May 17 00:28:53.408876 kernel: Linux version 5.15.182-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri May 16 23:09:52 -00 2025 May 17 00:28:53.408924 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=4aad7caeadb0359f379975532748a0b4ae6bb9b229507353e0f5ae84cb9335a0 May 17 00:28:53.408948 kernel: BIOS-provided physical RAM map: May 17 00:28:53.408966 kernel: BIOS-e820: [mem 0x0000000000000000-0x0000000000000fff] reserved May 17 00:28:53.408983 kernel: BIOS-e820: [mem 0x0000000000001000-0x0000000000054fff] usable May 17 00:28:53.409000 kernel: BIOS-e820: [mem 0x0000000000055000-0x000000000005ffff] reserved May 17 00:28:53.409024 kernel: BIOS-e820: [mem 0x0000000000060000-0x0000000000097fff] usable May 17 00:28:53.409038 kernel: BIOS-e820: [mem 0x0000000000098000-0x000000000009ffff] reserved May 17 00:28:53.409053 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bd277fff] usable May 17 00:28:53.409067 kernel: BIOS-e820: [mem 0x00000000bd278000-0x00000000bd281fff] ACPI data May 17 00:28:53.409081 kernel: BIOS-e820: [mem 0x00000000bd282000-0x00000000bf8ecfff] usable May 17 00:28:53.409095 kernel: BIOS-e820: [mem 0x00000000bf8ed000-0x00000000bfb6cfff] reserved May 17 00:28:53.409110 kernel: BIOS-e820: [mem 0x00000000bfb6d000-0x00000000bfb7efff] ACPI data May 17 00:28:53.409127 kernel: BIOS-e820: [mem 0x00000000bfb7f000-0x00000000bfbfefff] ACPI NVS May 17 00:28:53.409148 kernel: BIOS-e820: [mem 0x00000000bfbff000-0x00000000bffdffff] usable May 17 00:28:53.409164 kernel: BIOS-e820: [mem 0x00000000bffe0000-0x00000000bfffffff] reserved May 17 00:28:53.409180 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000021fffffff] usable May 17 00:28:53.409196 kernel: NX (Execute Disable) protection: active May 17 00:28:53.409212 kernel: efi: EFI v2.70 by EDK II May 17 00:28:53.409229 kernel: efi: TPMFinalLog=0xbfbf7000 ACPI=0xbfb7e000 ACPI 2.0=0xbfb7e014 SMBIOS=0xbf9e8000 RNG=0xbfb73018 TPMEventLog=0xbd278018 May 17 00:28:53.409245 kernel: random: crng init done May 17 00:28:53.409260 kernel: SMBIOS 2.4 present. May 17 00:28:53.409280 kernel: DMI: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 May 17 00:28:53.409296 kernel: Hypervisor detected: KVM May 17 00:28:53.409311 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 May 17 00:28:53.409327 kernel: kvm-clock: cpu 0, msr 19419a001, primary cpu clock May 17 00:28:53.409353 kernel: kvm-clock: using sched offset of 14262830804 cycles May 17 00:28:53.409370 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns May 17 00:28:53.409387 kernel: tsc: Detected 2299.998 MHz processor May 17 00:28:53.409403 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved May 17 00:28:53.409421 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable May 17 00:28:53.409438 kernel: last_pfn = 0x220000 max_arch_pfn = 0x400000000 May 17 00:28:53.409459 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 17 00:28:53.409475 kernel: last_pfn = 0xbffe0 max_arch_pfn = 0x400000000 May 17 00:28:53.409491 kernel: Using GB pages for direct mapping May 17 00:28:53.409508 kernel: Secure boot disabled May 17 00:28:53.409525 kernel: ACPI: Early table checksum verification disabled May 17 00:28:53.409541 kernel: ACPI: RSDP 0x00000000BFB7E014 000024 (v02 Google) May 17 00:28:53.409558 kernel: ACPI: XSDT 0x00000000BFB7D0E8 00005C (v01 Google GOOGFACP 00000001 01000013) May 17 00:28:53.409575 kernel: ACPI: FACP 0x00000000BFB78000 0000F4 (v02 Google GOOGFACP 00000001 GOOG 00000001) May 17 00:28:53.409602 kernel: ACPI: DSDT 0x00000000BFB79000 001A64 (v01 Google GOOGDSDT 00000001 GOOG 00000001) May 17 00:28:53.409619 kernel: ACPI: FACS 0x00000000BFBF2000 000040 May 17 00:28:53.409637 kernel: ACPI: SSDT 0x00000000BFB7C000 000316 (v02 GOOGLE Tpm2Tabl 00001000 INTL 20240322) May 17 00:28:53.409655 kernel: ACPI: TPM2 0x00000000BFB7B000 000034 (v04 GOOGLE 00000001 GOOG 00000001) May 17 00:28:53.409673 kernel: ACPI: SRAT 0x00000000BFB77000 0000C8 (v03 Google GOOGSRAT 00000001 GOOG 00000001) May 17 00:28:53.409729 kernel: ACPI: APIC 0x00000000BFB76000 000076 (v05 Google GOOGAPIC 00000001 GOOG 00000001) May 17 00:28:53.409753 kernel: ACPI: SSDT 0x00000000BFB75000 000980 (v01 Google GOOGSSDT 00000001 GOOG 00000001) May 17 00:28:53.409770 kernel: ACPI: WAET 0x00000000BFB74000 000028 (v01 Google GOOGWAET 00000001 GOOG 00000001) May 17 00:28:53.409792 kernel: ACPI: Reserving FACP table memory at [mem 0xbfb78000-0xbfb780f3] May 17 00:28:53.409812 kernel: ACPI: Reserving DSDT table memory at [mem 0xbfb79000-0xbfb7aa63] May 17 00:28:53.409831 kernel: ACPI: Reserving FACS table memory at [mem 0xbfbf2000-0xbfbf203f] May 17 00:28:53.409850 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb7c000-0xbfb7c315] May 17 00:28:53.409873 kernel: ACPI: Reserving TPM2 table memory at [mem 0xbfb7b000-0xbfb7b033] May 17 00:28:53.409897 kernel: ACPI: Reserving SRAT table memory at [mem 0xbfb77000-0xbfb770c7] May 17 00:28:53.409919 kernel: ACPI: Reserving APIC table memory at [mem 0xbfb76000-0xbfb76075] May 17 00:28:53.409943 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb75000-0xbfb7597f] May 17 00:28:53.409963 kernel: ACPI: Reserving WAET table memory at [mem 0xbfb74000-0xbfb74027] May 17 00:28:53.409984 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 May 17 00:28:53.410005 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 May 17 00:28:53.410026 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] May 17 00:28:53.410048 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0xbfffffff] May 17 00:28:53.410069 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x21fffffff] May 17 00:28:53.410092 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0xbfffffff] -> [mem 0x00000000-0xbfffffff] May 17 00:28:53.410112 kernel: NUMA: Node 0 [mem 0x00000000-0xbfffffff] + [mem 0x100000000-0x21fffffff] -> [mem 0x00000000-0x21fffffff] May 17 00:28:53.410138 kernel: NODE_DATA(0) allocated [mem 0x21fffa000-0x21fffffff] May 17 00:28:53.410162 kernel: Zone ranges: May 17 00:28:53.410185 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 17 00:28:53.410208 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] May 17 00:28:53.410229 kernel: Normal [mem 0x0000000100000000-0x000000021fffffff] May 17 00:28:53.410251 kernel: Movable zone start for each node May 17 00:28:53.410272 kernel: Early memory node ranges May 17 00:28:53.410293 kernel: node 0: [mem 0x0000000000001000-0x0000000000054fff] May 17 00:28:53.410314 kernel: node 0: [mem 0x0000000000060000-0x0000000000097fff] May 17 00:28:53.410345 kernel: node 0: [mem 0x0000000000100000-0x00000000bd277fff] May 17 00:28:53.410366 kernel: node 0: [mem 0x00000000bd282000-0x00000000bf8ecfff] May 17 00:28:53.410387 kernel: node 0: [mem 0x00000000bfbff000-0x00000000bffdffff] May 17 00:28:53.410409 kernel: node 0: [mem 0x0000000100000000-0x000000021fffffff] May 17 00:28:53.410430 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000021fffffff] May 17 00:28:53.410447 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 17 00:28:53.410471 kernel: On node 0, zone DMA: 11 pages in unavailable ranges May 17 00:28:53.410493 kernel: On node 0, zone DMA: 104 pages in unavailable ranges May 17 00:28:53.410514 kernel: On node 0, zone DMA32: 10 pages in unavailable ranges May 17 00:28:53.410541 kernel: On node 0, zone DMA32: 786 pages in unavailable ranges May 17 00:28:53.410564 kernel: On node 0, zone Normal: 32 pages in unavailable ranges May 17 00:28:53.410585 kernel: ACPI: PM-Timer IO Port: 0xb008 May 17 00:28:53.410605 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) May 17 00:28:53.410626 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 May 17 00:28:53.410647 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) May 17 00:28:53.410671 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) May 17 00:28:53.410709 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) May 17 00:28:53.410730 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) May 17 00:28:53.410752 kernel: ACPI: Using ACPI (MADT) for SMP configuration information May 17 00:28:53.410772 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs May 17 00:28:53.410790 kernel: [mem 0xc0000000-0xffffffff] available for PCI devices May 17 00:28:53.410813 kernel: Booting paravirtualized kernel on KVM May 17 00:28:53.410835 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 17 00:28:53.410855 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 May 17 00:28:53.410873 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 May 17 00:28:53.410892 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 May 17 00:28:53.410910 kernel: pcpu-alloc: [0] 0 1 May 17 00:28:53.410934 kernel: kvm-guest: PV spinlocks enabled May 17 00:28:53.410958 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) May 17 00:28:53.410978 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1932270 May 17 00:28:53.411002 kernel: Policy zone: Normal May 17 00:28:53.411024 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=4aad7caeadb0359f379975532748a0b4ae6bb9b229507353e0f5ae84cb9335a0 May 17 00:28:53.411045 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 17 00:28:53.411065 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) May 17 00:28:53.411087 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) May 17 00:28:53.411110 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 17 00:28:53.411137 kernel: Memory: 7515412K/7860544K available (12294K kernel code, 2276K rwdata, 13724K rodata, 47472K init, 4108K bss, 344872K reserved, 0K cma-reserved) May 17 00:28:53.411161 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 May 17 00:28:53.411185 kernel: Kernel/User page tables isolation: enabled May 17 00:28:53.411206 kernel: ftrace: allocating 34585 entries in 136 pages May 17 00:28:53.411228 kernel: ftrace: allocated 136 pages with 2 groups May 17 00:28:53.411249 kernel: rcu: Hierarchical RCU implementation. May 17 00:28:53.411275 kernel: rcu: RCU event tracing is enabled. May 17 00:28:53.411298 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. May 17 00:28:53.411326 kernel: Rude variant of Tasks RCU enabled. May 17 00:28:53.411378 kernel: Tracing variant of Tasks RCU enabled. May 17 00:28:53.411401 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 17 00:28:53.411430 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 May 17 00:28:53.411457 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 May 17 00:28:53.411482 kernel: Console: colour dummy device 80x25 May 17 00:28:53.411501 kernel: printk: console [ttyS0] enabled May 17 00:28:53.411523 kernel: ACPI: Core revision 20210730 May 17 00:28:53.411544 kernel: APIC: Switch to symmetric I/O mode setup May 17 00:28:53.411565 kernel: x2apic enabled May 17 00:28:53.411591 kernel: Switched APIC routing to physical x2apic. May 17 00:28:53.411614 kernel: ..TIMER: vector=0x30 apic1=0 pin1=0 apic2=-1 pin2=-1 May 17 00:28:53.411635 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns May 17 00:28:53.411659 kernel: Calibrating delay loop (skipped) preset value.. 4599.99 BogoMIPS (lpj=2299998) May 17 00:28:53.411680 kernel: Last level iTLB entries: 4KB 1024, 2MB 1024, 4MB 1024 May 17 00:28:53.411715 kernel: Last level dTLB entries: 4KB 1024, 2MB 1024, 4MB 1024, 1GB 4 May 17 00:28:53.411737 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization May 17 00:28:53.411766 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit May 17 00:28:53.411789 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall May 17 00:28:53.411813 kernel: Spectre V2 : Mitigation: IBRS May 17 00:28:53.411836 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT May 17 00:28:53.411872 kernel: RETBleed: Mitigation: IBRS May 17 00:28:53.411891 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier May 17 00:28:53.411910 kernel: Spectre V2 : User space: Mitigation: STIBP via seccomp and prctl May 17 00:28:53.411929 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp May 17 00:28:53.411948 kernel: MDS: Mitigation: Clear CPU buffers May 17 00:28:53.411971 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode May 17 00:28:53.411990 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' May 17 00:28:53.412009 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' May 17 00:28:53.412027 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' May 17 00:28:53.412046 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 May 17 00:28:53.412065 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. May 17 00:28:53.412084 kernel: Freeing SMP alternatives memory: 32K May 17 00:28:53.412105 kernel: pid_max: default: 32768 minimum: 301 May 17 00:28:53.412124 kernel: LSM: Security Framework initializing May 17 00:28:53.412146 kernel: SELinux: Initializing. May 17 00:28:53.412165 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) May 17 00:28:53.412184 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) May 17 00:28:53.412203 kernel: smpboot: CPU0: Intel(R) Xeon(R) CPU @ 2.30GHz (family: 0x6, model: 0x3f, stepping: 0x0) May 17 00:28:53.412222 kernel: Performance Events: unsupported p6 CPU model 63 no PMU driver, software events only. May 17 00:28:53.412241 kernel: signal: max sigframe size: 1776 May 17 00:28:53.412260 kernel: rcu: Hierarchical SRCU implementation. May 17 00:28:53.412279 kernel: NMI watchdog: Perf NMI watchdog permanently disabled May 17 00:28:53.412297 kernel: smp: Bringing up secondary CPUs ... May 17 00:28:53.412320 kernel: x86: Booting SMP configuration: May 17 00:28:53.412347 kernel: .... node #0, CPUs: #1 May 17 00:28:53.412367 kernel: kvm-clock: cpu 1, msr 19419a041, secondary cpu clock May 17 00:28:53.412387 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. May 17 00:28:53.412407 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. May 17 00:28:53.412426 kernel: smp: Brought up 1 node, 2 CPUs May 17 00:28:53.412445 kernel: smpboot: Max logical packages: 1 May 17 00:28:53.412464 kernel: smpboot: Total of 2 processors activated (9199.99 BogoMIPS) May 17 00:28:53.412487 kernel: devtmpfs: initialized May 17 00:28:53.412506 kernel: x86/mm: Memory block size: 128MB May 17 00:28:53.412525 kernel: ACPI: PM: Registering ACPI NVS region [mem 0xbfb7f000-0xbfbfefff] (524288 bytes) May 17 00:28:53.412544 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 17 00:28:53.412563 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) May 17 00:28:53.412583 kernel: pinctrl core: initialized pinctrl subsystem May 17 00:28:53.412602 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 17 00:28:53.412621 kernel: audit: initializing netlink subsys (disabled) May 17 00:28:53.412641 kernel: audit: type=2000 audit(1747441731.201:1): state=initialized audit_enabled=0 res=1 May 17 00:28:53.412663 kernel: thermal_sys: Registered thermal governor 'step_wise' May 17 00:28:53.412682 kernel: thermal_sys: Registered thermal governor 'user_space' May 17 00:28:53.412723 kernel: cpuidle: using governor menu May 17 00:28:53.412742 kernel: ACPI: bus type PCI registered May 17 00:28:53.412761 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 17 00:28:53.412781 kernel: dca service started, version 1.12.1 May 17 00:28:53.412799 kernel: PCI: Using configuration type 1 for base access May 17 00:28:53.412819 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. May 17 00:28:53.412837 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 17 00:28:53.412860 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 17 00:28:53.412879 kernel: ACPI: Added _OSI(Module Device) May 17 00:28:53.412900 kernel: ACPI: Added _OSI(Processor Device) May 17 00:28:53.412920 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 17 00:28:53.412938 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 17 00:28:53.412958 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 17 00:28:53.412977 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 17 00:28:53.412997 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 17 00:28:53.413015 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded May 17 00:28:53.413038 kernel: ACPI: Interpreter enabled May 17 00:28:53.413057 kernel: ACPI: PM: (supports S0 S3 S5) May 17 00:28:53.413075 kernel: ACPI: Using IOAPIC for interrupt routing May 17 00:28:53.413095 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 17 00:28:53.413119 kernel: ACPI: Enabled 16 GPEs in block 00 to 0F May 17 00:28:53.413142 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 17 00:28:53.413428 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] May 17 00:28:53.413624 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. May 17 00:28:53.413655 kernel: PCI host bridge to bus 0000:00 May 17 00:28:53.413863 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] May 17 00:28:53.414038 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] May 17 00:28:53.414208 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] May 17 00:28:53.414382 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfefff window] May 17 00:28:53.414553 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 17 00:28:53.414777 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 May 17 00:28:53.414987 kernel: pci 0000:00:01.0: [8086:7110] type 00 class 0x060100 May 17 00:28:53.415191 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 May 17 00:28:53.415392 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI May 17 00:28:53.415591 kernel: pci 0000:00:03.0: [1af4:1004] type 00 class 0x000000 May 17 00:28:53.415819 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc040-0xc07f] May 17 00:28:53.416018 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc0001000-0xc000107f] May 17 00:28:53.416231 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 May 17 00:28:53.416465 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc03f] May 17 00:28:53.416687 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc0000000-0xc000007f] May 17 00:28:53.416937 kernel: pci 0000:00:05.0: [1af4:1005] type 00 class 0x00ff00 May 17 00:28:53.425379 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc080-0xc09f] May 17 00:28:53.425664 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xc0002000-0xc000203f] May 17 00:28:53.425716 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 May 17 00:28:53.425746 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 May 17 00:28:53.425767 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 May 17 00:28:53.425787 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 May 17 00:28:53.425806 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 May 17 00:28:53.425826 kernel: iommu: Default domain type: Translated May 17 00:28:53.425846 kernel: iommu: DMA domain TLB invalidation policy: lazy mode May 17 00:28:53.425866 kernel: vgaarb: loaded May 17 00:28:53.425887 kernel: pps_core: LinuxPPS API ver. 1 registered May 17 00:28:53.425914 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 17 00:28:53.425944 kernel: PTP clock support registered May 17 00:28:53.425963 kernel: Registered efivars operations May 17 00:28:53.425982 kernel: PCI: Using ACPI for IRQ routing May 17 00:28:53.426001 kernel: PCI: pci_cache_line_size set to 64 bytes May 17 00:28:53.426020 kernel: e820: reserve RAM buffer [mem 0x00055000-0x0005ffff] May 17 00:28:53.426040 kernel: e820: reserve RAM buffer [mem 0x00098000-0x0009ffff] May 17 00:28:53.426060 kernel: e820: reserve RAM buffer [mem 0xbd278000-0xbfffffff] May 17 00:28:53.426086 kernel: e820: reserve RAM buffer [mem 0xbf8ed000-0xbfffffff] May 17 00:28:53.426105 kernel: e820: reserve RAM buffer [mem 0xbffe0000-0xbfffffff] May 17 00:28:53.426128 kernel: clocksource: Switched to clocksource kvm-clock May 17 00:28:53.426147 kernel: VFS: Disk quotas dquot_6.6.0 May 17 00:28:53.426167 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 17 00:28:53.426186 kernel: pnp: PnP ACPI init May 17 00:28:53.426212 kernel: pnp: PnP ACPI: found 7 devices May 17 00:28:53.426233 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 17 00:28:53.426252 kernel: NET: Registered PF_INET protocol family May 17 00:28:53.426271 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) May 17 00:28:53.426291 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) May 17 00:28:53.426315 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 17 00:28:53.426335 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) May 17 00:28:53.426354 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) May 17 00:28:53.426373 kernel: TCP: Hash tables configured (established 65536 bind 65536) May 17 00:28:53.426393 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) May 17 00:28:53.426419 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) May 17 00:28:53.426444 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 17 00:28:53.426469 kernel: NET: Registered PF_XDP protocol family May 17 00:28:53.426817 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] May 17 00:28:53.427011 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] May 17 00:28:53.427192 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] May 17 00:28:53.427367 kernel: pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfefff window] May 17 00:28:53.427579 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers May 17 00:28:53.427620 kernel: PCI: CLS 0 bytes, default 64 May 17 00:28:53.427641 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) May 17 00:28:53.427667 kernel: software IO TLB: mapped [mem 0x00000000b7f7f000-0x00000000bbf7f000] (64MB) May 17 00:28:53.427711 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer May 17 00:28:53.427738 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns May 17 00:28:53.427757 kernel: clocksource: Switched to clocksource tsc May 17 00:28:53.427782 kernel: Initialise system trusted keyrings May 17 00:28:53.427802 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 May 17 00:28:53.427822 kernel: Key type asymmetric registered May 17 00:28:53.427847 kernel: