.89.65:34318.service: Deactivated successfully. May 17 00:36:25.007679 systemd[1]: session-16.scope: Deactivated successfully. May 17 00:36:24.969000 audit[5134]: CRED_DISP pid=5134 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:25.017798 systemd[1]: Started sshd@16-10.128.0.24:22-139.178.89.65:34322.service. May 17 00:36:25.029388 systemd-logind[1221]: Removed session 16. May 17 00:36:25.044399 kernel: audit: type=1104 audit(1747442184.969:1457): pid=5134 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:25.006000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.128.0.24:22-139.178.89.65:34318 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:25.017000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.128.0.24:22-139.178.89.65:34322 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:25.252501 systemd[1]: run-containerd-runc-k8s.io-86937f2fa6aea780273f5e3ebb4de50aad612e8544bc0cd4da674142b77a9c46-runc.JIfwdk.mount: Deactivated successfully. May 17 00:36:25.347000 audit[5146]: USER_ACCT pid=5146 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:25.350007 sshd[5146]: Accepted publickey for core from 139.178.89.65 port 34322 ssh2: RSA SHA256:jyE3lnafiBGDGJK6dHnApyF/jgfCnjVgkPORJQqM9Ps May 17 00:36:25.350000 audit[5146]: CRED_ACQ pid=5146 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:25.350000 audit[5146]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc0f45f260 a2=3 a3=0 items=0 ppid=1 pid=5146 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:25.350000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:36:25.352239 sshd[5146]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:36:25.361303 systemd[1]: Started session-17.scope. May 17 00:36:25.363946 systemd-logind[1221]: New session 17 of user core. May 17 00:36:25.373000 audit[5146]: USER_START pid=5146 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:25.376000 audit[5170]: CRED_ACQ pid=5170 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:25.779460 sshd[5146]: pam_unix(sshd:session): session closed for user core May 17 00:36:25.780000 audit[5146]: USER_END pid=5146 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:25.780000 audit[5146]: CRED_DISP pid=5146 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:25.784647 systemd-logind[1221]: Session 17 logged out. Waiting for processes to exit. May 17 00:36:25.785000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.128.0.24:22-139.178.89.65:34322 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:25.785904 systemd[1]: sshd@16-10.128.0.24:22-139.178.89.65:34322.service: Deactivated successfully. May 17 00:36:25.787178 systemd[1]: session-17.scope: Deactivated successfully. May 17 00:36:25.789199 systemd-logind[1221]: Removed session 17. May 17 00:36:25.828454 systemd[1]: Started sshd@17-10.128.0.24:22-139.178.89.65:34328.service. May 17 00:36:25.828000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.128.0.24:22-139.178.89.65:34328 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:26.135000 audit[5178]: USER_ACCT pid=5178 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:26.137623 sshd[5178]: Accepted publickey for core from 139.178.89.65 port 34328 ssh2: RSA SHA256:jyE3lnafiBGDGJK6dHnApyF/jgfCnjVgkPORJQqM9Ps May 17 00:36:26.137000 audit[5178]: CRED_ACQ pid=5178 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:26.138000 audit[5178]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc2ab18870 a2=3 a3=0 items=0 ppid=1 pid=5178 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:26.138000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:36:26.139688 sshd[5178]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:36:26.150307 systemd[1]: Started session-18.scope. May 17 00:36:26.152010 systemd-logind[1221]: New session 18 of user core. May 17 00:36:26.161000 audit[5178]: USER_START pid=5178 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:26.165000 audit[5180]: CRED_ACQ pid=5180 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:26.985588 systemd[1]: run-containerd-runc-k8s.io-aafd819f18ab642d11159955ae004c151c3b617b0e508441e4969562b1e4f02e-runc.S7dgAc.mount: Deactivated successfully. May 17 00:36:27.498000 audit[5208]: NETFILTER_CFG table=filter:127 family=2 entries=24 op=nft_register_rule pid=5208 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:27.498000 audit[5208]: SYSCALL arch=c000003e syscall=46 success=yes exit=13432 a0=3 a1=7ffdff430960 a2=0 a3=7ffdff43094c items=0 ppid=2172 pid=5208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:27.498000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:27.512000 audit[5208]: NETFILTER_CFG table=nat:128 family=2 entries=22 op=nft_register_rule pid=5208 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:27.512000 audit[5208]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffdff430960 a2=0 a3=0 items=0 ppid=2172 pid=5208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:27.512000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:27.523672 sshd[5178]: pam_unix(sshd:session): session closed for user core May 17 00:36:27.524000 audit[5178]: USER_END pid=5178 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:27.524000 audit[5178]: CRED_DISP pid=5178 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:27.528000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.128.0.24:22-139.178.89.65:34328 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:27.529681 systemd[1]: sshd@17-10.128.0.24:22-139.178.89.65:34328.service: Deactivated successfully. May 17 00:36:27.530981 systemd[1]: session-18.scope: Deactivated successfully. May 17 00:36:27.532856 systemd-logind[1221]: Session 18 logged out. Waiting for processes to exit. May 17 00:36:27.535617 systemd-logind[1221]: Removed session 18. May 17 00:36:27.541000 audit[5211]: NETFILTER_CFG table=filter:129 family=2 entries=36 op=nft_register_rule pid=5211 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:27.541000 audit[5211]: SYSCALL arch=c000003e syscall=46 success=yes exit=13432 a0=3 a1=7ffe0c21e870 a2=0 a3=7ffe0c21e85c items=0 ppid=2172 pid=5211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:27.541000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:27.548000 audit[5211]: NETFILTER_CFG table=nat:130 family=2 entries=22 op=nft_register_rule pid=5211 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:27.548000 audit[5211]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe0c21e870 a2=0 a3=0 items=0 ppid=2172 pid=5211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:27.548000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:27.574000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.128.0.24:22-139.178.89.65:46232 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:27.575839 systemd[1]: Started sshd@18-10.128.0.24:22-139.178.89.65:46232.service. May 17 00:36:27.872000 audit[5213]: USER_ACCT pid=5213 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:27.875773 sshd[5213]: Accepted publickey for core from 139.178.89.65 port 46232 ssh2: RSA SHA256:jyE3lnafiBGDGJK6dHnApyF/jgfCnjVgkPORJQqM9Ps May 17 00:36:27.874000 audit[5213]: CRED_ACQ pid=5213 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:27.874000 audit[5213]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe6441c710 a2=3 a3=0 items=0 ppid=1 pid=5213 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:27.874000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:36:27.876883 sshd[5213]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:36:27.887183 systemd-logind[1221]: New session 19 of user core. May 17 00:36:27.888109 systemd[1]: Started session-19.scope. May 17 00:36:27.898000 audit[5213]: USER_START pid=5213 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:27.900000 audit[5215]: CRED_ACQ pid=5215 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:28.540807 sshd[5213]: pam_unix(sshd:session): session closed for user core May 17 00:36:28.541000 audit[5213]: USER_END pid=5213 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:28.541000 audit[5213]: CRED_DISP pid=5213 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:28.545553 systemd-logind[1221]: Session 19 logged out. Waiting for processes to exit. May 17 00:36:28.546150 systemd[1]: sshd@18-10.128.0.24:22-139.178.89.65:46232.service: Deactivated successfully. May 17 00:36:28.545000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.128.0.24:22-139.178.89.65:46232 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:28.547870 systemd[1]: session-19.scope: Deactivated successfully. May 17 00:36:28.549249 systemd-logind[1221]: Removed session 19. May 17 00:36:28.588186 systemd[1]: Started sshd@19-10.128.0.24:22-139.178.89.65:46240.service. May 17 00:36:28.588000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.128.0.24:22-139.178.89.65:46240 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:28.612104 kubelet[2012]: E0517 00:36:28.612039 2012 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-8tw2k" podUID="6fdee754-80af-4193-bcf6-93825e6ce6df" May 17 00:36:28.612849 kubelet[2012]: E0517 00:36:28.612789 2012 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-7ffdff5fc8-9slj8" podUID="3dcc79a4-50c4-40e3-9eb9-e25e3953688a" May 17 00:36:28.890000 audit[5223]: USER_ACCT pid=5223 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:28.892980 sshd[5223]: Accepted publickey for core from 139.178.89.65 port 46240 ssh2: RSA SHA256:jyE3lnafiBGDGJK6dHnApyF/jgfCnjVgkPORJQqM9Ps May 17 00:36:28.892000 audit[5223]: CRED_ACQ pid=5223 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:28.892000 audit[5223]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffecd533460 a2=3 a3=0 items=0 ppid=1 pid=5223 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:28.892000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:36:28.894156 