Asymmetric key parser 'x509' registered May 17 00:28:53.427867 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 17 00:28:53.427893 kernel: io scheduler mq-deadline registered May 17 00:28:53.427913 kernel: io scheduler kyber registered May 17 00:28:53.427933 kernel: io scheduler bfq registered May 17 00:28:53.427953 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 May 17 00:28:53.427974 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 May 17 00:28:53.428183 kernel: virtio-pci 0000:00:03.0: virtio_pci: leaving for legacy driver May 17 00:28:53.428218 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 10 May 17 00:28:53.428491 kernel: virtio-pci 0000:00:04.0: virtio_pci: leaving for legacy driver May 17 00:28:53.428525 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 May 17 00:28:53.428809 kernel: virtio-pci 0000:00:05.0: virtio_pci: leaving for legacy driver May 17 00:28:53.428836 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 17 00:28:53.428858 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 17 00:28:53.428877 kernel: 00:04: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A May 17 00:28:53.428897 kernel: 00:05: ttyS2 at I/O 0x3e8 (irq = 6, base_baud = 115200) is a 16550A May 17 00:28:53.428916 kernel: 00:06: ttyS3 at I/O 0x2e8 (irq = 7, base_baud = 115200) is a 16550A May 17 00:28:53.429117 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x9009, rev-id 0) May 17 00:28:53.429144 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 May 17 00:28:53.429168 kernel: i8042: Warning: Keylock active May 17 00:28:53.429187 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 May 17 00:28:53.429208 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 May 17 00:28:53.429421 kernel: rtc_cmos 00:00: RTC can wake from S4 May 17 00:28:53.429609 kernel: rtc_cmos 00:00: registered as rtc0 May 17 00:28:53.429807 kernel: rtc_cmos 00:00: setting system clock to 2025-05-17T00:28:52 UTC (1747441732) May 17 00:28:53.430009 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram May 17 00:28:53.430034 kernel: intel_pstate: CPU model not supported May 17 00:28:53.430068 kernel: pstore: Registered efi as persistent store backend May 17 00:28:53.430091 kernel: NET: Registered PF_INET6 protocol family May 17 00:28:53.430110 kernel: Segment Routing with IPv6 May 17 00:28:53.430136 kernel: In-situ OAM (IOAM) with IPv6 May 17 00:28:53.430156 kernel: NET: Registered PF_PACKET protocol family May 17 00:28:53.430175 kernel: Key type dns_resolver registered May 17 00:28:53.430195 kernel: IPI shorthand broadcast: enabled May 17 00:28:53.430215 kernel: sched_clock: Marking stable (888375698, 183988334)->(1230740310, -158376278) May 17 00:28:53.430234 kernel: registered taskstats version 1 May 17 00:28:53.430258 kernel: Loading compiled-in X.509 certificates May 17 00:28:53.430277 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 May 17 00:28:53.430298 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.182-flatcar: 01ca23caa8e5879327538f9287e5164b3e97ac0c' May 17 00:28:53.430323 kernel: Key type .fscrypt registered May 17 00:28:53.430347 kernel: Key type fscrypt-provisioning registered May 17 00:28:53.430373 kernel: pstore: Using crash dump compression: deflate May 17 00:28:53.430392 kernel: ima: Allocated hash algorithm: sha1 May 17 00:28:53.430416 kernel: ima: No architecture policies found May 17 00:28:53.430435 kernel: clk: Disabling unused clocks May 17 00:28:53.430461 kernel: Freeing unused kernel image (initmem) memory: 47472K May 17 00:28:53.430484 kernel: Write protecting the kernel read-only data: 28672k May 17 00:28:53.430508 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K May 17 00:28:53.430533 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K May 17 00:28:53.430552 kernel: Run /init as init process May 17 00:28:53.430580 kernel: with arguments: May 17 00:28:53.430608 kernel: /init May 17 00:28:53.430627 kernel: with environment: May 17 00:28:53.430646 kernel: HOME=/ May 17 00:28:53.430669 kernel: TERM=linux May 17 00:28:53.430749 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 17 00:28:53.430775 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 17 00:28:53.430801 systemd[1]: Detected virtualization kvm. May 17 00:28:53.430827 systemd[1]: Detected architecture x86-64. May 17 00:28:53.430846 systemd[1]: Running in initrd. May 17 00:28:53.430867 systemd[1]: No hostname configured, using default hostname. May 17 00:28:53.430892 systemd[1]: Hostname set to . May 17 00:28:53.430913 systemd[1]: Initializing machine ID from VM UUID. May 17 00:28:53.430933 systemd[1]: Queued start job for default target initrd.target. May 17 00:28:53.430955 systemd[1]: Started systemd-ask-password-console.path. May 17 00:28:53.430981 systemd[1]: Reached target cryptsetup.target. May 17 00:28:53.431001 systemd[1]: Reached target paths.target. May 17 00:28:53.431021 systemd[1]: Reached target slices.target. May 17 00:28:53.431042 systemd[1]: Reached target swap.target. May 17 00:28:53.431072 systemd[1]: Reached target timers.target. May 17 00:28:53.431093 systemd[1]: Listening on iscsid.socket. May 17 00:28:53.431113 systemd[1]: Listening on iscsiuio.socket. May 17 00:28:53.431133 systemd[1]: Listening on systemd-journald-audit.socket. May 17 00:28:53.431155 systemd[1]: Listening on systemd-journald-dev-log.socket. May 17 00:28:53.431177 systemd[1]: Listening on systemd-journald.socket. May 17 00:28:53.431198 systemd[1]: Listening on systemd-networkd.socket. May 17 00:28:53.431218 systemd[1]: Listening on systemd-udevd-control.socket. May 17 00:28:53.431247 systemd[1]: Listening on systemd-udevd-kernel.socket. May 17 00:28:53.431274 systemd[1]: Reached target sockets.target. May 17 00:28:53.431344 systemd[1]: Starting kmod-static-nodes.service... May 17 00:28:53.431389 systemd[1]: Finished network-cleanup.service. May 17 00:28:53.431422 systemd[1]: Starting systemd-fsck-usr.service... May 17 00:28:53.431450 systemd[1]: Starting systemd-journald.service... May 17 00:28:53.431482 systemd[1]: Starting systemd-modules-load.service... May 17 00:28:53.431509 kernel: audit: type=1334 audit(1747441733.415:2): prog-id=6 op=LOAD May 17 00:28:53.431542 systemd-journald[190]: Journal started May 17 00:28:53.431670 systemd-journald[190]: Runtime Journal (/run/log/journal/7360031ed80b924b84524fc8587065ee) is 8.0M, max 148.8M, 140.8M free. May 17 00:28:53.415000 audit: BPF prog-id=6 op=LOAD May 17 00:28:53.446725 systemd[1]: Starting systemd-resolved.service... May 17 00:28:53.439535 systemd-modules-load[191]: Inserted module 'overlay' May 17 00:28:53.470716 systemd[1]: Starting systemd-vconsole-setup.service... May 17 00:28:53.498623 systemd-resolved[192]: Positive Trust Anchors: May 17 00:28:53.536541 systemd[1]: Started systemd-journald.service. May 17 00:28:53.536587 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 17 00:28:53.498971 systemd-resolved[192]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 17 00:28:53.704988 kernel: Bridge firewalling registered May 17 00:28:53.705050 kernel: audit: type=1130 audit(1747441733.547:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:28:53.705083 kernel: SCSI subsystem initialized May 17 00:28:53.705110 kernel: audit: type=1130 audit(1747441733.581:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:28:53.705138 kernel: audit: type=1130 audit(1747441733.611:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:28:53.705233 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 17 00:28:53.705279 kernel: device-mapper: uevent: version 1.0.3 May 17 00:28:53.705306 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 17 00:28:53.705347 kernel: audit: type=1130 audit(1747441733.669:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:28:53.547000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:28:53.581000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:28:53.611000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:28:53.669000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:28:53.499096 systemd-resolved[192]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 17 00:28:53.781912 kernel: audit: type=1130 audit(1747441733.712:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:28:53.712000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:28:53.506005 systemd-resolved[192]: Defaulting to hostname 'linux'. May 17 00:28:53.818900 kernel: audit: type=1130 audit(1747441733.788:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:28:53.788000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:28:53.543751 systemd-modules-load[191]: Inserted module 'br_netfilter' May 17 00:28:53.549491 systemd[1]: Started systemd-resolved.service. May 17 00:28:53.583239 systemd[1]: Finished kmod-static-nodes.service. May 17 00:28:53.613283 systemd[1]: Finished systemd-fsck-usr.service. May 17 00:28:53.671311 systemd[1]: Finished systemd-vconsole-setup.service. May 17 00:28:53.693516 systemd-modules-load[191]: Inserted module 'dm_multipath' May 17 00:28:53.714584 systemd[1]: Finished systemd-modules-load.service. May 17 00:28:53.790461 systemd[1]: Reached target nss-lookup.target. May 17 00:28:53.829184 systemd[1]: Starting dracut-cmdline-ask.service... May 17 00:28:53.837795 systemd[1]: Starting systemd-sysctl.service... May 17 00:28:53.839458 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 17 00:28:53.857000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:28:53.859175 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 17 00:28:53.882946 kernel: audit: type=1130 audit(1747441733.857:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:28:53.884942 systemd[1]: Finished systemd-sysctl.service. May 17 00:28:53.903000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:28:53.905417 systemd[1]: Finished dracut-cmdline-ask.service. May 17 00:28:53.942088 kernel: audit: type=1130 audit(1747441733.903:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:28:53.924000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:28:53.928125 systemd[1]: Starting dracut-cmdline.service... May 17 00:28:53.956871 dracut-cmdline[210]: dracut-dracut-053 May 17 00:28:53.956871 dracut-cmdline[210]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA May 17 00:28:53.956871 dracut-cmdline[210]: BEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=4aad7caeadb0359f379975532748a0b4ae6bb9b229507353e0f5ae84cb9335a0 May 17 00:28:54.045737 kernel: Loading iSCSI transport class v2.0-870. May 17 00:28:54.071750 kernel: iscsi: registered transport (tcp) May 17 00:28:54.110751 kernel: iscsi: registered transport (qla4xxx) May 17 00:28:54.110847 kernel: QLogic iSCSI HBA Driver May 17 00:28:54.164465 systemd[1]: Finished dracut-cmdline.service. May 17 00:28:54.163000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:28:54.166406 systemd[1]: Starting dracut-pre-udev.service... May 17 00:28:54.233781 kernel: raid6: avx2x4 gen() 16797 MB/s May 17 00:28:54.254779 kernel: raid6: avx2x4 xor() 7224 MB/s May 17 00:28:54.275780 kernel: raid6: avx2x2 gen() 16549 MB/s May 17 00:28:54.296777 kernel: raid6: avx2x2 xor() 17638 MB/s May 17 00:28:54.317773 kernel: raid6: avx2x1 gen() 13346 MB/s May 17 00:28:54.338775 kernel: raid6: avx2x1 xor() 15279 MB/s May 17 00:28:54.359774 kernel: raid6: sse2x4 gen() 10763 MB/s May 17 00:28:54.380769 kernel: raid6: sse2x4 xor() 6076 MB/s May 17 00:28:54.401773 kernel: raid6: sse2x2 gen() 11673 MB/s May 17 00:28:54.422791 kernel: raid6: sse2x2 xor() 7286 MB/s May 17 00:28:54.443735 kernel: raid6: sse2x1 gen() 10248 MB/s May 17 00:28:54.470035 kernel: raid6: sse2x1 xor() 5111 MB/s May 17 00:28:54.470137 kernel: raid6: using algorithm avx2x4 gen() 16797 MB/s May 17 00:28:54.470183 kernel: raid6: .... xor() 7224 MB/s, rmw enabled May 17 00:28:54.475266 kernel: raid6: using avx2x2 recovery algorithm May 17 00:28:54.506769 kernel: xor: automatically using best checksumming function avx May 17 00:28:54.635741 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no May 17 00:28:54.649022 systemd[1]: Finished dracut-pre-udev.service. May 17 00:28:54.647000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:28:54.648000 audit: BPF prog-id=7 op=LOAD May 17 00:28:54.648000 audit: BPF prog-id=8 op=LOAD May 17 00:28:54.650617 systemd[1]: Starting systemd-udevd.service... May 17 00:28:54.670313 systemd-udevd[387]: Using default interface naming scheme 'v252'. May 17 00:28:54.679423 systemd[1]: Started systemd-udevd.service. May 17 00:28:54.703000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:28:54.706398 systemd[1]: Starting dracut-pre-trigger.service... May 17 00:28:54.723985 dracut-pre-trigger[392]: rd.md=0: removing MD RAID activation May 17 00:28:54.764745 systemd[1]: Finished dracut-pre-trigger.service. May 17 00:28:54.763000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:28:54.766189 systemd[1]: Starting systemd-udev-trigger.service... May 17 00:28:54.851794 systemd[1]: Finished systemd-udev-trigger.service. May 17 00:28:54.859000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:28:54.950721 kernel: cryptd: max_cpu_qlen set to 1000 May 17 00:28:55.010740 kernel: AVX2 version of gcm_enc/dec engaged. May 17 00:28:55.023179 kernel: scsi host0: Virtio SCSI HBA May 17 00:28:55.023326 kernel: AES CTR mode by8 optimization enabled May 17 00:28:55.076768 kernel: scsi 0:0:1:0: Direct-Access Google PersistentDisk 1 PQ: 0 ANSI: 6 May 17 00:28:55.171537 kernel: sd 0:0:1:0: [sda] 25165824 512-byte logical blocks: (12.9 GB/12.0 GiB) May 17 00:28:55.236787 kernel: sd 0:0:1:0: [sda] 4096-byte physical blocks May 17 00:28:55.237094 kernel: sd 0:0:1:0: [sda] Write Protect is off May 17 00:28:55.237385 kernel: sd 0:0:1:0: [sda] Mode Sense: 1f 00 00 08 May 17 00:28:55.237653 kernel: sd 0:0:1:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA May 17 00:28:55.237958 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 17 00:28:55.237992 kernel: GPT:17805311 != 25165823 May 17 00:28:55.238024 kernel: GPT:Alternate GPT header not at the end of the disk. May 17 00:28:55.238052 kernel: GPT:17805311 != 25165823 May 17 00:28:55.238081 kernel: GPT: Use GNU Parted to correct GPT errors. May 17 00:28:55.238109 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 17 00:28:55.238139 kernel: sd 0:0:1:0: [sda] Attached SCSI disk May 17 00:28:55.305909 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 17 00:28:55.334640 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 17 00:28:55.334991 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 17 00:28:55.385112 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 17 00:28:55.395895 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/sda6 scanned by (udev-worker) (436) May 17 00:28:55.414926 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 17 00:28:55.425236 systemd[1]: Starting disk-uuid.service... May 17 00:28:55.447046 disk-uuid[506]: Primary Header is updated. May 17 00:28:55.447046 disk-uuid[506]: Secondary Entries is updated. May 17 00:28:55.447046 disk-uuid[506]: Secondary Header is updated. May 17 00:28:55.473834 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 17 00:28:55.492761 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 17 00:28:55.524740 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 17 00:28:56.511627 disk-uuid[507]: The operation has completed successfully. May 17 00:28:56.520866 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 17 00:28:56.583763 systemd[1]: disk-uuid.service: Deactivated successfully. May 17 00:28:56.589000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:28:56.589000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:28:56.583932 systemd[1]: Finished disk-uuid.service. May 17 00:28:56.611399 systemd[1]: Starting verity-setup.service... May 17 00:28:56.641745 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" May 17 00:28:56.731263 systemd[1]: Found device dev-mapper-usr.device. May 17 00:28:56.734408 systemd[1]: Mounting sysusr-usr.mount... May 17 00:28:56.745470 systemd[1]: Finished verity-setup.service. May 17 00:28:56.771000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:28:56.852750 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 17 00:28:56.852886 systemd[1]: Mounted sysusr-usr.mount. May 17 00:28:56.853335 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 17 00:28:56.905905 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm May 17 00:28:56.905948 kernel: BTRFS info (device sda6): using free space tree May 17 00:28:56.905980 kernel: BTRFS info (device sda6): has skinny extents May 17 00:28:56.854407 systemd[1]: Starting ignition-setup.service... May 17 00:28:56.867525 systemd[1]: Starting parse-ip-for-networkd.service... May 17 00:28:56.984618 systemd[1]: Finished parse-ip-for-networkd.service. May 17 00:28:57.038001 kernel: kauditd_printk_skb: 11 callbacks suppressed May 17 00:28:57.038064 kernel: audit: type=1130 audit(1747441736.991:22): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:28:57.038096 kernel: audit: type=1334 audit(1747441737.020:23): prog-id=9 op=LOAD May 17 00:28:57.038128 kernel: BTRFS info (device sda6): enabling ssd optimizations May 17 00:28:56.991000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:28:57.020000 audit: BPF prog-id=9 op=LOAD May 17 00:28:57.023048 systemd[1]: Starting systemd-networkd.service... May 17 00:28:57.060653 systemd[1]: mnt-oem.mount: Deactivated successfully. May 17 00:28:57.073408 systemd-networkd[672]: lo: Link UP May 17 00:28:57.073432 systemd-networkd[672]: lo: Gained carrier May 17 00:28:57.074839 systemd-networkd[672]: Enumeration completed May 17 00:28:57.121108 kernel: audit: type=1130 audit(1747441737.085:24): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:28:57.085000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:28:57.075000 systemd[1]: Started systemd-networkd.service. May 17 00:28:57.157963 kernel: audit: type=1130 audit(1747441737.128:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:28:57.128000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:28:57.075664 systemd-networkd[672]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 17 00:28:57.078808 systemd-networkd[672]: eth0: Link UP May 17 00:28:57.078816 systemd-networkd[672]: eth0: Gained carrier May 17 00:28:57.087705 systemd[1]: Finished ignition-setup.service. May 17 00:28:57.240166 kernel: audit: type=1130 audit(1747441737.211:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:28:57.211000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:28:57.109873 systemd-networkd[672]: eth0: Overlong DHCP hostname received, shortened from 'ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7.c.flatcar-212911.internal' to 'ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7' May 17 00:28:57.269920 iscsid[686]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 17 00:28:57.269920 iscsid[686]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log May 17 00:28:57.269920 iscsid[686]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 17 00:28:57.269920 iscsid[686]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 17 00:28:57.269920 iscsid[686]: If using hardware iscsi like qla4xxx this message can be ignored. May 17 00:28:57.269920 iscsid[686]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 17 00:28:57.269920 iscsid[686]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 17 00:28:57.463918 kernel: audit: type=1130 audit(1747441737.275:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:28:57.463982 kernel: audit: type=1130 audit(1747441737.341:28): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:28:57.275000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:28:57.341000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:28:57.109891 systemd-networkd[672]: eth0: DHCPv4 address 10.128.0.54/32, gateway 10.128.0.1 acquired from 169.254.169.254 May 17 00:28:57.510941 kernel: audit: type=1130 audit(1747441737.471:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:28:57.471000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:28:57.130133 systemd[1]: Reached target network.target. May 17 00:28:57.168260 systemd[1]: Starting ignition-fetch-offline.service... May 17 00:28:57.180320 systemd[1]: Starting iscsiuio.service... May 17 00:28:57.200424 systemd[1]: Started iscsiuio.service. May 17 00:28:57.214799 systemd[1]: Starting iscsid.service... May 17 00:28:57.247132 systemd[1]: Started iscsid.service. May 17 00:28:57.279557 systemd[1]: Starting dracut-initqueue.service... May 17 00:28:57.310390 systemd[1]: Finished dracut-initqueue.service. May 17 00:28:57.343378 systemd[1]: Reached target remote-fs-pre.target. May 17 00:28:57.395236 systemd[1]: Reached target remote-cryptsetup.target. May 17 00:28:57.427899 systemd[1]: Reached target remote-fs.target. May 17 00:28:57.429799 systemd[1]: Starting dracut-pre-mount.service... May 17 00:28:57.447454 systemd[1]: Finished dracut-pre-mount.service. May 17 00:28:57.667110 ignition[682]: Ignition 2.14.0 May 17 00:28:57.667136 ignition[682]: Stage: fetch-offline May 17 00:28:57.667243 ignition[682]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:28:57.667325 ignition[682]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 May 17 00:28:57.691183 ignition[682]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" May 17 00:28:57.691407 ignition[682]: parsed url from cmdline: "" May 17 00:28:57.693009 systemd[1]: Finished ignition-fetch-offline.service. May 17 00:28:57.739901 kernel: audit: type=1130 audit(1747441737.709:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:28:57.709000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:28:57.691416 ignition[682]: no config URL provided May 17 00:28:57.712796 systemd[1]: Starting ignition-fetch.service... May 17 00:28:57.691428 ignition[682]: reading system config file "/usr/lib/ignition/user.ign" May 17 00:28:57.691441 ignition[682]: no config at "/usr/lib/ignition/user.ign" May 17 