sshd[5223]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:36:28.903500 systemd-logind[1221]: New session 20 of user core. May 17 00:36:28.904755 systemd[1]: Started session-20.scope. May 17 00:36:28.912000 audit[5223]: USER_START pid=5223 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:28.915000 audit[5225]: CRED_ACQ pid=5225 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:29.232268 sshd[5223]: pam_unix(sshd:session): session closed for user core May 17 00:36:29.246453 kernel: kauditd_printk_skb: 54 callbacks suppressed May 17 00:36:29.246608 kernel: audit: type=1106 audit(1747442189.234:1496): pid=5223 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:29.234000 audit[5223]: USER_END pid=5223 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:29.240451 systemd-logind[1221]: Session 20 logged out. Waiting for processes to exit. May 17 00:36:29.242790 systemd[1]: sshd@19-10.128.0.24:22-139.178.89.65:46240.service: Deactivated successfully. May 17 00:36:29.244011 systemd[1]: session-20.scope: Deactivated successfully. May 17 00:36:29.246066 systemd-logind[1221]: Removed session 20. May 17 00:36:29.234000 audit[5223]: CRED_DISP pid=5223 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:29.297757 kernel: audit: type=1104 audit(1747442189.234:1497): pid=5223 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:29.240000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.128.0.24:22-139.178.89.65:46240 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:29.322717 kernel: audit: type=1131 audit(1747442189.240:1498): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.128.0.24:22-139.178.89.65:46240 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:33.536000 audit[1887]: AVC avc: denied { watch } for pid=1887 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7337 scontext=system_u:system_r:svirt_lxc_net_t:s0:c34,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:36:33.564407 kernel: audit: type=1400 audit(1747442193.536:1499): avc: denied { watch } for pid=1887 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7337 scontext=system_u:system_r:svirt_lxc_net_t:s0:c34,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:36:33.536000 audit[1887]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002a1b7a0 a2=fc6 a3=0 items=0 ppid=1759 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c34,c1023 key=(null) May 17 00:36:33.609395 kernel: audit: type=1300 audit(1747442193.536:1499): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002a1b7a0 a2=fc6 a3=0 items=0 ppid=1759 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c34,c1023 key=(null) May 17 00:36:33.536000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:36:33.638400 kernel: audit: type=1327 audit(1747442193.536:1499): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:36:33.536000 audit[1887]: AVC avc: denied { watch } for pid=1887 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7331 scontext=system_u:system_r:svirt_lxc_net_t:s0:c34,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:36:33.664399 kernel: audit: type=1400 audit(1747442193.536:1500): avc: denied { watch } for pid=1887 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7331 scontext=system_u:system_r:svirt_lxc_net_t:s0:c34,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:36:33.536000 audit[1887]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c003533fe0 a2=fc6 a3=0 items=0 ppid=1759 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c34,c1023 key=(null) May 17 00:36:33.536000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:36:33.728554 kernel: audit: type=1300 audit(1747442193.536:1500): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c003533fe0 a2=fc6 a3=0 items=0 ppid=1759 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c34,c1023 key=(null) May 17 00:36:33.728758 kernel: audit: type=1327 audit(1747442193.536:1500): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:36:34.253000 audit[1848]: AVC avc: denied { watch } for pid=1848 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7331 scontext=system_u:system_r:svirt_lxc_net_t:s0:c513,c545 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:36:34.279397 kernel: audit: type=1400 audit(1747442194.253:1501): avc: denied { watch } for pid=1848 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7331 scontext=system_u:system_r:svirt_lxc_net_t:s0:c513,c545 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:36:34.253000 audit[1848]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7f a1=c009a6e1c0 a2=fc6 a3=0 items=0 ppid=1715 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c513,c545 key=(null) May 17 00:36:34.314725 kernel: audit: type=1300 audit(1747442194.253:1501): arch=c000003e syscall=254 success=no exit=-13 a0=7f a1=c009a6e1c0 a2=fc6 a3=0 items=0 ppid=1715 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c513,c545 key=(null) May 17 00:36:34.253000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3234002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:36:34.323561 systemd[1]: Started sshd@20-10.128.0.24:22-139.178.89.65:46244.service. May 17 00:36:34.352511 kernel: audit: type=1327 audit(1747442194.253:1501): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3234002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:36:34.253000 audit[1848]: AVC avc: denied { watch } for pid=1848 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7337 scontext=system_u:system_r:svirt_lxc_net_t:s0:c513,c545 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:36:34.385965 kernel: audit: type=1400 audit(1747442194.253:1502): avc: denied { watch } for pid=1848 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7337 scontext=system_u:system_r:svirt_lxc_net_t:s0:c513,c545 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:36:34.386132 kernel: audit: type=1300 audit(1747442194.253:1502): arch=c000003e syscall=254 success=no exit=-13 a0=7f a1=c008876780 a2=fc6 a3=0 items=0 ppid=1715 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c513,c545 key=(null) May 17 00:36:34.253000 audit[1848]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7f a1=c008876780 a2=fc6 a3=0 items=0 ppid=1715 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c513,c545 key=(null) May 17 00:36:34.253000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3234002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:36:34.447711 kernel: audit: type=1327 audit(1747442194.253:1502): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3234002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:36:34.261000 audit[1848]: AVC avc: denied { watch } for pid=1848 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7333 scontext=system_u:system_r:svirt_lxc_net_t:s0:c513,c545 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:36:34.474731 kernel: audit: type=1400 audit(1747442194.261:1503): avc: denied { watch } for pid=1848 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7333 scontext=system_u:system_r:svirt_lxc_net_t:s0:c513,c545 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:36:34.261000 audit[1848]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7f a1=c0089d36e0 a2=fc6 a3=0 items=0 ppid=1715 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c513,c545 key=(null) May 17 00:36:34.261000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3234002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:36:34.539298 kernel: audit: type=1300 audit(1747442194.261:1503): arch=c000003e syscall=254 success=no exit=-13 a0=7f a1=c0089d36e0 a2=fc6 a3=0 items=0 ppid=1715 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c513,c545 key=(null) May 17 00:36:34.539511 kernel: audit: type=1327 audit(1747442194.261:1503): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3234002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:36:34.539559 kernel: audit: type=1400 audit(1747442194.273:1504): avc: denied { watch } for pid=1848 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7331 scontext=system_u:system_r:svirt_lxc_net_t:s0:c513,c545 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:36:34.273000 audit[1848]: AVC avc: denied { watch } for pid=1848 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7331 scontext=system_u:system_r:svirt_lxc_net_t:s0:c513,c545 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:36:34.273000 audit[1848]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7f a1=c007b72200 a2=fc6 a3=0 items=0 ppid=1715 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c513,c545 key=(null) May 17 00:36:34.273000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3234002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:36:34.273000 audit[1848]: AVC avc: denied { watch } for pid=1848 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7339 scontext=system_u:system_r:svirt_lxc_net_t:s0:c513,c545 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:36:34.273000 audit[1848]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7f a1=c0089d3a70 a2=fc6 a3=0 items=0 ppid=1715 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c513,c545 key=(null) May 17 00:36:34.273000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3234002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:36:34.274000 audit[1848]: AVC avc: denied { watch } for pid=1848 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7337 scontext=system_u:system_r:svirt_lxc_net_t:s0:c513,c545 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:36:34.274000 audit[1848]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7f a1=c0089d3bc0 a2=fc6 a3=0 items=0 ppid=1715 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c513,c545 key=(null) May 17 