00:28:57.756287 unknown[705]: fetched base config from "system" May 17 00:28:57.818880 kernel: audit: type=1130 audit(1747441737.787:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:28:57.787000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:28:57.691451 ignition[682]: failed to fetch config: resource requires networking May 17 00:28:57.756312 unknown[705]: fetched base config from "system" May 17 00:28:57.691625 ignition[682]: Ignition finished successfully May 17 00:28:57.756321 unknown[705]: fetched user config from "gcp" May 17 00:28:57.730425 ignition[705]: Ignition 2.14.0 May 17 00:28:57.862000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:28:57.772440 systemd[1]: Finished ignition-fetch.service. May 17 00:28:57.730438 ignition[705]: Stage: fetch May 17 00:28:57.790956 systemd[1]: Starting ignition-kargs.service... May 17 00:28:57.897000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:28:57.730652 ignition[705]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:28:57.844455 systemd[1]: Finished ignition-kargs.service. May 17 00:28:57.730724 ignition[705]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 May 17 00:28:57.865671 systemd[1]: Starting ignition-disks.service... May 17 00:28:57.739915 ignition[705]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" May 17 00:28:57.889676 systemd[1]: Finished ignition-disks.service. May 17 00:28:57.740437 ignition[705]: parsed url from cmdline: "" May 17 00:28:57.899167 systemd[1]: Reached target initrd-root-device.target. May 17 00:28:57.740446 ignition[705]: no config URL provided May 17 00:28:57.914946 systemd[1]: Reached target local-fs-pre.target. May 17 00:28:57.740462 ignition[705]: reading system config file "/usr/lib/ignition/user.ign" May 17 00:28:57.915098 systemd[1]: Reached target local-fs.target. May 17 00:28:57.740477 ignition[705]: no config at "/usr/lib/ignition/user.ign" May 17 00:28:57.940910 systemd[1]: Reached target sysinit.target. May 17 00:28:57.740517 ignition[705]: GET http://169.254.169.254/computeMetadata/v1/instance/attributes/user-data: attempt #1 May 17 00:28:57.953910 systemd[1]: Reached target basic.target. May 17 00:28:57.748454 ignition[705]: GET result: OK May 17 00:28:57.968368 systemd[1]: Starting systemd-fsck-root.service... May 17 00:28:57.748656 ignition[705]: parsing config with SHA512: c2297cd72cde5b701b7d913ed65443e95e69d0ecfbb7cb4d7770f7f09e87fdd4bb95a288eff682f8af816afcbdc42e946fc66684215c2ca028bb29af3a8d258c May 17 00:28:57.758061 ignition[705]: fetch: fetch complete May 17 00:28:57.758069 ignition[705]: fetch: fetch passed May 17 00:28:57.758127 ignition[705]: Ignition finished successfully May 17 00:28:57.826345 ignition[711]: Ignition 2.14.0 May 17 00:28:57.826358 ignition[711]: Stage: kargs May 17 00:28:57.826499 ignition[711]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:28:57.826533 ignition[711]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 May 17 00:28:57.835589 ignition[711]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" May 17 00:28:57.836976 ignition[711]: kargs: kargs passed May 17 00:28:57.837218 ignition[711]: Ignition finished successfully May 17 00:28:57.877955 ignition[717]: Ignition 2.14.0 May 17 00:28:57.877968 ignition[717]: Stage: disks May 17 00:28:57.878214 ignition[717]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:28:57.878463 ignition[717]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 May 17 00:28:57.886992 ignition[717]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" May 17 00:28:57.888427 ignition[717]: disks: disks passed May 17 00:28:57.888483 ignition[717]: Ignition finished successfully May 17 00:28:58.017009 systemd-fsck[725]: ROOT: clean, 619/1628000 files, 124060/1617920 blocks May 17 00:28:58.154859 systemd[1]: Finished systemd-fsck-root.service. May 17 00:28:58.167000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:28:58.170231 systemd[1]: Mounting sysroot.mount... May 17 00:28:58.203734 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 17 00:28:58.204490 systemd[1]: Mounted sysroot.mount. May 17 00:28:58.212119 systemd[1]: Reached target initrd-root-fs.target. May 17 00:28:58.229549 systemd[1]: Mounting sysroot-usr.mount... May 17 00:28:58.243544 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 17 00:28:58.243605 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 17 00:28:58.243642 systemd[1]: Reached target ignition-diskful.target. May 17 00:28:58.331132 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (731) May 17 00:28:58.331182 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm May 17 00:28:58.331221 kernel: BTRFS info (device sda6): using free space tree May 17 00:28:58.331251 kernel: BTRFS info (device sda6): has skinny extents May 17 00:28:58.251685 systemd[1]: Mounted sysroot-usr.mount. May 17 00:28:58.285028 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 17 00:28:58.358903 kernel: BTRFS info (device sda6): enabling ssd optimizations May 17 00:28:58.358954 initrd-setup-root[736]: cut: /sysroot/etc/passwd: No such file or directory May 17 00:28:58.303596 systemd[1]: Starting initrd-setup-root.service... May 17 00:28:58.376943 initrd-setup-root[760]: cut: /sysroot/etc/group: No such file or directory May 17 00:28:58.369165 systemd-networkd[672]: eth0: Gained IPv6LL May 17 00:28:58.400889 initrd-setup-root[770]: cut: /sysroot/etc/shadow: No such file or directory May 17 00:28:58.397314 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 17 00:28:58.429884 initrd-setup-root[778]: cut: /sysroot/etc/gshadow: No such file or directory May 17 00:28:58.455519 systemd[1]: Finished initrd-setup-root.service. May 17 00:28:58.454000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:28:58.456926 systemd[1]: Starting ignition-mount.service... May 17 00:28:58.479332 systemd[1]: Starting sysroot-boot.service... May 17 00:28:58.494261 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. May 17 00:28:58.494390 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. May 17 00:28:58.519885 ignition[796]: INFO : Ignition 2.14.0 May 17 00:28:58.519885 ignition[796]: INFO : Stage: mount May 17 00:28:58.519885 ignition[796]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:28:58.519885 ignition[796]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 May 17 00:28:58.533000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:28:58.550000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:28:58.532078 systemd[1]: Finished sysroot-boot.service. May 17 00:28:58.595922 ignition[796]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" May 17 00:28:58.595922 ignition[796]: INFO : mount: mount passed May 17 00:28:58.595922 ignition[796]: INFO : Ignition finished successfully May 17 00:28:58.661072 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sda6 scanned by mount (807) May 17 00:28:58.661128 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm May 17 00:28:58.661149 kernel: BTRFS info (device sda6): using free space tree May 17 00:28:58.661166 kernel: BTRFS info (device sda6): has skinny extents May 17 00:28:58.661183 kernel: BTRFS info (device sda6): enabling ssd optimizations May 17 00:28:58.535447 systemd[1]: Finished ignition-mount.service. May 17 00:28:58.553512 systemd[1]: Starting ignition-files.service... May 17 00:28:58.591839 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 17 00:28:58.693901 ignition[826]: INFO : Ignition 2.14.0 May 17 00:28:58.693901 ignition[826]: INFO : Stage: files May 17 00:28:58.693901 ignition[826]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:28:58.693901 ignition[826]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 May 17 00:28:58.657627 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 17 00:28:58.748902 ignition[826]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" May 17 00:28:58.748902 ignition[826]: DEBUG : files: compiled without relabeling support, skipping May 17 00:28:58.748902 ignition[826]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 17 00:28:58.748902 ignition[826]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 17 00:28:58.748902 ignition[826]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 17 00:28:58.748902 ignition[826]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 17 00:28:58.748902 ignition[826]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 17 00:28:58.748902 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/hosts" May 17 00:28:58.748902 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(3): oem config not found in "/usr/share/oem", looking on oem partition May 17 00:28:58.748902 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2491515707" May 17 00:28:58.748902 ignition[826]: CRITICAL : files: createFilesystemsFiles: createFiles: op(3): op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2491515707": device or resource busy May 17 00:28:58.748902 ignition[826]: ERROR : files: createFilesystemsFiles: createFiles: op(3): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2491515707", trying btrfs: device or resource busy May 17 00:28:58.748902 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2491515707" May 17 00:28:58.748902 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2491515707" May 17 00:28:58.748902 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(6): [started] unmounting "/mnt/oem2491515707" May 17 00:28:58.748902 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(6): [finished] unmounting "/mnt/oem2491515707" May 17 00:28:58.748902 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/hosts" May 17 00:28:58.748902 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/helm-v3.17.3-linux-amd64.tar.gz" May 17 00:28:58.718010 unknown[826]: wrote ssh authorized keys file for user: core May 17 00:28:59.023882 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://get.helm.sh/helm-v3.17.3-linux-amd64.tar.gz: attempt #1 May 17 00:28:59.023882 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK May 17 00:28:59.144682 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/helm-v3.17.3-linux-amd64.tar.gz" May 17 00:28:59.162906 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" May 17 00:28:59.162906 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(8): oem config not found in "/usr/share/oem", looking on oem partition May 17 00:28:59.162906 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(9): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4123230585" May 17 00:28:59.162906 ignition[826]: CRITICAL : files: createFilesystemsFiles: createFiles: op(8): op(9): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4123230585": device or resource busy May 17 00:28:59.162906 ignition[826]: ERROR : files: createFilesystemsFiles: createFiles: op(8): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem4123230585", trying btrfs: device or resource busy May 17 00:28:59.162906 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4123230585" May 17 00:28:59.162906 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(a): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4123230585" May 17 00:28:59.162906 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(b): [started] unmounting "/mnt/oem4123230585" May 17 00:28:59.162906 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(b): [finished] unmounting "/mnt/oem4123230585" May 17 00:28:59.162906 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" May 17 00:28:59.162906 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/install.sh" May 17 00:28:59.162906 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/install.sh" May 17 00:28:59.162906 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nginx.yaml" May 17 00:28:59.162906 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nginx.yaml" May 17 00:28:59.162906 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/home/core/nfs-pod.yaml" May 17 00:28:59.416936 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" May 17 00:28:59.416936 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" May 17 00:28:59.416936 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" May 17 00:28:59.416936 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(10): [started] writing file "/sysroot/etc/flatcar/update.conf" May 17 00:28:59.416936 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(10): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 17 00:28:59.416936 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(11): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" May 17 00:28:59.416936 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(11): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" May 17 00:28:59.416936 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(12): [started] writing file "/sysroot/etc/systemd/system/oem-gce.service" May 17 00:28:59.416936 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(12): oem config not found in "/usr/share/oem", looking on oem partition May 17 00:28:59.416936 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(13): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4131502119" May 17 00:28:59.416936 ignition[826]: CRITICAL : files: createFilesystemsFiles: createFiles: op(12): op(13): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4131502119": device or resource busy May 17 00:28:59.416936 ignition[826]: ERROR : files: createFilesystemsFiles: createFiles: op(12): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem4131502119", trying btrfs: device or resource busy May 17 00:28:59.416936 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(14): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4131502119" May 17 00:28:59.416936 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(14): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4131502119" May 17 00:28:59.665887 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(15): [started] unmounting "/mnt/oem4131502119" May 17 00:28:59.665887 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(15): [finished] unmounting "/mnt/oem4131502119" May 17 00:28:59.665887 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(12): [finished] writing file "/sysroot/etc/systemd/system/oem-gce.service" May 17 00:28:59.665887 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(16): [started] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" May 17 00:28:59.665887 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(16): oem config not found in "/usr/share/oem", looking on oem partition May 17 00:28:59.665887 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(16): op(17): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3641001893" May 17 00:28:59.665887 ignition[826]: CRITICAL : files: createFilesystemsFiles: createFiles: op(16): op(17): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3641001893": device or resource busy May 17 00:28:59.665887 ignition[826]: ERROR : files: createFilesystemsFiles: createFiles: op(16): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3641001893", trying btrfs: device or resource busy May 17 00:28:59.665887 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(16): op(18): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3641001893" May 17 00:28:59.665887 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(16): op(18): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3641001893" May 17 00:28:59.665887 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(16): op(19): [started] unmounting "/mnt/oem3641001893" May 17 00:28:59.665887 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(16): op(19): [finished] unmounting "/mnt/oem3641001893" May 17 00:28:59.665887 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(16): [finished] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" May 17 00:28:59.665887 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(1a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" May 17 00:28:59.912904 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(1a): GET https://extensions.flatcar.org/extensions/kubernetes-v1.33.0-x86-64.raw: attempt #1 May 17 00:28:59.912904 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(1a): GET result: OK May 17 00:29:00.307501 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(1a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" May 17 00:29:00.307501 ignition[826]: INFO : files: op(1b): [started] processing unit "coreos-metadata-sshkeys@.service" May 17 00:29:00.307501 ignition[826]: INFO : files: op(1b): [finished] processing unit "coreos-metadata-sshkeys@.service" May 17 00:29:00.307501 ignition[826]: INFO : files: op(1c): [started] processing unit "oem-gce.service" May 17 00:29:00.307501 ignition[826]: INFO : files: op(1c): [finished] processing unit "oem-gce.service" May 17 00:29:00.307501 ignition[826]: INFO : files: op(1d): [started] processing unit "oem-gce-enable-oslogin.service" May 17 00:29:00.333000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:00.397000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:00.316338 systemd[1]: Finished ignition-files.service. May 17 00:29:00.426000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:00.426000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:00.435160 ignition[826]: INFO : files: op(1d): [finished] processing unit "oem-gce-enable-oslogin.service" May 17 00:29:00.435160 ignition[826]: INFO : files: op(1e): [started] processing unit "prepare-helm.service" May 17 00:29:00.435160 ignition[826]: INFO : files: op(1e): op(1f): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 17 00:29:00.435160 ignition[826]: INFO : files: op(1e): op(1f): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 17 00:29:00.435160 ignition[826]: INFO : files: op(1e): [finished] processing unit "prepare-helm.service" May 17 00:29:00.435160 ignition[826]: INFO : files: op(20): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " May 17 00:29:00.435160 ignition[826]: INFO : files: op(20): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " May 17 00:29:00.435160 ignition[826]: INFO : files: op(21): [started] setting preset to enabled for "oem-gce.service" May 17 00:29:00.435160 ignition[826]: INFO : files: op(21): [finished] setting preset to enabled for "oem-gce.service" May 17 00:29:00.435160 ignition[826]: INFO : files: op(22): [started] setting preset to enabled for "oem-gce-enable-oslogin.service" May 17 00:29:00.435160 ignition[826]: INFO : files: op(22): [finished] setting preset to enabled for "oem-gce-enable-oslogin.service" May 17 00:29:00.435160 ignition[826]: INFO : files: op(23): [started] setting preset to enabled for "prepare-helm.service" May 17 00:29:00.435160 ignition[826]: INFO : files: op(23): [finished] setting preset to enabled for "prepare-helm.service" May 17 00:29:00.435160 ignition[826]: INFO : files: createResultFile: createFiles: op(24): [started] writing file "/sysroot/etc/.ignition-result.json" May 17 00:29:00.435160 ignition[826]: INFO : files: createResultFile: createFiles: op(24): [finished] writing file "/sysroot/etc/.ignition-result.json" May 17 00:29:00.435160 ignition[826]: INFO : files: files passed May 17 00:29:00.435160 ignition[826]: INFO : Ignition finished successfully May 17 00:29:00.492000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:00.492000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:00.585000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:00.728000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:00.342152 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 17 00:29:00.362148 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 17 00:29:00.795089 initrd-setup-root-after-ignition[849]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 17 00:29:00.363595 systemd[1]: Starting ignition-quench.service... May 17 00:29:00.381512 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 17 00:29:00.399573 systemd[1]: ignition-quench.service: Deactivated successfully. May 17 00:29:00.399725 systemd[1]: Finished ignition-quench.service. May 17 00:29:00.428341 systemd[1]: Reached target ignition-complete.target. May 17 00:29:00.445564 systemd[1]: Starting initrd-parse-etc.service... May 17 00:29:00.481947 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 17 00:29:00.482102 systemd[1]: Finished initrd-parse-etc.service. May 17 00:29:00.934000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:00.494481 systemd[1]: Reached target initrd-fs.target. May 17 00:29:00.517168 systemd[1]: Reached target initrd.target. May 17 00:29:00.964000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:00.534280 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 17 00:29:00.989000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:00.535841 systemd[1]: Starting dracut-pre-pivot.service... May 17 00:29:01.009000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:00.562329 systemd[1]: Finished dracut-pre-pivot.service. May 17 00:29:01.025885 ignition[864]: INFO : Ignition 2.14.0 May 17 00:29:01.025885 ignition[864]: INFO : Stage: umount May 17 00:29:01.025885 ignition[864]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:29:01.025885 ignition[864]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 May 17 00:29:01.065000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:00.588598 systemd[1]: Starting initrd-cleanup.service... May 17 00:29:01.100932 ignition[864]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" May 17 00:29:01.100932 ignition[864]: INFO : umount: umount passed May 17 00:29:01.100932 ignition[864]: INFO : Ignition finished successfully May 17 00:29:01.120000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:01.137000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:00.628939 systemd[1]: Stopped target nss-lookup.target. May 17 00:29:01.154000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:00.632367 systemd[1]: Stopped target remote-cryptsetup.target. May 17 