00:36:34.274000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3234002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:36:34.323000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.128.0.24:22-139.178.89.65:46244 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:34.672000 audit[5237]: USER_ACCT pid=5237 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:34.674810 sshd[5237]: Accepted publickey for core from 139.178.89.65 port 46244 ssh2: RSA SHA256:jyE3lnafiBGDGJK6dHnApyF/jgfCnjVgkPORJQqM9Ps May 17 00:36:34.675000 audit[5237]: CRED_ACQ pid=5237 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:34.675000 audit[5237]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff7f0fa500 a2=3 a3=0 items=0 ppid=1 pid=5237 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:34.675000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:36:34.676958 sshd[5237]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:36:34.687763 systemd[1]: Started session-21.scope. May 17 00:36:34.691019 systemd-logind[1221]: New session 21 of user core. May 17 00:36:34.701000 audit[5237]: USER_START pid=5237 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:34.704000 audit[5239]: CRED_ACQ pid=5239 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:35.014670 sshd[5237]: pam_unix(sshd:session): session closed for user core May 17 00:36:35.016000 audit[5237]: USER_END pid=5237 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:35.016000 audit[5237]: CRED_DISP pid=5237 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:35.020323 systemd-logind[1221]: Session 21 logged out. Waiting for processes to exit. May 17 00:36:35.022000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.128.0.24:22-139.178.89.65:46244 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:35.023043 systemd[1]: sshd@20-10.128.0.24:22-139.178.89.65:46244.service: Deactivated successfully. May 17 00:36:35.024272 systemd[1]: session-21.scope: Deactivated successfully. May 17 00:36:35.027277 systemd-logind[1221]: Removed session 21. May 17 00:36:35.114000 audit[5249]: NETFILTER_CFG table=filter:131 family=2 entries=24 op=nft_register_rule pid=5249 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:35.114000 audit[5249]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffca71d3630 a2=0 a3=7ffca71d361c items=0 ppid=2172 pid=5249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:35.114000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:35.122000 audit[5249]: NETFILTER_CFG table=nat:132 family=2 entries=106 op=nft_register_chain pid=5249 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:35.122000 audit[5249]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffca71d3630 a2=0 a3=7ffca71d361c items=0 ppid=2172 pid=5249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:35.122000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:36.857000 audit[4476]: AVC avc: denied { watch } for pid=4476 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_35_07.4177024089/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c685,c994 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c685,c994 tclass=file permissive=0 May 17 00:36:36.857000 audit[4476]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0005eb0c0 a2=fc6 a3=0 items=0 ppid=4011 pid=4476 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c685,c994 key=(null) May 17 00:36:36.857000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:36:40.068669 systemd[1]: Started sshd@21-10.128.0.24:22-139.178.89.65:41376.service. May 17 00:36:40.067000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.128.0.24:22-139.178.89.65:41376 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:40.074893 kernel: kauditd_printk_skb: 28 callbacks suppressed May 17 00:36:40.075011 kernel: audit: type=1130 audit(1747442200.067:1519): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.128.0.24:22-139.178.89.65:41376 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:40.367000 audit[5253]: USER_ACCT pid=5253 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:40.371217 sshd[5253]: Accepted publickey for core from 139.178.89.65 port 41376 ssh2: RSA SHA256:jyE3lnafiBGDGJK6dHnApyF/jgfCnjVgkPORJQqM9Ps May 17 00:36:40.399419 kernel: audit: type=1101 audit(1747442200.367:1520): pid=5253 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:40.400083 sshd[5253]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:36:40.397000 audit[5253]: CRED_ACQ pid=5253 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:40.409268 systemd[1]: Started session-22.scope. May 17 00:36:40.414002 systemd-logind[1221]: New session 22 of user core. May 17 00:36:40.429445 kernel: audit: type=1103 audit(1747442200.397:1521): pid=5253 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:40.397000 audit[5253]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc11210530 a2=3 a3=0 items=0 ppid=1 pid=5253 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:40.474898 kernel: audit: type=1006 audit(1747442200.397:1522): pid=5253 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 May 17 00:36:40.475051 kernel: audit: type=1300 audit(1747442200.397:1522): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc11210530 a2=3 a3=0 items=0 ppid=1 pid=5253 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:40.478421 kernel: audit: type=1327 audit(1747442200.397:1522): proctitle=737368643A20636F7265205B707269765D May 17 00:36:40.397000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:36:40.421000 audit[5253]: USER_START pid=5253 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:40.517213 kernel: audit: type=1105 audit(1747442200.421:1523): pid=5253 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:40.432000 audit[5255]: CRED_ACQ pid=5255 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:40.504000 audit[1887]: AVC avc: denied { watch } for pid=1887 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7331 scontext=system_u:system_r:svirt_lxc_net_t:s0:c34,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:36:40.567344 kernel: audit: type=1103 audit(1747442200.432:1524): pid=5255 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:40.567542 kernel: audit: type=1400 audit(1747442200.504:1525): avc: denied { watch } for pid=1887 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7331 scontext=system_u:system_r:svirt_lxc_net_t:s0:c34,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:36:40.504000 audit[1887]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c003640000 a2=fc6 a3=0 items=0 ppid=1759 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c34,c1023 key=(null) May 17 00:36:40.603403 kernel: audit: type=1300 audit(1747442200.504:1525): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c003640000 a2=fc6 a3=0 items=0 ppid=1759 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c34,c1023 key=(null) May 17 00:36:40.504000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:36:40.504000 audit[1887]: AVC avc: denied { watch } for pid=1887 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7331 scontext=system_u:system_r:svirt_lxc_net_t:s0:c34,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:36:40.504000 audit[1887]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00369e000 a2=fc6 a3=0 items=0 ppid=1759 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c34,c1023 key=(null) May 17 00:36:40.504000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:36:40.504000 audit[1887]: AVC avc: denied { watch } for pid=1887 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7331 scontext=system_u:system_r:svirt_lxc_net_t:s0:c34,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:36:40.504000 audit[1887]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00369e020 a2=fc6 a3=0 items=0 ppid=1759 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c34,c1023 key=(null) May 17 00:36:40.504000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:36:40.504000 audit[1887]: AVC avc: denied { watch } for pid=1887 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7331 scontext=system_u:system_r:svirt_lxc_net_t:s0:c34,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:36:40.504000 audit[1887]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00369e040 a2=fc6 a3=0 items=0 ppid=1759 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c34,c1023 key=(null) May 17 00:36:40.504000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:36:40.775138 sshd[5253]: pam_unix(sshd:session): session closed for user core May 17 00:36:40.775000 audit[5253]: USER_END pid=5253 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:40.775000 audit[5253]: CRED_DISP pid=5253 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:40.779000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.128.0.24:22-139.178.89.65:41376 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:40.779685 systemd-logind[1221]: Session 22 logged out. Waiting for processes to exit. May 17 00:36:40.780181 systemd[1]: sshd@21-10.128.0.24:22-139.178.89.65:41376.service: Deactivated successfully. May 17 00:36:40.782146 systemd[1]: session-22.scope: Deactivated successfully. May 17 00:36:40.783569 systemd-logind[1221]: Removed session 22. May 17 00:36:41.352000 audit[4511]: AVC avc: denied { watch } for pid=4511 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_35_07.704624549/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c525,c842 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c525,c842 tclass=file permissive=0 May 17 00:36:41.352000 audit[4511]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0028bada0 a2=fc6 a3=0 items=0 ppid=4299 pid=4511 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c525,c842 key=(null) May 17 00:36:41.352000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:36:41.609249 kubelet[2012]: E0517 