00:29:01.168000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:00.674387 systemd[1]: Stopped target timers.target. May 17 00:29:01.186000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:00.687311 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 17 00:29:01.203000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:00.687519 systemd[1]: Stopped dracut-pre-pivot.service. May 17 00:29:01.224000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:00.730487 systemd[1]: Stopped target initrd.target. May 17 00:29:00.737314 systemd[1]: Stopped target basic.target. May 17 00:29:01.256000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:00.758282 systemd[1]: Stopped target ignition-complete.target. May 17 00:29:00.776306 systemd[1]: Stopped target ignition-diskful.target. May 17 00:29:00.804313 systemd[1]: Stopped target initrd-root-device.target. May 17 00:29:00.828318 systemd[1]: Stopped target remote-fs.target. May 17 00:29:00.844272 systemd[1]: Stopped target remote-fs-pre.target. May 17 00:29:00.862289 systemd[1]: Stopped target sysinit.target. May 17 00:29:01.357000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:00.879426 systemd[1]: Stopped target local-fs.target. May 17 00:29:01.372000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:00.895242 systemd[1]: Stopped target local-fs-pre.target. May 17 00:29:00.912335 systemd[1]: Stopped target swap.target. May 17 00:29:00.928198 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 17 00:29:00.928426 systemd[1]: Stopped dracut-pre-mount.service. May 17 00:29:01.424000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:00.936413 systemd[1]: Stopped target cryptsetup.target. May 17 00:29:01.439000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:00.959236 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 17 00:29:01.454000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:01.454000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:01.454000 audit: BPF prog-id=6 op=UNLOAD May 17 00:29:00.959591 systemd[1]: Stopped dracut-initqueue.service. May 17 00:29:00.966399 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 17 00:29:00.966598 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 17 00:29:00.991387 systemd[1]: ignition-files.service: Deactivated successfully. May 17 00:29:01.512000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:00.991588 systemd[1]: Stopped ignition-files.service. May 17 00:29:01.530000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:01.013008 systemd[1]: Stopping ignition-mount.service... May 17 00:29:01.546000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:01.047947 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 17 00:29:01.048270 systemd[1]: Stopped kmod-static-nodes.service. May 17 00:29:01.068668 systemd[1]: Stopping sysroot-boot.service... May 17 00:29:01.094082 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 17 00:29:01.594000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:01.094379 systemd[1]: Stopped systemd-udev-trigger.service. May 17 00:29:01.122301 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 17 00:29:01.122652 systemd[1]: Stopped dracut-pre-trigger.service. May 17 00:29:01.650000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:01.143748 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 17 00:29:01.667000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:01.145108 systemd[1]: ignition-mount.service: Deactivated successfully. May 17 00:29:01.684000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:01.145236 systemd[1]: Stopped ignition-mount.service. May 17 00:29:01.156720 systemd[1]: sysroot-boot.service: Deactivated successfully. May 17 00:29:01.156866 systemd[1]: Stopped sysroot-boot.service. May 17 00:29:01.727000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:01.171024 systemd[1]: ignition-disks.service: Deactivated successfully. May 17 00:29:01.743000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:01.171226 systemd[1]: Stopped ignition-disks.service. May 17 00:29:01.761000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:01.761000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:01.188178 systemd[1]: ignition-kargs.service: Deactivated successfully. May 17 00:29:01.188257 systemd[1]: Stopped ignition-kargs.service. May 17 00:29:01.205235 systemd[1]: ignition-fetch.service: Deactivated successfully. May 17 00:29:01.205310 systemd[1]: Stopped ignition-fetch.service. May 17 00:29:01.226246 systemd[1]: Stopped target network.target. May 17 00:29:01.241925 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 17 00:29:01.841975 systemd-journald[190]: Received SIGTERM from PID 1 (n/a). May 17 00:29:01.242084 systemd[1]: Stopped ignition-fetch-offline.service. May 17 00:29:01.851131 iscsid[686]: iscsid shutting down. May 17 00:29:01.258070 systemd[1]: Stopped target paths.target. May 17 00:29:01.270973 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 17 00:29:01.274942 systemd[1]: Stopped systemd-ask-password-console.path. May 17 00:29:01.289985 systemd[1]: Stopped target slices.target. May 17 00:29:01.305037 systemd[1]: Stopped target sockets.target. May 17 00:29:01.305309 systemd[1]: iscsid.socket: Deactivated successfully. May 17 00:29:01.305359 systemd[1]: Closed iscsid.socket. May 17 00:29:01.326987 systemd[1]: iscsiuio.socket: Deactivated successfully. May 17 00:29:01.327062 systemd[1]: Closed iscsiuio.socket. May 17 00:29:01.340946 systemd[1]: ignition-setup.service: Deactivated successfully. May 17 00:29:01.341065 systemd[1]: Stopped ignition-setup.service. May 17 00:29:01.359021 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 17 00:29:01.359111 systemd[1]: Stopped initrd-setup-root.service. May 17 00:29:01.374256 systemd[1]: Stopping systemd-networkd.service... May 17 00:29:01.377800 systemd-networkd[672]: eth0: DHCPv6 lease lost May 17 00:29:01.388202 systemd[1]: Stopping systemd-resolved.service... May 17 00:29:01.403593 systemd[1]: systemd-resolved.service: Deactivated successfully. May 17 00:29:01.403759 systemd[1]: Stopped systemd-resolved.service. May 17 00:29:01.426854 systemd[1]: systemd-networkd.service: Deactivated successfully. May 17 00:29:01.427015 systemd[1]: Stopped systemd-networkd.service. May 17 00:29:01.441754 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 17 00:29:01.441882 systemd[1]: Finished initrd-cleanup.service. May 17 00:29:01.457241 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 17 00:29:01.457293 systemd[1]: Closed systemd-networkd.socket. May 17 00:29:01.474139 systemd[1]: Stopping network-cleanup.service... May 17 00:29:01.495888 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 17 00:29:01.496161 systemd[1]: Stopped parse-ip-for-networkd.service. May 17 00:29:01.514203 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 17 00:29:01.514281 systemd[1]: Stopped systemd-sysctl.service. May 17 00:29:01.532256 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 17 00:29:01.532331 systemd[1]: Stopped systemd-modules-load.service. May 17 00:29:01.548303 systemd[1]: Stopping systemd-udevd.service... May 17 00:29:01.568097 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 17 00:29:01.569006 systemd[1]: systemd-udevd.service: Deactivated successfully. May 17 00:29:01.569194 systemd[1]: Stopped systemd-udevd.service. May 17 00:29:01.598077 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 17 00:29:01.598184 systemd[1]: Closed systemd-udevd-control.socket. May 17 00:29:01.615134 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 17 00:29:01.615217 systemd[1]: Closed systemd-udevd-kernel.socket. May 17 00:29:01.633001 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 17 00:29:01.633158 systemd[1]: Stopped dracut-pre-udev.service. May 17 00:29:01.652135 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 17 00:29:01.652221 systemd[1]: Stopped dracut-cmdline.service. May 17 00:29:01.669066 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 17 00:29:01.669158 systemd[1]: Stopped dracut-cmdline-ask.service. May 17 00:29:01.687411 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 17 00:29:01.712922 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 17 00:29:01.713085 systemd[1]: Stopped systemd-vconsole-setup.service. May 17 00:29:01.729852 systemd[1]: network-cleanup.service: Deactivated successfully. May 17 00:29:01.730016 systemd[1]: Stopped network-cleanup.service. May 17 00:29:01.745400 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 17 00:29:01.745530 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 17 00:29:01.763385 systemd[1]: Reached target initrd-switch-root.target. May 17 00:29:01.779424 systemd[1]: Starting initrd-switch-root.service... May 17 00:29:01.809050 systemd[1]: Switching root. May 17 00:29:01.861482 systemd-journald[190]: Journal stopped May 17 00:29:07.090876 kernel: SELinux: Class mctp_socket not defined in policy. May 17 00:29:07.090999 kernel: SELinux: Class anon_inode not defined in policy. May 17 00:29:07.091040 kernel: SELinux: the above unknown classes and permissions will be allowed May 17 00:29:07.091077 kernel: SELinux: policy capability network_peer_controls=1 May 17 00:29:07.091110 kernel: SELinux: policy capability open_perms=1 May 17 00:29:07.091143 kernel: SELinux: policy capability extended_socket_class=1 May 17 00:29:07.091177 kernel: SELinux: policy capability always_check_network=0 May 17 00:29:07.091211 kernel: SELinux: policy capability cgroup_seclabel=1 May 17 00:29:07.091243 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 17 00:29:07.091280 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 17 00:29:07.091312 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 17 00:29:07.091346 kernel: kauditd_printk_skb: 46 callbacks suppressed May 17 00:29:07.091390 kernel: audit: type=1403 audit(1747441742.208:78): auid=4294967295 ses=4294967295 lsm=selinux res=1 May 17 00:29:07.091434 systemd[1]: Successfully loaded SELinux policy in 121.883ms. May 17 00:29:07.091465 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 11.706ms. May 17 00:29:07.091484 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 17 00:29:07.091502 systemd[1]: Detected virtualization kvm. May 17 00:29:07.091520 systemd[1]: Detected architecture x86-64. May 17 00:29:07.091541 systemd[1]: Detected first boot. May 17 00:29:07.091558 systemd[1]: Initializing machine ID from VM UUID. May 17 00:29:07.091576 kernel: audit: type=1400 audit(1747441742.460:79): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 17 00:29:07.091598 kernel: audit: type=1400 audit(1747441742.460:80): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 17 00:29:07.091615 kernel: audit: type=1334 audit(1747441742.481:81): prog-id=10 op=LOAD May 17 00:29:07.091632 kernel: audit: type=1334 audit(1747441742.481:82): prog-id=10 op=UNLOAD May 17 00:29:07.091648 kernel: audit: type=1334 audit(1747441742.501:83): prog-id=11 op=LOAD May 17 00:29:07.091672 kernel: audit: type=1334 audit(1747441742.501:84): prog-id=11 op=UNLOAD May 17 00:29:07.091761 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 17 00:29:07.091795 kernel: audit: type=1400 audit(1747441742.687:85): avc: denied { associate } for pid=897 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 17 00:29:07.091825 kernel: audit: type=1300 audit(1747441742.687:85): arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8a2 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=880 pid=897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:29:07.091853 kernel: audit: type=1327 audit(1747441742.687:85): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 17 00:29:07.091880 systemd[1]: Populated /etc with preset unit settings. May 17 00:29:07.091910 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:29:07.091938 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:29:07.091974 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:29:07.092009 systemd[1]: iscsiuio.service: Deactivated successfully. May 17 00:29:07.092035 systemd[1]: Stopped iscsiuio.service. May 17 00:29:07.092059 systemd[1]: iscsid.service: Deactivated successfully. May 17 00:29:07.092084 systemd[1]: Stopped iscsid.service. May 17 00:29:07.092109 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 17 00:29:07.092136 systemd[1]: Stopped initrd-switch-root.service. May 17 00:29:07.092162 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 17 00:29:07.092187 systemd[1]: Created slice system-addon\x2dconfig.slice. May 17 00:29:07.092214 systemd[1]: Created slice system-addon\x2drun.slice. May 17 00:29:07.092248 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. May 17 00:29:07.092280 systemd[1]: Created slice system-getty.slice. May 17 00:29:07.092314 systemd[1]: Created slice system-modprobe.slice. May 17 00:29:07.092350 systemd[1]: Created slice system-serial\x2dgetty.slice. May 17 00:29:07.092391 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 17 00:29:07.092438 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 17 00:29:07.092471 systemd[1]: Created slice user.slice. May 17 00:29:07.092508 systemd[1]: Started systemd-ask-password-console.path. May 17 00:29:07.092538 systemd[1]: Started systemd-ask-password-wall.path. May 17 00:29:07.092573 systemd[1]: Set up automount boot.automount. May 17 00:29:07.092606 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 17 00:29:07.092641 systemd[1]: Stopped target initrd-switch-root.target. May 17 00:29:07.092674 systemd[1]: Stopped target initrd-fs.target. May 17 00:29:07.092734 systemd[1]: Stopped target initrd-root-fs.target. May 17 00:29:07.092770 systemd[1]: Reached target integritysetup.target. May 17 00:29:07.092807 systemd[1]: Reached target remote-cryptsetup.target. May 17 00:29:07.092847 systemd[1]: Reached target remote-fs.target. May 17 00:29:07.092880 systemd[1]: Reached target slices.target. May 17 00:29:07.092914 systemd[1]: Reached target swap.target. May 17 00:29:07.092943 systemd[1]: Reached target torcx.target. May 17 00:29:07.092976 systemd[1]: Reached target veritysetup.target. May 17 00:29:07.093009 systemd[1]: Listening on systemd-coredump.socket. May 17 00:29:07.093045 systemd[1]: Listening on systemd-initctl.socket. May 17 00:29:07.093071 systemd[1]: Listening on systemd-networkd.socket. May 17 00:29:07.093095 systemd[1]: Listening on systemd-udevd-control.socket. May 17 00:29:07.093122 systemd[1]: Listening on systemd-udevd-kernel.socket. May 17 00:29:07.093157 systemd[1]: Listening on systemd-userdbd.socket. May 17 00:29:07.093191 systemd[1]: Mounting dev-hugepages.mount... May 17 00:29:07.093219 systemd[1]: Mounting dev-mqueue.mount... May 17 00:29:07.093255 systemd[1]: Mounting media.mount... May 17 00:29:07.093293 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:29:07.093328 systemd[1]: Mounting sys-kernel-debug.mount... May 17 00:29:07.093367 systemd[1]: Mounting sys-kernel-tracing.mount... May 17 00:29:07.093402 systemd[1]: Mounting tmp.mount... May 17 00:29:07.093450 systemd[1]: Starting flatcar-tmpfiles.service... May 17 00:29:07.093486 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:29:07.093520 systemd[1]: Starting kmod-static-nodes.service... May 17 00:29:07.093560 systemd[1]: Starting modprobe@configfs.service... May 17 00:29:07.093595 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:29:07.093629 systemd[1]: Starting modprobe@drm.service... May 17 00:29:07.093658 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:29:07.093709 systemd[1]: Starting modprobe@fuse.service... May 17 00:29:07.094773 systemd[1]: Starting modprobe@loop.service... May 17 00:29:07.094815 kernel: fuse: init (API version 7.34) May 17 00:29:07.094851 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 17 00:29:07.094884 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 17 00:29:07.094915 kernel: loop: module loaded May 17 00:29:07.094946 systemd[1]: Stopped systemd-fsck-root.service. May 17 00:29:07.094978 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 17 00:29:07.095009 systemd[1]: Stopped systemd-fsck-usr.service. May 17 00:29:07.095050 systemd[1]: Stopped systemd-journald.service. May 17 00:29:07.095081 systemd[1]: Starting systemd-journald.service... May 17 00:29:07.095114 systemd[1]: Starting systemd-modules-load.service... May 17 00:29:07.095146 systemd[1]: Starting systemd-network-generator.service... May 17 00:29:07.095176 systemd[1]: Starting systemd-remount-fs.service... May 17 00:29:07.095216 systemd-journald[988]: Journal started May 17 00:29:07.095331 systemd-journald[988]: Runtime Journal (/run/log/journal/7360031ed80b924b84524fc8587065ee) is 8.0M, max 148.8M, 140.8M free. May 17 00:29:01.860000 audit: BPF prog-id=9 op=UNLOAD May 17 00:29:02.208000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 17 00:29:02.460000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 17 00:29:02.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 17 00:29:02.481000 audit: BPF prog-id=10 op=LOAD May 17 00:29:02.481000 audit: BPF prog-id=10 op=UNLOAD May 17 00:29:02.501000 audit: BPF prog-id=11 op=LOAD May 17 00:29:02.501000 audit: BPF prog-id=11 op=UNLOAD May 17 00:29:02.687000 audit[897]: AVC avc: denied { associate } for pid=897 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 17 00:29:02.687000 audit[897]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8a2 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=880 pid=897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:29:02.687000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 17 00:29:02.698000 audit[897]: AVC avc: denied { associate } for pid=897 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 17 00:29:02.698000 audit[897]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d979 a2=1ed a3=0 items=2 ppid=880 pid=897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:29:02.698000 audit: CWD cwd="/" May 17 00:29:02.698000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:02.698000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:02.698000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 17 00:29:06.192000 audit: BPF prog-id=12 op=LOAD May 17 00:29:06.192000 audit: BPF prog-id=3 op=UNLOAD May 17 00:29:06.192000 audit: BPF prog-id=13 op=LOAD May 17 00:29:06.192000 audit: BPF prog-id=14 op=LOAD May 17 00:29:06.192000 audit: BPF prog-id=4 op=UNLOAD May 17 00:29:06.192000 audit: BPF prog-id=5 op=UNLOAD May 17 00:29:06.194000 audit: BPF prog-id=15 op=LOAD May 17 00:29:06.194000 audit: BPF prog-id=12 op=UNLOAD May 17 00:29:06.194000 audit: BPF prog-id=16 op=LOAD May 17 00:29:06.195000 audit: BPF prog-id=17 op=LOAD May 17 00:29:06.195000 audit: BPF prog-id=13 op=UNLOAD May 17 00:29:06.195000 audit: BPF prog-id=14 op=UNLOAD May 17 00:29:06.197000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:06.205000 audit: BPF prog-id=15 op=UNLOAD May 17 00:29:06.218000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:06.237000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:06.260000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:06.260000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:07.003000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:07.025000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:07.039000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:07.039000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:07.040000 audit: BPF prog-id=18 op=LOAD May 17 00:29:07.040000 audit: BPF prog-id=19 op=LOAD May 17 00:29:07.040000 audit: BPF prog-id=20 op=LOAD May 17 00:29:07.040000 audit: BPF prog-id=16 op=UNLOAD May 17 00:29:07.041000 audit: BPF prog-id=17 op=UNLOAD May 17 00:29:07.086000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 17 00:29:07.086000 audit[988]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffc37eb8f60 a2=4000 a3=7ffc37eb8ffc items=0 ppid=1 pid=988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:29:07.086000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 17 00:29:06.191545 systemd[1]: Queued start job for default target multi-user.target. May 17 00:29:02.682459 /usr/lib/systemd/system-generators/torcx-generator[897]: time="2025-05-17T00:29:02Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:29:06.191562 systemd[1]: Unnecessary job was removed for dev-sda6.device. May 17 00:29:02.683778 /usr/lib/systemd/system-generators/torcx-generator[897]: time="2025-05-17T00:29:02Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 17 00:29:06.198446 systemd[1]: systemd-journald.service: Deactivated successfully. May 17 00:29:02.683823 /usr/lib/systemd/system-generators/torcx-generator[897]: time="2025-05-17T00:29:02Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 17 00:29:02.683886 /usr/lib/systemd/system-generators/torcx-generator[897]: time="2025-05-17T00:29:02Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 17 00:29:02.683908 /usr/lib/systemd/system-generators/torcx-generator[897]: time="2025-05-17T00:29:02Z" level=debug msg="skipped missing lower profile" missing profile=oem May 17 00:29:02.683986 /usr/lib/systemd/system-generators/torcx-generator[897]: time="2025-05-17T00:29:02Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 17 00:29:02.684015 /usr/lib/systemd/system-generators/torcx-generator[897]: time="2025-05-17T00:29:02Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 17 00:29:02.684367 /usr/lib/systemd/system-generators/torcx-generator[897]: time="2025-05-17T00:29:02Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 17 00:29:02.684445 /usr/lib/systemd/system-generators/torcx-generator[897]: time="2025-05-17T00:29:02Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 17 00:29:02.684473 /usr/lib/systemd/system-generators/torcx-generator[897]: time="2025-05-17T00:29:02Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 17 00:29:02.686793 /usr/lib/systemd/system-generators/torcx-generator[897]: time="2025-05-17T00:29:02Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 17 00:29:02.686876 /usr/lib/systemd/system-generators/torcx-generator[897]: time="2025-05-17T00:29:02Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 17 00:29:02.686925 /usr/lib/systemd/system-generators/torcx-generator[897]: time="2025-05-17T00:29:02Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 17 00:29:02.687834 /usr/lib/systemd/system-generators/torcx-generator[897]: time="2025-05-17T00:29:02Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 17 00:29:02.687913 /usr/lib/systemd/system-generators/torcx-generator[897]: time="2025-05-17T00:29:02Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 17 00:29:02.687955 /usr/lib/systemd/system-generators/torcx-generator[897]: time="2025-05-17T00:29:02Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 17 00:29:05.465871 /usr/lib/systemd/system-generators/torcx-generator[897]: time="2025-05-17T00:29:05Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:29:05.466340 /usr/lib/systemd/system-generators/torcx-generator[897]: time="2025-05-17T00:29:05Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:29:05.466551 /usr/lib/systemd/system-generators/torcx-generator[897]: time="2025-05-17T00:29:05Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:29:05.466958 /usr/lib/systemd/system-generators/torcx-generator[897]: time="2025-05-17T00:29:05Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:29:05.467052 /usr/lib/systemd/system-generators/torcx-generator[897]: time="2025-05-17T00:29:05Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 17 00:29:05.467164 /usr/lib/systemd/system-generators/torcx-generator[897]: time="2025-05-17T00:29:05Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 17 00:29:07.117327 systemd[1]: Starting systemd-udev-trigger.service... May 17 00:29:07.137059 systemd[1]: verity-setup.service: Deactivated successfully. May 17 00:29:07.137203 systemd[1]: Stopped verity-setup.service. May 17 00:29:07.142000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:07.156735 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:29:07.166735 systemd[1]: Started systemd-journald.service. May 17 00:29:07.173000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:07.176816 systemd[1]: Mounted dev-hugepages.mount. May 17 00:29:07.186189 systemd[1]: Mounted dev-mqueue.mount. May 17 00:29:07.194134 systemd[1]: Mounted media.mount. May 17 00:29:07.201134 systemd[1]: Mounted sys-kernel-debug.mount. May 17 00:29:07.211123 systemd[1]: Mounted sys-kernel-tracing.mount. May 17 00:29:07.220159 systemd[1]: Mounted tmp.mount. May 17 00:29:07.227370 systemd[1]: Finished flatcar-tmpfiles.service. May 17 00:29:07.234000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:07.236378 systemd[1]: Finished kmod-static-nodes.service. May 17 00:29:07.242136 kernel: kauditd_printk_skb: 38 callbacks suppressed May 17 00:29:07.242316 kernel: audit: type=1130 audit(1747441747.234:117): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:07.272000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:07.274653 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 17 00:29:07.274949 systemd[1]: Finished modprobe@configfs.service. May 17 00:29:07.298819 kernel: audit: type=1130 audit(1747441747.272:118): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:07.305000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:07.307571 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:29:07.307864 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:29:07.352232 kernel: audit: type=1130 audit(1747441747.305:119): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:07.352396 kernel: audit: type=1131 audit(1747441747.305:120): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:07.305000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:07.359000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:07.361609 systemd[1]: modprobe@drm.service: Deactivated successfully. May 17 00:29:07.361909 systemd[1]: Finished modprobe@drm.service. May 17 00:29:07.411058 kernel: audit: type=1130 audit(1747441747.359:121): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:07.411320 kernel: audit: type=1131 audit(1747441747.359:122): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:07.359000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:07.418000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:07.420660 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:29:07.421008 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:29:07.418000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:07.464640 kernel: audit: type=1130 audit(1747441747.418:123): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:07.464879 kernel: audit: type=1131 audit(1747441747.418:124): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:07.472000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:07.474617 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 17 00:29:07.474919 systemd[1]: Finished modprobe@fuse.service. May 17 00:29:07.519988 kernel: audit: type=1130 audit(1747441747.472:125): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:07.520263 kernel: audit: type=1131 audit(1747441747.472:126): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:07.472000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:07.527000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:07.527000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:07.529407 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:29:07.529664 systemd[1]: Finished modprobe@loop.service. May 17 00:29:07.537000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:07.537000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:07.539435 systemd[1]: Finished systemd-modules-load.service. May 17 00:29:07.546000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:07.548415 systemd[1]: Finished systemd-network-generator.service. May 17 00:29:07.555000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:07.557424 systemd[1]: Finished systemd-remount-fs.service. May 17 00:29:07.565000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:07.567373 systemd[1]: Finished systemd-udev-trigger.service. May 17 00:29:07.574000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:07.576955 systemd[1]: Reached target network-pre.target. May 17 00:29:07.588828 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 17 00:29:07.600056 systemd[1]: Mounting sys-kernel-config.mount... May 17 00:29:07.607952 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 17 00:29:07.611572 systemd[1]: Starting systemd-hwdb-update.service... May 17 00:29:07.621115 systemd[1]: Starting systemd-journal-flush.service... May 17 00:29:07.630185 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:29:07.634220 systemd[1]: Starting systemd-random-seed.service... May 17 00:29:07.637942 systemd-journald[988]: Time spent on flushing to /var/log/journal/7360031ed80b924b84524fc8587065ee is 62.585ms for 1165 entries. May 17 00:29:07.637942 systemd-journald[988]: System Journal (/var/log/journal/7360031ed80b924b84524fc8587065ee) is 8.0M, max 584.8M, 576.8M free. May 17 00:29:07.763508 systemd-journald[988]: Received client request to flush runtime journal. May 17 00:29:07.714000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:07.723000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:07.756000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:07.650949 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:29:07.653158 systemd[1]: Starting systemd-sysctl.service... May 17 00:29:07.663300 systemd[1]: Starting systemd-sysusers.service... May 17 00:29:07.765725 udevadm[1002]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. May 17 00:29:07.673102 systemd[1]: Starting systemd-udev-settle.service... May 17 00:29:07.688842 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 17 00:29:07.698120 systemd[1]: Mounted sys-kernel-config.mount. May 17 00:29:07.707258 systemd[1]: Finished systemd-random-seed.service. May 17 00:29:07.716399 systemd[1]: Finished systemd-sysctl.service. May 17 00:29:07.728515 systemd[1]: Reached target first-boot-complete.target. May 17 00:29:07.749030 systemd[1]: Finished systemd-sysusers.service. May 17 00:29:07.764934 systemd[1]: Finished systemd-journal-flush.service. May 17 00:29:07.773000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:08.409125 systemd[1]: Finished systemd-hwdb-update.service. May 17 00:29:08.416000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:08.417000 audit: BPF prog-id=21 op=LOAD May 17 00:29:08.417000 audit: BPF prog-id=22 op=LOAD May 17 00:29:08.417000 audit: BPF prog-id=7 op=UNLOAD May 17 00:29:08.417000 audit: BPF prog-id=8 op=UNLOAD May 17 00:29:08.420062 systemd[1]: Starting systemd-udevd.service... May 17 00:29:08.446950 systemd-udevd[1005]: Using default interface naming scheme 'v252'. May 17 00:29:08.506360 systemd[1]: Started systemd-udevd.service. May 17 00:29:08.513000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:08.516000 audit: BPF prog-id=23 op=LOAD May 17 00:29:08.519986 systemd[1]: Starting systemd-networkd.service... May 17 00:29:08.532000 audit: BPF prog-id=24 op=LOAD May 17 00:29:08.532000 audit: BPF prog-id=25 op=LOAD May 17 00:29:08.532000 audit: BPF prog-id=26 op=LOAD May 17 00:29:08.535971 systemd[1]: Starting systemd-userdbd.service... May 17 00:29:08.593711 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. May 17 00:29:08.614059 systemd[1]: Started systemd-userdbd.service. May 17 00:29:08.618000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:08.788803 systemd-networkd[1015]: lo: Link UP May 17 00:29:08.788821 systemd-networkd[1015]: lo: Gained carrier May 17 00:29:08.790436 systemd-networkd[1015]: Enumeration completed May 17 00:29:08.790727 systemd[1]: Started systemd-networkd.service. May 17 00:29:08.792837 systemd-networkd[1015]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 17 00:29:08.795655 systemd-networkd[1015]: eth0: Link UP May 17 00:29:08.795847 systemd-networkd[1015]: eth0: Gained carrier May 17 00:29:08.797000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:08.802395 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 17 00:29:08.808900 systemd-networkd[1015]: eth0: Overlong DHCP hostname received, shortened from 'ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7.c.flatcar-212911.internal' to 'ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7' May 17 00:29:08.808929 systemd-networkd[1015]: eth0: DHCPv4 address 10.128.0.54/32, gateway 10.128.0.1 acquired from 169.254.169.254 May 17 00:29:08.820751 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 May 17 00:29:08.831748 kernel: ACPI: button: Power Button [PWRF] May 17 00:29:08.860775 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input3 May 17 00:29:08.874000 audit[1012]: AVC avc: denied { confidentiality } for pid=1012 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 17 00:29:08.885731 kernel: ACPI: button: Sleep Button [SLPF] May 17 00:29:08.874000 audit[1012]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55ccd6cbfe60 a1=338ac a2=7fd47a338bc5 a3=5 items=110 ppid=1005 pid=1012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:29:08.874000 audit: CWD cwd="/" May 17 00:29:08.874000 audit: PATH item=0 name=(null) inode=40 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=1 name=(null) inode=12212 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=2 name=(null) inode=12212 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=3 name=(null) inode=12213 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=4 name=(null) inode=12212 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=5 name=(null) inode=12214 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=6 name=(null) inode=12212 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=7 name=(null) inode=12215 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=8 name=(null) inode=12215 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=9 name=(null) inode=12216 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=10 name=(null) inode=12215 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=11 name=(null) inode=12217 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=12 name=(null) inode=12215 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=13 name=(null) inode=12218 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=14 name=(null) inode=12215 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=15 name=(null) inode=12219 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=16 name=(null) inode=12215 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=17 name=(null) inode=12220 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=18 name=(null) inode=12212 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=19 name=(null) inode=12221 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=20 name=(null) inode=12221 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=21 name=(null) inode=12222 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=22 name=(null) inode=12221 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=23 name=(null) inode=12223 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=24 name=(null) inode=12221 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=25 name=(null) inode=12224 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=26 name=(null) inode=12221 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=27 name=(null) inode=12225 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=28 name=(null) inode=12221 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=29 name=(null) inode=12226 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=30 name=(null) inode=12212 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=31 name=(null) inode=12227 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=32 name=(null) inode=12227 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=33 name=(null) inode=12228 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=34 name=(null) inode=12227 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=35 name=(null) inode=12229 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=36 name=(null) inode=12227 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=37 name=(null) inode=12230 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=38 name=(null) inode=12227 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=39 name=(null) inode=12231 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=40 name=(null) inode=12227 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=41 name=(null) inode=12232 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=42 name=(null) inode=12212 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=43 name=(null) inode=12233 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=44 name=(null) inode=12233 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=45 name=(null) inode=12234 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=46 name=(null) inode=12233 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=47 name=(null) inode=12235 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=48 name=(null) inode=12233 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=49 name=(null) inode=12236 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=50 name=(null) inode=12233 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=51 name=(null) inode=12237 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=52 name=(null) inode=12233 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=53 name=(null) inode=12238 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=54 name=(null) inode=40 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=55 name=(null) inode=12239 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=56 name=(null) inode=12239 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=57 name=(null) inode=12240 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=58 name=(null) inode=12239 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=59 name=(null) inode=12241 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=60 name=(null) inode=12239 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=61 name=(null) inode=12242 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=62 name=(null) inode=12242 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=63 name=(null) inode=12243 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=64 name=(null) inode=12242 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=65 name=(null) inode=12244 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=66 name=(null) inode=12242 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=67 name=(null) inode=12245 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=68 name=(null) inode=12242 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=69 name=(null) inode=12246 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=70 name=(null) inode=12242 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=71 name=(null) inode=12247 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=72 name=(null) inode=12239 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=73 name=(null) inode=12248 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=74 name=(null) inode=12248 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=75 name=(null) inode=12249 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=76 name=(null) inode=12248 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=77 name=(null) inode=12250 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=78 name=(null) inode=12248 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=79 name=(null) inode=12251 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=80 name=(null) inode=12248 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=81 name=(null) inode=12252 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=82 name=(null) inode=12248 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=83 name=(null) inode=12253 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=84 name=(null) inode=12239 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=85 name=(null) inode=12254 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=86 name=(null) inode=12254 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=87 name=(null) inode=12255 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=88 name=(null) inode=12254 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=89 name=(null) inode=12256 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=90 name=(null) inode=12254 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=91 name=(null) inode=12257 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=92 name=(null) inode=12254 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=93 name=(null) inode=12258 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=94 name=(null) inode=12254 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=95 name=(null) inode=12259 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=96 name=(null) inode=12239 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=97 name=(null) inode=12260 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=98 name=(null) inode=12260 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=99 name=(null) inode=12261 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=100 name=(null) inode=12260 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=101 name=(null) inode=12262 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=102 name=(null) inode=12260 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=103 name=(null) inode=12263 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=104 name=(null) inode=12260 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=105 name=(null) inode=12264 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=106 name=(null) inode=12260 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=107 name=(null) inode=12265 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PATH item=109 name=(null) inode=12266 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:29:08.874000 audit: PROCTITLE proctitle="(udev-worker)" May 17 00:29:08.914800 kernel: piix4_smbus 0000:00:01.3: SMBus base address uninitialized - upgrade BIOS or use force_addr=0xaddr May 17 00:29:08.920742 kernel: EDAC MC: Ver: 3.0.0 May 17 00:29:08.955723 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input4 May 17 00:29:08.983743 kernel: mousedev: PS/2 mouse device common for all mice May 17 00:29:09.000794 systemd[1]: Finished systemd-udev-settle.service. May 17 00:29:09.007000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:09.010936 systemd[1]: Starting lvm2-activation-early.service... May 17 00:29:09.043942 lvm[1043]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 17 00:29:09.075286 systemd[1]: Finished lvm2-activation-early.service. May 17 00:29:09.083000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:09.085090 systemd[1]: Reached target cryptsetup.target. May 17 00:29:09.095629 systemd[1]: Starting lvm2-activation.service... May 17 00:29:09.101881 lvm[1044]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 17 00:29:09.133186 systemd[1]: Finished lvm2-activation.service. May 17 00:29:09.140000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:09.142127 systemd[1]: Reached target local-fs-pre.target. May 17 00:29:09.150878 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 17 00:29:09.150940 systemd[1]: Reached target local-fs.target. May 17 00:29:09.159876 systemd[1]: Reached target machines.target. May 17 00:29:09.170673 systemd[1]: Starting ldconfig.service... May 17 00:29:09.181085 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:29:09.181235 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:29:09.183452 systemd[1]: Starting systemd-boot-update.service... May 17 00:29:09.194121 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 17 00:29:09.206282 systemd[1]: Starting systemd-machine-id-commit.service... May 