00:36:41.609087 2012 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-7ffdff5fc8-9slj8" podUID="3dcc79a4-50c4-40e3-9eb9-e25e3953688a" May 17 00:36:43.610030 kubelet[2012]: E0517 00:36:43.609972 2012 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-8tw2k" podUID="6fdee754-80af-4193-bcf6-93825e6ce6df" May 17 00:36:45.820600 systemd[1]: Started sshd@22-10.128.0.24:22-139.178.89.65:41388.service. May 17 00:36:45.852105 kernel: kauditd_printk_skb: 16 callbacks suppressed May 17 00:36:45.852265 kernel: audit: type=1130 audit(1747442205.820:1533): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.128.0.24:22-139.178.89.65:41388 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:45.820000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.128.0.24:22-139.178.89.65:41388 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:46.116000 audit[5272]: USER_ACCT pid=5272 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:46.119074 sshd[5272]: Accepted publickey for core from 139.178.89.65 port 41388 ssh2: RSA SHA256:jyE3lnafiBGDGJK6dHnApyF/jgfCnjVgkPORJQqM9Ps May 17 00:36:46.146734 kernel: audit: type=1101 audit(1747442206.116:1534): pid=5272 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:46.148074 sshd[5272]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:36:46.158297 systemd[1]: Started session-23.scope. May 17 00:36:46.158935 systemd-logind[1221]: New session 23 of user core. May 17 00:36:46.146000 audit[5272]: CRED_ACQ pid=5272 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:46.186580 kernel: audit: type=1103 audit(1747442206.146:1535): pid=5272 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:46.208439 kernel: audit: type=1006 audit(1747442206.147:1536): pid=5272 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 May 17 00:36:46.147000 audit[5272]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd0db9bc80 a2=3 a3=0 items=0 ppid=1 pid=5272 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:46.237401 kernel: audit: type=1300 audit(1747442206.147:1536): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd0db9bc80 a2=3 a3=0 items=0 ppid=1 pid=5272 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:46.237572 kernel: audit: type=1327 audit(1747442206.147:1536): proctitle=737368643A20636F7265205B707269765D May 17 00:36:46.147000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:36:46.186000 audit[5272]: USER_START pid=5272 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:46.279071 kernel: audit: type=1105 audit(1747442206.186:1537): pid=5272 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:46.279484 kernel: audit: type=1103 audit(1747442206.189:1538): pid=5276 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:46.189000 audit[5276]: CRED_ACQ pid=5276 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:46.523425 sshd[5272]: pam_unix(sshd:session): session closed for user core May 17 00:36:46.526000 audit[5272]: USER_END pid=5272 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:46.559406 kernel: audit: type=1106 audit(1747442206.526:1539): pid=5272 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:46.562172 systemd[1]: sshd@22-10.128.0.24:22-139.178.89.65:41388.service: Deactivated successfully. May 17 00:36:46.563812 systemd[1]: session-23.scope: Deactivated successfully. May 17 00:36:46.566953 systemd-logind[1221]: Session 23 logged out. Waiting for processes to exit. May 17 00:36:46.568957 systemd-logind[1221]: Removed session 23. May 17 00:36:46.558000 audit[5272]: CRED_DISP pid=5272 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:46.598481 kernel: audit: type=1104 audit(1747442206.558:1540): pid=5272 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:46.562000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.128.0.24:22-139.178.89.65:41388 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:51.570680 systemd[1]: Started sshd@23-10.128.0.24:22-139.178.89.65:38624.service. May 17 00:36:51.603353 kernel: kauditd_printk_skb: 1 callbacks suppressed May 17 00:36:51.603557 kernel: audit: type=1130 audit(1747442211.571:1542): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.128.0.24:22-139.178.89.65:38624 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:51.571000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.128.0.24:22-139.178.89.65:38624 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:51.864000 audit[5286]: USER_ACCT pid=5286 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:51.866512 sshd[5286]: Accepted publickey for core from 139.178.89.65 port 38624 ssh2: RSA SHA256:jyE3lnafiBGDGJK6dHnApyF/jgfCnjVgkPORJQqM9Ps May 17 00:36:51.894000 audit[5286]: CRED_ACQ pid=5286 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:51.896724 sshd[5286]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:36:51.921246 kernel: audit: type=1101 audit(1747442211.864:1543): pid=5286 