17 00:29:09.218941 systemd[1]: Starting systemd-sysext.service... May 17 00:29:09.220102 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1046 (bootctl) May 17 00:29:09.222897 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 17 00:29:09.240000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:09.241484 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 17 00:29:09.252584 systemd[1]: Unmounting usr-share-oem.mount... May 17 00:29:09.263009 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 17 00:29:09.263346 systemd[1]: Unmounted usr-share-oem.mount. May 17 00:29:09.291772 kernel: loop0: detected capacity change from 0 to 229808 May 17 00:29:09.413553 systemd-fsck[1055]: fsck.fat 4.2 (2021-01-31) May 17 00:29:09.413553 systemd-fsck[1055]: /dev/sda1: 790 files, 120726/258078 clusters May 17 00:29:09.416869 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 17 00:29:09.426000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:09.430406 systemd[1]: Mounting boot.mount... May 17 00:29:09.462851 systemd[1]: Mounted boot.mount. May 17 00:29:09.498836 systemd[1]: Finished systemd-boot-update.service. May 17 00:29:09.506000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:09.710098 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 17 00:29:09.711147 systemd[1]: Finished systemd-machine-id-commit.service. May 17 00:29:09.721729 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 17 00:29:09.724000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:09.752746 kernel: loop1: detected capacity change from 0 to 229808 May 17 00:29:09.789195 (sd-sysext)[1061]: Using extensions 'kubernetes'. May 17 00:29:09.792012 (sd-sysext)[1061]: Merged extensions into '/usr'. May 17 00:29:09.821514 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:29:09.824336 systemd[1]: Mounting usr-share-oem.mount... May 17 00:29:09.832492 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:29:09.835110 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:29:09.844404 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:29:09.854239 systemd[1]: Starting modprobe@loop.service... May 17 00:29:09.861954 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:29:09.862264 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:29:09.862556 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:29:09.869583 systemd[1]: Mounted usr-share-oem.mount. May 17 00:29:09.877729 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:29:09.877987 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:29:09.886000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:09.886000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:09.888733 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:29:09.889029 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:29:09.896000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:09.896000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:09.898751 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:29:09.898994 systemd[1]: Finished modprobe@loop.service. May 17 00:29:09.907000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:09.907000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:09.910024 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:29:09.910256 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:29:09.912540 systemd[1]: Finished systemd-sysext.service. May 17 00:29:09.920000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:09.924550 systemd[1]: Starting ensure-sysext.service... May 17 00:29:09.933788 systemd[1]: Starting systemd-tmpfiles-setup.service... May 17 00:29:09.947180 systemd[1]: Reloading. May 17 00:29:09.978764 systemd-tmpfiles[1068]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 17 00:29:09.989852 systemd-tmpfiles[1068]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 17 00:29:09.990565 ldconfig[1045]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 17 00:29:10.009939 systemd-tmpfiles[1068]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 17 00:29:10.080021 /usr/lib/systemd/system-generators/torcx-generator[1087]: time="2025-05-17T00:29:10Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:29:10.080079 /usr/lib/systemd/system-generators/torcx-generator[1087]: time="2025-05-17T00:29:10Z" level=info msg="torcx already run" May 17 00:29:10.208895 systemd-networkd[1015]: eth0: Gained IPv6LL May 17 00:29:10.277107 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:29:10.277148 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:29:10.330806 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:29:10.425000 audit: BPF prog-id=27 op=LOAD May 17 00:29:10.426000 audit: BPF prog-id=24 op=UNLOAD May 17 00:29:10.426000 audit: BPF prog-id=28 op=LOAD May 17 00:29:10.426000 audit: BPF prog-id=29 op=LOAD May 17 00:29:10.426000 audit: BPF prog-id=25 op=UNLOAD May 17 00:29:10.426000 audit: BPF prog-id=26 op=UNLOAD May 17 00:29:10.431000 audit: BPF prog-id=30 op=LOAD May 17 00:29:10.431000 audit: BPF prog-id=23 op=UNLOAD May 17 00:29:10.432000 audit: BPF prog-id=31 op=LOAD May 17 00:29:10.433000 audit: BPF prog-id=32 op=LOAD May 17 00:29:10.433000 audit: BPF prog-id=21 op=UNLOAD May 17 00:29:10.433000 audit: BPF prog-id=22 op=UNLOAD May 17 00:29:10.434000 audit: BPF prog-id=33 op=LOAD May 17 00:29:10.434000 audit: BPF prog-id=18 op=UNLOAD May 17 00:29:10.434000 audit: BPF prog-id=34 op=LOAD May 17 00:29:10.434000 audit: BPF prog-id=35 op=LOAD May 17 00:29:10.434000 audit: BPF prog-id=19 op=UNLOAD May 17 00:29:10.434000 audit: BPF prog-id=20 op=UNLOAD May 17 00:29:10.444451 systemd[1]: Finished ldconfig.service. May 17 00:29:10.450000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:10.454252 systemd[1]: Finished systemd-tmpfiles-setup.service. May 17 00:29:10.461000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:10.470885 systemd[1]: Starting audit-rules.service... May 17 00:29:10.481677 systemd[1]: Starting clean-ca-certificates.service... May 17 00:29:10.492496 systemd[1]: Starting oem-gce-enable-oslogin.service... May 17 00:29:10.503869 systemd[1]: Starting systemd-journal-catalog-update.service... May 17 00:29:10.512000 audit: BPF prog-id=36 op=LOAD May 17 00:29:10.516492 systemd[1]: Starting systemd-resolved.service... May 17 00:29:10.523000 audit: BPF prog-id=37 op=LOAD May 17 00:29:10.527904 systemd[1]: Starting systemd-timesyncd.service... May 17 00:29:10.537641 systemd[1]: Starting systemd-update-utmp.service... May 17 00:29:10.545000 audit[1154]: SYSTEM_BOOT pid=1154 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 17 00:29:10.547387 systemd[1]: Finished clean-ca-certificates.service. May 17 00:29:10.554000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:10.556979 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. May 17 00:29:10.557308 systemd[1]: Finished oem-gce-enable-oslogin.service. May 17 00:29:10.564000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=oem-gce-enable-oslogin comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:10.564000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=oem-gce-enable-oslogin comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:10.574469 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:29:10.577330 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:29:10.582049 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:29:10.593617 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:29:10.604037 systemd[1]: Starting modprobe@loop.service... May 17 00:29:10.607984 augenrules[1164]: No rules May 17 00:29:10.606000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 17 00:29:10.606000 audit[1164]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd58f92d50 a2=420 a3=0 items=0 ppid=1132 pid=1164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:29:10.606000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 17 00:29:10.614871 systemd[1]: Starting oem-gce-enable-oslogin.service... May 17 00:29:10.622961 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:29:10.623422 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:29:10.623920 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 17 00:29:10.624277 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:29:10.628818 systemd[1]: Finished audit-rules.service. May 17 00:29:10.630176 enable-oslogin[1170]: /etc/pam.d/sshd already exists. Not enabling OS Login May 17 00:29:10.637175 systemd[1]: Finished systemd-journal-catalog-update.service. May 17 00:29:10.646424 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:29:10.646670 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:29:10.657043 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:29:10.657285 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:29:10.668717 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:29:10.668968 systemd[1]: Finished modprobe@loop.service. May 17 00:29:10.677631 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. May 17 00:29:10.678006 systemd[1]: Finished oem-gce-enable-oslogin.service. May 17 00:29:10.688921 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:29:10.689378 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:29:10.692807 systemd[1]: Starting systemd-update-done.service... May 17 00:29:10.701279 systemd[1]: Finished systemd-update-utmp.service. May 17 00:29:10.710767 systemd[1]: Finished systemd-update-done.service. May 17 00:29:10.725837 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:29:10.726407 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:29:10.727063 systemd-resolved[1147]: Positive Trust Anchors: May 17 00:29:10.727091 systemd-resolved[1147]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 17 00:29:10.727176 systemd-resolved[1147]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 17 00:29:10.730377 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:29:10.740275 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:29:10.745841 systemd-resolved[1147]: Defaulting to hostname 'linux'. May 17 00:29:10.750404 systemd[1]: Starting modprobe@loop.service... May 17 00:29:10.760385 systemd[1]: Starting oem-gce-enable-oslogin.service... May 17 00:29:10.768151 enable-oslogin[1175]: /etc/pam.d/sshd already exists. Not enabling OS Login May 17 00:29:10.768913 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:29:10.769220 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:29:10.769445 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 17 00:29:10.769596 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:29:10.771820 systemd[1]: Started systemd-resolved.service. May 17 00:29:10.783023 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:29:10.783346 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:29:10.792771 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:29:10.793028 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:29:10.802764 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:29:10.803236 systemd[1]: Finished modprobe@loop.service. May 17 00:29:10.812646 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. May 17 00:29:10.812948 systemd[1]: Finished oem-gce-enable-oslogin.service. May 17 00:29:10.814953 systemd-timesyncd[1150]: Contacted time server 169.254.169.254:123 (169.254.169.254). May 17 00:29:10.815106 systemd-timesyncd[1150]: Initial clock synchronization to Sat 2025-05-17 00:29:10.420731 UTC. May 17 00:29:10.822511 systemd[1]: Started systemd-timesyncd.service. May 17 00:29:10.832500 systemd[1]: Reached target network.target. May 17 00:29:10.841105 systemd[1]: Reached target nss-lookup.target. May 17 00:29:10.850106 systemd[1]: Reached target time-set.target. May 17 00:29:10.859099 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:29:10.859442 systemd[1]: Reached target sysinit.target. May 17 00:29:10.868289 systemd[1]: Started motdgen.path. May 17 00:29:10.876211 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 17 00:29:10.887477 systemd[1]: Started logrotate.timer. May 17 00:29:10.895367 systemd[1]: Started mdadm.timer. May 17 00:29:10.903322 systemd[1]: Started systemd-tmpfiles-clean.timer. May 17 00:29:10.912097 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 17 00:29:10.912469 systemd[1]: Reached target paths.target. May 17 00:29:10.920100 systemd[1]: Reached target timers.target. May 17 00:29:10.929207 systemd[1]: Listening on dbus.socket. May 17 00:29:10.938081 systemd[1]: Starting docker.socket... May 17 00:29:10.949770 systemd[1]: Listening on sshd.socket. May 17 00:29:10.957225 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:29:10.957611 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:29:10.961195 systemd[1]: Listening on docker.socket. May 17 00:29:10.972236 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 17 00:29:10.972484 systemd[1]: Reached target sockets.target. May 17 00:29:10.983106 systemd[1]: Reached target basic.target. May 17 00:29:10.991068 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 17 00:29:10.991398 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 17 00:29:10.993744 systemd[1]: Starting containerd.service... May 17 00:29:11.003110 systemd[1]: Starting coreos-metadata-sshkeys@core.service... May 17 00:29:11.015906 systemd[1]: Starting dbus.service... May 17 00:29:11.025291 systemd[1]: Starting enable-oem-cloudinit.service... May 17 00:29:11.037340 systemd[1]: Starting extend-filesystems.service... May 17 00:29:11.041428 jq[1182]: false May 17 00:29:11.043851 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 17 00:29:11.046428 systemd[1]: Starting modprobe@drm.service... May 17 00:29:11.054999 systemd[1]: Starting motdgen.service... May 17 00:29:11.066335 systemd[1]: Starting prepare-helm.service... May 17 00:29:11.078121 systemd[1]: Starting ssh-key-proc-cmdline.service... May 17 00:29:11.088275 systemd[1]: Starting sshd-keygen.service... May 17 00:29:11.097260 systemd[1]: Starting systemd-networkd-wait-online.service... May 17 00:29:11.106849 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:29:11.107164 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionSecurity=!tpm2). May 17 00:29:11.108175 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 17 00:29:11.109964 systemd[1]: Starting update-engine.service... May 17 00:29:11.120611 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 17 00:29:11.128153 jq[1203]: true May 17 00:29:11.135945 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 17 00:29:11.137790 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 17 00:29:11.138965 systemd[1]: modprobe@drm.service: Deactivated successfully. May 17 00:29:11.139356 systemd[1]: Finished modprobe@drm.service. May 17 00:29:11.146828 systemd[1]: motdgen.service: Deactivated successfully. May 17 00:29:11.147093 systemd[1]: Finished motdgen.service. May 17 00:29:11.154295 extend-filesystems[1184]: Found loop1 May 17 00:29:11.154295 extend-filesystems[1184]: Found sda May 17 00:29:11.154295 extend-filesystems[1184]: Found sda1 May 17 00:29:11.310007 kernel: EXT4-fs (sda9): resizing filesystem from 1617920 to 2538491 blocks May 17 00:29:11.310117 update_engine[1201]: I0517 00:29:11.282104 1201 main.cc:92] Flatcar Update Engine starting May 17 00:29:11.310117 update_engine[1201]: I0517 00:29:11.290025 1201 update_check_scheduler.cc:74] Next update check in 5m20s May 17 00:29:11.311281 extend-filesystems[1184]: Found sda2 May 17 00:29:11.311281 extend-filesystems[1184]: Found sda3 May 17 00:29:11.311281 extend-filesystems[1184]: Found usr May 17 00:29:11.311281 extend-filesystems[1184]: Found sda4 May 17 00:29:11.311281 extend-filesystems[1184]: Found sda6 May 17 00:29:11.311281 extend-filesystems[1184]: Found sda7 May 17 00:29:11.311281 extend-filesystems[1184]: Found sda9 May 17 00:29:11.311281 extend-filesystems[1184]: Checking size of /dev/sda9 May 17 00:29:11.311281 extend-filesystems[1184]: Resized partition /dev/sda9 May 17 00:29:11.440975 kernel: EXT4-fs (sda9): resized filesystem to 2538491 May 17 00:29:11.180480 dbus-daemon[1181]: [system] SELinux support is enabled May 17 00:29:11.156771 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 17 00:29:11.441576 extend-filesystems[1214]: resize2fs 1.46.5 (30-Dec-2021) May 17 00:29:11.441576 extend-filesystems[1214]: Filesystem at /dev/sda9 is mounted on /; on-line resizing required May 17 00:29:11.441576 extend-filesystems[1214]: old_desc_blocks = 1, new_desc_blocks = 2 May 17 00:29:11.441576 extend-filesystems[1214]: The filesystem on /dev/sda9 is now 2538491 (4k) blocks long. May 17 00:29:11.192301 dbus-daemon[1181]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.0' (uid=244 pid=1015 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") May 17 00:29:11.157087 systemd[1]: Finished ssh-key-proc-cmdline.service. May 17 00:29:11.489381 tar[1206]: linux-amd64/LICENSE May 17 00:29:11.489381 tar[1206]: linux-amd64/helm May 17 00:29:11.489961 extend-filesystems[1184]: Resized filesystem in /dev/sda9 May 17 00:29:11.216246 dbus-daemon[1181]: [system] Successfully activated service 'org.freedesktop.systemd1' May 17 00:29:11.183841 systemd[1]: Started dbus.service. May 17 00:29:11.498123 env[1216]: time="2025-05-17T00:29:11.458987841Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 17 00:29:11.193834 systemd[1]: Finished systemd-networkd-wait-online.service. May 17 00:29:11.499608 jq[1215]: true May 17 00:29:11.210487 systemd[1]: Reached target network-online.target. May 17 00:29:11.221754 systemd[1]: Starting kubelet.service... May 17 00:29:11.244516 systemd[1]: Starting oem-gce.service... May 17 00:29:11.249309 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 17 00:29:11.249381 systemd[1]: Reached target system-config.target. May 17 00:29:11.501768 bash[1245]: Updated "/home/core/.ssh/authorized_keys" May 17 00:29:11.267917 systemd[1]: Starting systemd-logind.service... May 17 00:29:11.274966 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 17 00:29:11.504491 mkfs.ext4[1228]: mke2fs 1.46.5 (30-Dec-2021) May 17 00:29:11.504491 mkfs.ext4[1228]: Discarding device blocks: 0/262144\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008 \u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008done May 17 00:29:11.504491 mkfs.ext4[1228]: Creating filesystem with 262144 4k blocks and 65536 inodes May 17 00:29:11.504491 mkfs.ext4[1228]: Filesystem UUID: d25f9a1d-8604-4b87-86d0-63fd363f1520 May 17 00:29:11.504491 mkfs.ext4[1228]: Superblock backups stored on blocks: May 17 00:29:11.504491 mkfs.ext4[1228]: 32768, 98304, 163840, 229376 May 17 00:29:11.504491 mkfs.ext4[1228]: Allocating group tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done May 17 00:29:11.504491 mkfs.ext4[1228]: Writing inode tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done May 17 00:29:11.504491 mkfs.ext4[1228]: Creating journal (8192 blocks): done May 17 00:29:11.504491 mkfs.ext4[1228]: Writing superblocks and filesystem accounting information: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done May 17 00:29:11.275069 systemd[1]: Reached target user-config.target. May 17 00:29:11.284871 systemd[1]: Finished ensure-sysext.service. May 17 00:29:11.309404 systemd[1]: Started update-engine.service. May 17 00:29:11.320981 systemd[1]: Started locksmithd.service. May 17 00:29:11.341580 systemd[1]: Starting systemd-hostnamed.service... May 17 00:29:11.507600 umount[1249]: umount: /var/lib/flatcar-oem-gce.img: not mounted. May 17 00:29:11.401608 systemd[1]: extend-filesystems.service: Deactivated successfully. May 17 00:29:11.401980 systemd[1]: Finished extend-filesystems.service. May 17 00:29:11.470851 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 17 00:29:11.540722 kernel: loop2: detected capacity change from 0 to 2097152 May 17 00:29:11.634799 kernel: EXT4-fs (loop2): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 17 00:29:11.752247 systemd-logind[1224]: Watching system buttons on /dev/input/event1 (Power Button) May 17 00:29:11.752305 systemd-logind[1224]: Watching system buttons on /dev/input/event2 (Sleep Button) May 17 00:29:11.752345 systemd-logind[1224]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) May 17 00:29:11.754238 systemd-logind[1224]: New seat seat0. May 17 00:29:11.763841 systemd[1]: Started systemd-logind.service. May 17 00:29:11.824145 env[1216]: time="2025-05-17T00:29:11.824078931Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 17 00:29:11.831100 env[1216]: time="2025-05-17T00:29:11.831049443Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 17 00:29:11.835141 coreos-metadata[1180]: May 17 00:29:11.835 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/sshKeys: Attempt #1 May 17 00:29:11.839253 coreos-metadata[1180]: May 17 00:29:11.839 INFO Fetch failed with 404: resource not found May 17 00:29:11.839413 coreos-metadata[1180]: May 17 00:29:11.839 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/ssh-keys: Attempt #1 May 17 00:29:11.841903 coreos-metadata[1180]: May 17 00:29:11.841 INFO Fetch successful May 17 00:29:11.842029 coreos-metadata[1180]: May 17 00:29:11.841 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/block-project-ssh-keys: Attempt #1 May 17 00:29:11.843884 coreos-metadata[1180]: May 17 00:29:11.843 INFO Fetch failed with 404: resource not found May 17 00:29:11.844015 coreos-metadata[1180]: May 17 00:29:11.843 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/sshKeys: Attempt #1 May 17 00:29:11.844901 coreos-metadata[1180]: May 17 00:29:11.844 INFO Fetch failed with 404: resource not found May 17 00:29:11.845014 coreos-metadata[1180]: May 17 00:29:11.844 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/ssh-keys: Attempt #1 May 17 00:29:11.845740 coreos-metadata[1180]: May 17 00:29:11.845 INFO Fetch successful May 17 00:29:11.851060 env[1216]: time="2025-05-17T00:29:11.850987185Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.182-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 17 00:29:11.851188 env[1216]: time="2025-05-17T00:29:11.851060395Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 17 00:29:11.852260 env[1216]: time="2025-05-17T00:29:11.851979723Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 17 00:29:11.852260 env[1216]: time="2025-05-17T00:29:11.852062748Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 17 00:29:11.852260 env[1216]: time="2025-05-17T00:29:11.852114937Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 17 00:29:11.852260 env[1216]: time="2025-05-17T00:29:11.852140990Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 17 00:29:11.852209 unknown[1180]: wrote ssh authorized keys file for user: core May 17 00:29:11.853254 env[1216]: time="2025-05-17T00:29:11.853119386Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 17 00:29:11.854333 env[1216]: time="2025-05-17T00:29:11.853726347Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 17 00:29:11.854333 env[1216]: time="2025-05-17T00:29:11.854014145Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 17 00:29:11.854333 env[1216]: time="2025-05-17T00:29:11.854047633Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 17 00:29:11.854333 env[1216]: time="2025-05-17T00:29:11.854143356Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 17 00:29:11.854333 env[1216]: time="2025-05-17T00:29:11.854166539Z" level=info msg="metadata content store policy set" policy=shared May 17 00:29:11.867721 env[1216]: time="2025-05-17T00:29:11.865922549Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 17 00:29:11.867721 env[1216]: time="2025-05-17T00:29:11.865980202Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 17 00:29:11.867721 env[1216]: time="2025-05-17T00:29:11.866000083Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 17 00:29:11.867721 env[1216]: time="2025-05-17T00:29:11.866056961Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 17 00:29:11.867721 env[1216]: time="2025-05-17T00:29:11.866093310Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 17 00:29:11.867721 env[1216]: time="2025-05-17T00:29:11.866122190Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 17 00:29:11.867721 env[1216]: time="2025-05-17T00:29:11.866143375Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 17 00:29:11.867721 env[1216]: time="2025-05-17T00:29:11.866164986Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 17 00:29:11.867721 env[1216]: time="2025-05-17T00:29:11.866186618Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 17 00:29:11.867721 env[1216]: time="2025-05-17T00:29:11.866210452Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 17 00:29:11.867721 env[1216]: time="2025-05-17T00:29:11.866232179Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 17 00:29:11.867721 env[1216]: time="2025-05-17T00:29:11.866253297Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 17 00:29:11.867721 env[1216]: time="2025-05-17T00:29:11.866433431Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 17 00:29:11.867721 env[1216]: time="2025-05-17T00:29:11.866540811Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 17 00:29:11.868579 env[1216]: time="2025-05-17T00:29:11.866944208Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 17 00:29:11.868579 env[1216]: time="2025-05-17T00:29:11.866986676Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 17 00:29:11.868579 env[1216]: time="2025-05-17T00:29:11.867007714Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 17 00:29:11.868579 env[1216]: time="2025-05-17T00:29:11.867072934Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 17 00:29:11.868579 env[1216]: time="2025-05-17T00:29:11.867100455Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 17 00:29:11.868579 env[1216]: time="2025-05-17T00:29:11.867126493Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 17 00:29:11.868579 env[1216]: time="2025-05-17T00:29:11.867149619Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 17 00:29:11.868579 env[1216]: time="2025-05-17T00:29:11.867171358Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 17 00:29:11.868579 env[1216]: time="2025-05-17T00:29:11.867192747Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 17 00:29:11.868579 env[1216]: time="2025-05-17T00:29:11.867212892Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 17 00:29:11.868579 env[1216]: time="2025-05-17T00:29:11.867243313Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 17 00:29:11.868579 env[1216]: time="2025-05-17T00:29:11.867266398Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 17 00:29:11.868579 env[1216]: time="2025-05-17T00:29:11.867451113Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 17 00:29:11.868579 env[1216]: time="2025-05-17T00:29:11.867471835Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 17 00:29:11.868579 env[1216]: time="2025-05-17T00:29:11.867489806Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 17 00:29:11.869397 env[1216]: time="2025-05-17T00:29:11.867507548Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 17 00:29:11.869397 env[1216]: time="2025-05-17T00:29:11.867529797Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 17 00:29:11.869397 env[1216]: time="2025-05-17T00:29:11.867546263Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 17 00:29:11.869397 env[1216]: time="2025-05-17T00:29:11.867578600Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 17 00:29:11.869397 env[1216]: time="2025-05-17T00:29:11.867638269Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 17 00:29:11.870213 env[1216]: time="2025-05-17T00:29:11.870104995Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 17 00:29:11.874670 env[1216]: time="2025-05-17T00:29:11.870467368Z" level=info msg="Connect containerd service" May 17 00:29:11.874670 env[1216]: time="2025-05-17T00:29:11.870536703Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 17 00:29:11.878405 env[1216]: time="2025-05-17T00:29:11.878346898Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 17 00:29:11.878766 env[1216]: time="2025-05-17T00:29:11.878714703Z" level=info msg="Start subscribing containerd event" May 17 00:29:11.881755 env[1216]: time="2025-05-17T00:29:11.881621386Z" level=info msg="Start recovering state" May 17 00:29:11.887884 env[1216]: time="2025-05-17T00:29:11.887832109Z" level=info msg="Start event monitor" May 17 00:29:11.888127 env[1216]: time="2025-05-17T00:29:11.888098535Z" level=info msg="Start snapshots syncer" May 17 00:29:11.888246 env[1216]: time="2025-05-17T00:29:11.888221164Z" level=info msg="Start cni network conf syncer for default" May 17 00:29:11.888373 env[1216]: time="2025-05-17T00:29:11.888348423Z" level=info msg="Start streaming server" May 17 00:29:11.889242 env[1216]: time="2025-05-17T00:29:11.889209388Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 17 00:29:11.891153 env[1216]: time="2025-05-17T00:29:11.891118678Z" level=info msg=serving... address=/run/containerd/containerd.sock May 17 00:29:11.910063 update-ssh-keys[1266]: Updated "/home/core/.ssh/authorized_keys" May 17 00:29:11.911114 systemd[1]: Finished coreos-metadata-sshkeys@core.service. May 17 00:29:11.913987 env[1216]: time="2025-05-17T00:29:11.913929780Z" level=info msg="containerd successfully booted in 0.467869s" May 17 00:29:11.921457 systemd[1]: Started containerd.service. May 17 00:29:12.009434 dbus-daemon[1181]: [system] Successfully activated service 'org.freedesktop.hostname1' May 17 00:29:12.009752 systemd[1]: Started systemd-hostnamed.service. May 17 00:29:12.010225 dbus-daemon[1181]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1237 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") May 17 00:29:12.024245 systemd[1]: Starting polkit.service... May 17 00:29:12.122529 polkitd[1268]: Started polkitd version 121 May 17 00:29:12.162014 polkitd[1268]: Loading rules from directory /etc/polkit-1/rules.d May 17 00:29:12.162605 polkitd[1268]: Loading rules from directory /usr/share/polkit-1/rules.d May 17 00:29:12.166710 polkitd[1268]: Finished loading, compiling and executing 2 rules May 17 00:29:12.167604 dbus-daemon[1181]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' May 17 00:29:12.167875 systemd[1]: Started polkit.service. May 17 00:29:12.169870 polkitd[1268]: Acquired the name org.freedesktop.PolicyKit1 on the system bus May 17 00:29:12.218656 systemd-hostnamed[1237]: Hostname set to (transient) May 17 00:29:12.221744 systemd-resolved[1147]: System hostname changed to 'ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7'. May 17 00:29:13.397169 tar[1206]: linux-amd64/README.md May 17 00:29:13.411529 systemd[1]: Finished prepare-helm.service. May 17 00:29:13.910359 systemd[1]: Started kubelet.service. May 17 00:29:14.332178 sshd_keygen[1208]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 17 00:29:14.405937 systemd[1]: Finished sshd-keygen.service. May 17 00:29:14.418674 systemd[1]: Starting issuegen.service... May 17 00:29:14.440065 systemd[1]: issuegen.service: Deactivated successfully. May 17 00:29:14.440333 systemd[1]: Finished issuegen.service. May 17 00:29:14.450309 systemd[1]: Starting systemd-user-sessions.service... May 17 00:29:14.469589 systemd[1]: Finished systemd-user-sessions.service. May 17 00:29:14.480932 systemd[1]: Started getty@tty1.service. May 17 00:29:14.492389 systemd[1]: Started serial-getty@ttyS0.service. May 17 00:29:14.499483 systemd[1]: Reached target getty.target. May 17 00:29:14.525795 locksmithd[1233]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 17 00:29:15.169133 kubelet[1282]: E0517 00:29:15.169072 1282 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:29:15.172479 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:29:15.172798 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:29:15.173260 systemd[1]: kubelet.service: Consumed 1.605s CPU time. May 17 00:29:17.676346 systemd[1]: var-lib-flatcar\x2doem\x2dgce.mount: Deactivated successfully. May 17 00:29:19.083729 systemd[1]: Created slice system-sshd.slice. May 17 00:29:19.094359 systemd[1]: Started sshd@0-10.128.0.54:22-139.178.89.65:34472.service. May 17 00:29:19.420445 sshd[1303]: Accepted publickey for core from 139.178.89.65 port 34472 ssh2: RSA SHA256:jyE3lnafiBGDGJK6dHnApyF/jgfCnjVgkPORJQqM9Ps May 17 00:29:19.425480 sshd[1303]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:29:19.501367 systemd[1]: Created slice user-500.slice. May 17 00:29:19.503287 systemd[1]: Starting user-runtime-dir@500.service... May 17 00:29:19.517556 systemd-logind[1224]: New session 1 of user core. May 17 00:29:19.529317 systemd[1]: Finished user-runtime-dir@500.service. May 17 00:29:19.532989 systemd[1]: Starting user@500.service... May 17 00:29:19.547524 (systemd)[1306]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 17 00:29:19.748457 systemd[1306]: Queued start job for default target default.target. May 17 00:29:19.751369 systemd[1306]: Reached target paths.target. May 17 00:29:19.751653 systemd[1306]: Reached target sockets.target. May 17 00:29:19.751733 systemd[1306]: Reached target timers.target. May 17 00:29:19.751771 systemd[1306]: Reached target basic.target. May 17 00:29:19.751945 systemd[1]: Started user@500.service. May 17 00:29:19.753894 systemd[1]: Started session-1.scope. May 17 00:29:19.757797 systemd[1306]: Reached target default.target. May 17 00:29:19.758174 systemd[1306]: Startup finished in 200ms. May 17 00:29:19.817756 kernel: loop2: detected capacity change from 0 to 2097152 May 17 00:29:19.841819 systemd-nspawn[1313]: Spawning container oem-gce on /var/lib/flatcar-oem-gce.img. May 17 00:29:19.841819 systemd-nspawn[1313]: Press ^] three times within 1s to kill container. May 17 00:29:19.856732 kernel: EXT4-fs (loop2): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 17 00:29:19.882503 systemd[1]: tmp-unified6H2Mk7.mount: Deactivated successfully. May 17 00:29:19.985490 systemd[1]: Started sshd@1-10.128.0.54:22-139.178.89.65:34482.service. May 17 00:29:19.989116 systemd[1]: Started oem-gce.service. May 17 00:29:19.989756 systemd[1]: Reached target multi-user.target. May 17 00:29:19.993122 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 17 00:29:20.023455 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 17 00:29:20.023845 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 17 00:29:20.025779 systemd[1]: Startup finished in 1.218s (kernel) + 9.194s (initrd) + 17.972s (userspace) = 28.386s. May 17 00:29:20.169469 systemd-nspawn[1313]: + '[' -e /etc/default/instance_configs.cfg.template ']' May 17 00:29:20.169816 systemd-nspawn[1313]: + echo -e '[InstanceSetup]\nset_host_keys = false' May 17 00:29:20.169816 systemd-nspawn[1313]: + /usr/bin/google_instance_setup May 17 00:29:20.314610 sshd[1320]: Accepted publickey for core from 139.178.89.65 port 34482 ssh2: RSA SHA256:jyE3lnafiBGDGJK6dHnApyF/jgfCnjVgkPORJQqM9Ps May 17 00:29:20.316324 sshd[1320]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:29:20.326186 systemd[1]: Started session-2.scope. May 17 00:29:20.328097 systemd-logind[1224]: New session 2 of user core. May 17 00:29:20.530830 sshd[1320]: pam_unix(sshd:session): session closed for user core May 17 00:29:20.536345 systemd[1]: sshd@1-10.128.0.54:22-139.178.89.65:34482.service: Deactivated successfully. May 17 00:29:20.537842 systemd[1]: session-2.scope: Deactivated successfully. May 17 00:29:20.544159 systemd-logind[1224]: Session 2 logged out. Waiting for processes to exit. May 17 00:29:20.546316 systemd-logind[1224]: Removed session 2. May 17 00:29:20.576351 systemd[1]: Started sshd@2-10.128.0.54:22-139.178.89.65:34490.service. May 17 00:29:20.883269 sshd[1328]: Accepted publickey for core from 139.178.89.65 port 34490 ssh2: RSA SHA256:jyE3lnafiBGDGJK6dHnApyF/jgfCnjVgkPORJQqM9Ps May 17 00:29:20.884822 sshd[1328]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:29:20.893387 systemd-logind[1224]: New session 3 of user core. May 17 00:29:20.894164 systemd[1]: Started session-3.scope. May 17 00:29:21.020333 instance-setup[1323]: INFO Running google_set_multiqueue. May 17 00:29:21.040668 instance-setup[1323]: INFO Set channels for eth0 to 2. May 17 00:29:21.045968 instance-setup[1323]: INFO Setting /proc/irq/31/smp_affinity_list to 0 for device virtio1. May 17 00:29:21.049296 instance-setup[1323]: INFO /proc/irq/31/smp_affinity_list: real affinity 0 May 17 00:29:21.049765 instance-setup[1323]: INFO Setting /proc/irq/32/smp_affinity_list to 0 for device virtio1. May 17 00:29:21.051729 instance-setup[1323]: INFO /proc/irq/32/smp_affinity_list: real affinity 0 May 17 00:29:21.052143 instance-setup[1323]: INFO Setting /proc/irq/33/smp_affinity_list to 1 for device virtio1. May 17 00:29:21.053672 instance-setup[1323]: INFO /proc/irq/33/smp_affinity_list: real affinity 1 May 17 00:29:21.054178 instance-setup[1323]: INFO Setting /proc/irq/34/smp_affinity_list to 1 for device virtio1. May 17 00:29:21.055823 instance-setup[1323]: INFO /proc/irq/34/smp_affinity_list: real affinity 1 May 17 00:29:21.069542 instance-setup[1323]: INFO Queue 0 XPS=1 for /sys/class/net/eth0/queues/tx-0/xps_cpus May 17 00:29:21.070120 instance-setup[1323]: INFO Queue 1 XPS=2 for /sys/class/net/eth0/queues/tx-1/xps_cpus May 17 00:29:21.094898 sshd[1328]: pam_unix(sshd:session): session closed for user core May 17 00:29:21.099799 systemd[1]: sshd@2-10.128.0.54:22-139.178.89.65:34490.service: Deactivated successfully. May 17 00:29:21.101023 systemd[1]: session-3.scope: Deactivated successfully. May 17 00:29:21.104004 systemd-logind[1224]: Session 3 logged out. Waiting for processes to exit. May 17 00:29:21.106179 systemd-logind[1224]: Removed session 3. May 17 00:29:21.127008 systemd-nspawn[1313]: + /usr/bin/google_metadata_script_runner --script-type startup May 17 00:29:21.141309 systemd[1]: Started sshd@3-10.128.0.54:22-139.178.89.65:34498.service. May 17 00:29:21.447530 sshd[1366]: Accepted publickey for core from 139.178.89.65 port 34498 ssh2: RSA SHA256:jyE3lnafiBGDGJK6dHnApyF/jgfCnjVgkPORJQqM9Ps May 17 00:29:21.449306 sshd[1366]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:29:21.460773 systemd-logind[1224]: New session 4 of user core. May 17 00:29:21.461375 systemd[1]: Started session-4.scope. May 17 00:29:21.560833 startup-script[1364]: INFO Starting startup scripts. May 17 00:29:21.575865 startup-script[1364]: INFO No startup scripts found in metadata. May 17 00:29:21.576059 startup-script[1364]: INFO Finished running startup scripts. May 17 00:29:21.623922 systemd-nspawn[1313]: + trap 'stopping=1 ; kill "${daemon_pids[@]}" || :' SIGTERM May 17 00:29:21.623922 systemd-nspawn[1313]: + daemon_pids=() May 17 00:29:21.623922 systemd-nspawn[1313]: + for d in accounts clock_skew network May 17 00:29:21.624856 systemd-nspawn[1313]: + daemon_pids+=($!) May 17 00:29:21.624856 systemd-nspawn[1313]: + for d in accounts clock_skew network May 17 00:29:21.624856 systemd-nspawn[1313]: + daemon_pids+=($!) May 17 00:29:21.624856 systemd-nspawn[1313]: + for d in accounts clock_skew network May 17 00:29:21.624856 systemd-nspawn[1313]: + /usr/bin/google_accounts_daemon May 17 00:29:21.624856 systemd-nspawn[1313]: + daemon_pids+=($!) May 17 00:29:21.624856 systemd-nspawn[1313]: + NOTIFY_SOCKET=/run/systemd/notify May 17 00:29:21.624856 systemd-nspawn[1313]: + /usr/bin/systemd-notify --ready May 17 00:29:21.625523 systemd-nspawn[1313]: + /usr/bin/google_network_daemon May 17 00:29:21.627633 systemd-nspawn[1313]: + /usr/bin/google_clock_skew_daemon May 17 00:29:21.666038 sshd[1366]: pam_unix(sshd:session): session closed for user core May 17 00:29:21.672278 systemd[1]: sshd@3-10.128.0.54:22-139.178.89.65:34498.service: Deactivated successfully. May 17 00:29:21.673639 systemd[1]: session-4.scope: Deactivated successfully. May 17 00:29:21.676938 systemd-logind[1224]: Session 4 logged out. Waiting for processes to exit. May 17 00:29:21.679068 systemd-logind[1224]: Removed session 4. May 17 00:29:21.713550 systemd[1]: Started sshd@4-10.128.0.54:22-139.178.89.65:34510.service. May 17 00:29:21.719183 systemd-nspawn[1313]: + wait -n 36 37 38 May 17 00:29:22.022257 sshd[1378]: Accepted publickey for core from 139.178.89.65 port 34510 ssh2: RSA SHA256:jyE3lnafiBGDGJK6dHnApyF/jgfCnjVgkPORJQqM9Ps May 17 00:29:22.023047 sshd[1378]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:29:22.031590 systemd-logind[1224]: New session 5 of user core. May 17 00:29:22.032288 systemd[1]: Started session-5.scope. May 17 00:29:22.227875 sudo[1383]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 17 00:29:22.228395 sudo[1383]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:29:22.238977 dbus-daemon[1181]: Э\x8dT\xebU: received setenforce notice (enforcing=1896845696) May 17 00:29:22.242033 sudo[1383]: pam_unix(sudo:session): session closed for user root May 17 00:29:22.289128 sshd[1378]: pam_unix(sshd:session): session closed for user core May 17 00:29:22.295034 systemd[1]: sshd@4-10.128.0.54:22-139.178.89.65:34510.service: Deactivated successfully. May 17 00:29:22.296358 systemd[1]: session-5.scope: Deactivated successfully. May 17 00:29:22.299101 systemd-logind[1224]: Session 5 logged out. Waiting for processes to exit. May 17 00:29:22.301253 systemd-logind[1224]: Removed session 5. May 17 00:29:22.336480 systemd[1]: Started sshd@5-10.128.0.54:22-139.178.89.65:34516.service. May 17 00:29:22.486411 groupadd[1393]: group added to /etc/group: name=google-sudoers, GID=1000 May 17 00:29:22.491137 groupadd[1393]: group added to /etc/gshadow: name=google-sudoers May 17 00:29:22.515292 groupadd[1393]: new group: name=google-sudoers, GID=1000 May 17 00:29:22.561248 google-accounts[1372]: INFO Starting Google Accounts daemon. May 17 00:29:22.598992 google-networking[1374]: INFO Starting Google Networking daemon. May 17 00:29:22.613782 google-clock-skew[1373]: INFO Starting Google Clock Skew daemon. May 17 00:29:22.631800 google-accounts[1372]: WARNING OS Login not installed. May 17 00:29:22.633784 google-accounts[1372]: INFO Creating a new user account for 0. May 17 00:29:22.634774 google-clock-skew[1373]: INFO Clock drift token has changed: 0. May 17 00:29:22.640933 systemd-nspawn[1313]: hwclock: Cannot access the Hardware Clock via any known method. May 17 00:29:22.640933 systemd-nspawn[1313]: hwclock: Use the --verbose option to see the details of our search for an access method. May 17 00:29:22.642133 google-clock-skew[1373]: WARNING Failed to sync system time with hardware clock. May 17 00:29:22.649299 sshd[1387]: Accepted publickey for core from 139.178.89.65 port 34516 ssh2: RSA SHA256:jyE3lnafiBGDGJK6dHnApyF/jgfCnjVgkPORJQqM9Ps May 17 00:29:22.651185 sshd[1387]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:29:22.652183 systemd-nspawn[1313]: useradd: invalid user name '0': use --badname to ignore May 17 00:29:22.653672 google-accounts[1372]: WARNING Could not create user 0. Command '['useradd', '-m', '-s', '/bin/bash', '-p', '*', '0']' returned non-zero exit status 3.. May 17 00:29:22.662023 systemd[1]: Started session-6.scope. May 17 00:29:22.663190 systemd-logind[1224]: New session 6 of user core. May 17 00:29:22.668970 google-accounts[1372]: ERROR Exception calling the response handler. [Errno 13] Permission denied: '/var/lib/google'. Traceback (most recent call last): File "/usr/lib/python3.9/site-packages/google_compute_engine/metadata_watcher.py", line 200, in WatchMetadata handler(response) File "/usr/lib/python3.9/site-packages/google_compute_engine/accounts/accounts_daemon.py", line 285, in HandleAccounts self.utils.SetConfiguredUsers(desired_users.keys()) File "/usr/lib/python3.9/site-packages/google_compute_engine/accounts/accounts_utils.py", line 324, in SetConfiguredUsers os.makedirs(self.google_users_dir) File "/usr/lib/python-exec/python3.9/../../../lib/python3.9/os.py", line 225, in makedirs mkdir(name, mode) PermissionError: [Errno 13] Permission denied: '/var/lib/google' May 17 00:29:22.823263 sudo[1406]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 17 00:29:22.823808 sudo[1406]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:29:22.829254 