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:51.921443 kernel: audit: type=1103 audit(1747442211.894:1544): pid=5286 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:51.939411 kernel: audit: type=1006 audit(1747442211.894:1545): pid=5286 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 May 17 00:36:51.894000 audit[5286]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffff954a2f0 a2=3 a3=0 items=0 ppid=1 pid=5286 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:51.943825 systemd-logind[1221]: New session 24 of user core. May 17 00:36:51.947030 systemd[1]: Started session-24.scope. May 17 00:36:51.968385 kernel: audit: type=1300 audit(1747442211.894:1545): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffff954a2f0 a2=3 a3=0 items=0 ppid=1 pid=5286 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:51.894000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:36:51.980672 kernel: audit: type=1327 audit(1747442211.894:1545): proctitle=737368643A20636F7265205B707269765D May 17 00:36:51.979000 audit[5286]: USER_START pid=5286 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:52.018435 kernel: audit: type=1105 audit(1747442211.979:1546): pid=5286 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:51.982000 audit[5288]: CRED_ACQ pid=5288 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:52.053401 kernel: audit: type=1103 audit(1747442211.982:1547): pid=5288 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:52.323474 sshd[5286]: pam_unix(sshd:session): session closed for user core May 17 00:36:52.323000 audit[5286]: USER_END pid=5286 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:52.340209 systemd[1]: sshd@23-10.128.0.24:22-139.178.89.65:38624.service: Deactivated successfully. May 17 00:36:52.342574 systemd[1]: session-24.scope: Deactivated successfully. May 17 00:36:52.344176 systemd-logind[1221]: Session 24 logged out. Waiting for processes to exit. May 17 00:36:52.346425 systemd-logind[1221]: Removed session 24. May 17 00:36:52.360493 kernel: audit: type=1106 audit(1747442212.323:1548): pid=5286 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:52.323000 audit[5286]: CRED_DISP pid=5286 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:52.339000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.128.0.24:22-139.178.89.65:38624 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:52.385589 kernel: audit: type=1104 audit(1747442212.323:1549): pid=5286 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:36:53.354966 systemd[1]: run-containerd-runc-k8s.io-aafd819f18ab642d11159955ae004c151c3b617b0e508441e4969562b1e4f02e-runc.veqDG2.mount: Deactivated successfully. May 17 00:36:53.610098 env[1212]: time="2025-05-17T00:36:53.609951472Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\"" May 17 00:36:53.851568 env[1212]: time="2025-05-17T00:36:53.851486676Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:36:53.853282 env[1212]: time="2025-05-17T00:36:53.853199227Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:36:53.854559 kubelet[2012]: E0517 00:36:53.853766 2012 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:36:53.854559 kubelet[2012]: E0517 00:36:53.853836 2012 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:36:53.854559 kubelet[2012]: E0517 00:36:53.854006 2012 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.0,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:dc356148a25040b2be34d2920fa2f436,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-xhw88,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-7ffdff5fc8-9slj8_calico-system(3dcc79a4-50c4-40e3-9eb9-e25e3953688a): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:36:53.856841 env[1212]: time="2025-05-17T00:36:53.856800650Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\"" May 17 00:36:53.977356 env[1212]: time="2025-05-17T00:36:53.977189632Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:36:53.979258 env[1212]: time="2025-05-17T00:36:53.979185162Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:36:53.979778 kubelet[2012]: E0517 00:36:53.979723 2012 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:36:53.979917 kubelet[2012]: E0517 00:36:53.979795 2012 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:36:53.980012 kubelet[2012]: E0517 00:36:53.979950 2012 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-xhw88,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-7ffdff5fc8-9slj8_calico-system(3dcc79a4-50c4-40e3-9eb9-e25e3953688a): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:36:53.981644 kubelet[2012]: E0517 00:36:53.981576 2012 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-7ffdff5fc8-9slj8" podUID="3dcc79a4-50c4-40e3-9eb9-e25e3953688a" May 17 00:36:55.244060 systemd[1]: run-containerd-runc-k8s.io-86937f2fa6aea780273f5e3ebb4de50aad612e8544bc0cd4da674142b77a9c46-runc.YypGj6.mount: Deactivated successfully.