sudo[1406]: pam_unix(sudo:session): session closed for user root May 17 00:29:22.842832 sudo[1405]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 17 00:29:22.843324 sudo[1405]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:29:22.859955 systemd[1]: Stopping audit-rules.service... May 17 00:29:22.861000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 17 00:29:22.863004 auditctl[1409]: No rules May 17 00:29:22.864044 systemd[1]: audit-rules.service: Deactivated successfully. May 17 00:29:22.864384 systemd[1]: Stopped audit-rules.service. May 17 00:29:22.867885 kernel: kauditd_printk_skb: 181 callbacks suppressed May 17 00:29:22.868019 kernel: audit: type=1305 audit(1747441762.861:193): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 17 00:29:22.869016 systemd[1]: Starting audit-rules.service... May 17 00:29:22.861000 audit[1409]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc3a019570 a2=420 a3=0 items=0 ppid=1 pid=1409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:29:22.912764 kernel: audit: type=1300 audit(1747441762.861:193): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc3a019570 a2=420 a3=0 items=0 ppid=1 pid=1409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:29:22.861000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 17 00:29:22.921220 augenrules[1426]: No rules May 17 00:29:22.922214 kernel: audit: type=1327 audit(1747441762.861:193): proctitle=2F7362696E2F617564697463746C002D44 May 17 00:29:22.922318 kernel: audit: type=1131 audit(1747441762.861:194): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:22.861000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:22.923216 systemd[1]: Finished audit-rules.service. May 17 00:29:22.925378 sudo[1405]: pam_unix(sudo:session): session closed for user root May 17 00:29:22.921000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:22.967361 kernel: audit: type=1130 audit(1747441762.921:195): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:22.967580 kernel: audit: type=1106 audit(1747441762.921:196): pid=1405 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:29:22.921000 audit[1405]: USER_END pid=1405 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:29:22.921000 audit[1405]: CRED_DISP pid=1405 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:29:22.997356 sshd[1387]: pam_unix(sshd:session): session closed for user core May 17 00:29:23.004454 systemd-logind[1224]: Session 6 logged out. Waiting for processes to exit. May 17 00:29:23.007793 systemd[1]: sshd@5-10.128.0.54:22-139.178.89.65:34516.service: Deactivated successfully. May 17 00:29:23.009234 systemd[1]: session-6.scope: Deactivated successfully. May 17 00:29:23.019723 kernel: audit: type=1104 audit(1747441762.921:197): pid=1405 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:29:23.019880 kernel: audit: type=1106 audit(1747441762.999:198): pid=1387 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:29:22.999000 audit[1387]: USER_END pid=1387 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:29:23.052565 systemd[1]: Started sshd@6-10.128.0.54:22-139.178.89.65:34528.service. May 17 00:29:23.056026 systemd-logind[1224]: Removed session 6. May 17 00:29:22.999000 audit[1387]: CRED_DISP pid=1387 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:29:23.004000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.128.0.54:22-139.178.89.65:34516 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:23.105515 kernel: audit: type=1104 audit(1747441762.999:199): pid=1387 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:29:23.105660 kernel: audit: type=1131 audit(1747441763.004:200): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.128.0.54:22-139.178.89.65:34516 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:23.053000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.54:22-139.178.89.65:34528 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:23.348000 audit[1432]: USER_ACCT pid=1432 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:29:23.350274 sshd[1432]: Accepted publickey for core from 139.178.89.65 port 34528 ssh2: RSA SHA256:jyE3lnafiBGDGJK6dHnApyF/jgfCnjVgkPORJQqM9Ps May 17 00:29:23.351000 audit[1432]: CRED_ACQ pid=1432 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:29:23.351000 audit[1432]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdcce92ac0 a2=3 a3=0 items=0 ppid=1 pid=1432 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:29:23.351000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:29:23.352548 sshd[1432]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:29:23.360260 systemd[1]: Started session-7.scope. May 17 00:29:23.361077 systemd-logind[1224]: New session 7 of user core. May 17 00:29:23.369000 audit[1432]: USER_START pid=1432 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:29:23.371000 audit[1434]: CRED_ACQ pid=1434 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:29:23.526000 audit[1435]: USER_ACCT pid=1435 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:29:23.528757 sudo[1435]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 17 00:29:23.527000 audit[1435]: CRED_REFR pid=1435 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:29:23.529376 sudo[1435]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:29:23.530000 audit[1435]: USER_START pid=1435 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:29:23.566661 systemd[1]: Starting docker.service... May 17 00:29:23.618332 env[1445]: time="2025-05-17T00:29:23.617052787Z" level=info msg="Starting up" May 17 00:29:23.619344 env[1445]: time="2025-05-17T00:29:23.619281178Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 17 00:29:23.619344 env[1445]: time="2025-05-17T00:29:23.619309291Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 17 00:29:23.619519 env[1445]: time="2025-05-17T00:29:23.619358543Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 17 00:29:23.619519 env[1445]: time="2025-05-17T00:29:23.619378767Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 17 00:29:23.622169 env[1445]: time="2025-05-17T00:29:23.622138828Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 17 00:29:23.622310 env[1445]: time="2025-05-17T00:29:23.622290914Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 17 00:29:23.622411 env[1445]: time="2025-05-17T00:29:23.622389410Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 17 00:29:23.622492 env[1445]: time="2025-05-17T00:29:23.622475284Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 17 00:29:23.633962 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport2355846867-merged.mount: Deactivated successfully. May 17 00:29:23.669633 env[1445]: time="2025-05-17T00:29:23.669549867Z" level=info msg="Loading containers: start." May 17 00:29:23.768000 audit[1475]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1475 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:29:23.768000 audit[1475]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffc21d57840 a2=0 a3=7ffc21d5782c items=0 ppid=1445 pid=1475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:29:23.768000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 May 17 00:29:23.772000 audit[1478]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1478 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:29:23.772000 audit[1478]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7fffaf65e5e0 a2=0 a3=7fffaf65e5cc items=0 ppid=1445 pid=1478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:29:23.772000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 May 17 00:29:23.776000 audit[1480]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1480 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:29:23.776000 audit[1480]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffe9e732da0 a2=0 a3=7ffe9e732d8c items=0 ppid=1445 pid=1480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:29:23.776000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 17 00:29:23.779000 audit[1482]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1482 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:29:23.779000 audit[1482]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fffa21dba90 a2=0 a3=7fffa21dba7c items=0 ppid=1445 pid=1482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:29:23.779000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 17 00:29:23.783000 audit[1484]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1484 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:29:23.783000 audit[1484]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc0c120690 a2=0 a3=7ffc0c12067c items=0 ppid=1445 pid=1484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:29:23.783000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E May 17 00:29:23.805000 audit[1489]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1489 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:29:23.805000 audit[1489]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe277c4880 a2=0 a3=7ffe277c486c items=0 ppid=1445 pid=1489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:29:23.805000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E May 17 00:29:23.818000 audit[1491]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1491 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:29:23.818000 audit[1491]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff33446700 a2=0 a3=7fff334466ec items=0 ppid=1445 pid=1491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:29:23.818000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 May 17 00:29:23.822000 audit[1493]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1493 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:29:23.822000 audit[1493]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffdb686f3e0 a2=0 a3=7ffdb686f3cc items=0 ppid=1445 pid=1493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:29:23.822000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E May 17 00:29:23.825000 audit[1495]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1495 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:29:23.825000 audit[1495]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7fffd389ea20 a2=0 a3=7fffd389ea0c items=0 ppid=1445 pid=1495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:29:23.825000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 17 00:29:23.840000 audit[1499]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1499 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:29:23.840000 audit[1499]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffc0dff6430 a2=0 a3=7ffc0dff641c items=0 ppid=1445 pid=1499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:29:23.840000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 17 00:29:23.846000 audit[1500]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1500 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:29:23.846000 audit[1500]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffd21766c90 a2=0 a3=7ffd21766c7c items=0 ppid=1445 pid=1500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:29:23.846000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 17 00:29:23.865024 kernel: Initializing XFRM netlink socket May 17 00:29:23.915094 env[1445]: time="2025-05-17T00:29:23.914926358Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" May 17 00:29:23.951000 audit[1508]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1508 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:29:23.951000 audit[1508]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7fffc41bd010 a2=0 a3=7fffc41bcffc items=0 ppid=1445 pid=1508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:29:23.951000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 May 17 00:29:23.966000 audit[1511]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1511 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:29:23.966000 audit[1511]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7fff329dadf0 a2=0 a3=7fff329daddc items=0 ppid=1445 pid=1511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:29:23.966000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E May 17 00:29:23.972000 audit[1514]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1514 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:29:23.972000 audit[1514]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffe0b6978d0 a2=0 a3=7ffe0b6978bc items=0 ppid=1445 pid=1514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:29:23.972000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 May 17 00:29:23.975000 audit[1516]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1516 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:29:23.975000 audit[1516]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffd4b71ac00 a2=0 a3=7ffd4b71abec items=0 ppid=1445 pid=1516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:29:23.975000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 May 17 00:29:23.980000 audit[1518]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1518 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:29:23.980000 audit[1518]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7fffc3349240 a2=0 a3=7fffc334922c items=0 ppid=1445 pid=1518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:29:23.980000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 May 17 00:29:23.984000 audit[1520]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1520 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:29:23.984000 audit[1520]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffed9d07fb0 a2=0 a3=7ffed9d07f9c items=0 ppid=1445 pid=1520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:29:23.984000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 May 17 00:29:23.988000 audit[1522]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1522 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:29:23.988000 audit[1522]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffef557b3e0 a2=0 a3=7ffef557b3cc items=0 ppid=1445 pid=1522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:29:23.988000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 May 17 00:29:24.001000 audit[1525]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1525 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:29:24.001000 audit[1525]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffc86f785a0 a2=0 a3=7ffc86f7858c items=0 ppid=1445 pid=1525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:29:24.001000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 May 17 00:29:24.005000 audit[1527]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1527 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:29:24.005000 audit[1527]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffde7617d30 a2=0 a3=7ffde7617d1c items=0 ppid=1445 pid=1527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:29:24.005000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 17 00:29:24.009000 audit[1529]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1529 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:29:24.009000 audit[1529]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffe40df6f80 a2=0 a3=7ffe40df6f6c items=0 ppid=1445 pid=1529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:29:24.009000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 17 00:29:24.013000 audit[1531]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1531 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:29:24.013000 audit[1531]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc1d04a600 a2=0 a3=7ffc1d04a5ec items=0 ppid=1445 pid=1531 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:29:24.013000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 May 17 00:29:24.015930 systemd-networkd[1015]: docker0: Link UP May 17 00:29:24.032000 audit[1535]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1535 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:29:24.032000 audit[1535]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd1fa14670 a2=0 a3=7ffd1fa1465c items=0 ppid=1445 pid=1535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:29:24.032000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 17 00:29:24.037000 audit[1536]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1536 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:29:24.037000 audit[1536]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fffcda8b150 a2=0 a3=7fffcda8b13c items=0 ppid=1445 pid=1536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:29:24.037000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 17 00:29:24.039975 env[1445]: time="2025-05-17T00:29:24.039942345Z" level=info msg="Loading containers: done." May 17 00:29:24.060830 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck2672812030-merged.mount: Deactivated successfully. May 17 00:29:24.068816 env[1445]: time="2025-05-17T00:29:24.068739462Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 May 17 00:29:24.069122 env[1445]: time="2025-05-17T00:29:24.069093275Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 May 17 00:29:24.069327 env[1445]: time="2025-05-17T00:29:24.069286477Z" level=info msg="Daemon has completed initialization" May 17 00:29:24.094399 systemd[1]: Started docker.service. May 17 00:29:24.094000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:24.106263 env[1445]: time="2025-05-17T00:29:24.106154560Z" level=info msg="API listen on /run/docker.sock" May 17 00:29:25.154285 env[1216]: time="2025-05-17T00:29:25.154226708Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.33.1\"" May 17 00:29:25.424069 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 17 00:29:25.423000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:25.423000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:25.424521 systemd[1]: Stopped kubelet.service. May 17 00:29:25.424623 systemd[1]: kubelet.service: Consumed 1.605s CPU time. May 17 00:29:25.427426 systemd[1]: Starting kubelet.service... May 17 00:29:25.735044 systemd[1]: Started kubelet.service. May 17 00:29:25.734000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:25.804405 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3568025372.mount: Deactivated successfully. May 17 00:29:25.846267 kubelet[1572]: E0517 00:29:25.846171 1572 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:29:25.850000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 17 00:29:25.852125 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:29:25.852333 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:29:27.699948 env[1216]: time="2025-05-17T00:29:27.699851095Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.33.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:29:27.703363 env[1216]: time="2025-05-17T00:29:27.703300233Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c6ab243b29f82a6ce269a5342bfd9ea3d0d4ef0f2bb7e98c6ac0bde1aeafab66,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:29:27.706619 env[1216]: time="2025-05-17T00:29:27.706558705Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.33.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:29:27.709337 env[1216]: time="2025-05-17T00:29:27.709279861Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:d8ae2fb01c39aa1c7add84f3d54425cf081c24c11e3946830292a8cfa4293548,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:29:27.710520 env[1216]: time="2025-05-17T00:29:27.710438780Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.33.1\" returns image reference \"sha256:c6ab243b29f82a6ce269a5342bfd9ea3d0d4ef0f2bb7e98c6ac0bde1aeafab66\"" May 17 00:29:27.711477 env[1216]: time="2025-05-17T00:29:27.711439991Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.33.1\"" May 17 00:29:29.439781 env[1216]: time="2025-05-17T00:29:29.439702122Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.33.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:29:29.443066 env[1216]: time="2025-05-17T00:29:29.443014594Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ef43894fa110c389f7286f4d5a3ea176072c95280efeca60d6a79617cdbbf3e4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:29:29.446500 env[1216]: time="2025-05-17T00:29:29.446440578Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.33.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:29:29.449191 env[1216]: time="2025-05-17T00:29:29.449141874Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:7c9bea694e3a3c01ed6a5ee02d55a6124cc08e0b2eec6caa33f2c396b8cbc3f8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:29:29.450639 env[1216]: time="2025-05-17T00:29:29.450588177Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.33.1\" returns image reference \"sha256:ef43894fa110c389f7286f4d5a3ea176072c95280efeca60d6a79617cdbbf3e4\"" May 17 00:29:29.451615 env[1216]: time="2025-05-17T00:29:29.451580000Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.33.1\"" May 17 00:29:30.928210 env[1216]: time="2025-05-17T00:29:30.928130236Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.33.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:29:30.931648 env[1216]: time="2025-05-17T00:29:30.931585119Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:398c985c0d950becc8dcdab5877a8a517ffeafca0792b3fe5f1acff218aeac49,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:29:30.934359 env[1216]: time="2025-05-17T00:29:30.934308288Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.33.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:29:30.937061 env[1216]: time="2025-05-17T00:29:30.937010872Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:395b7de7cdbdcc3c3a3db270844a3f71d757e2447a1e4db76b4cce46fba7fd55,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:29:30.938399 env[1216]: time="2025-05-17T00:29:30.938340061Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.33.1\" returns image reference \"sha256:398c985c0d950becc8dcdab5877a8a517ffeafca0792b3fe5f1acff218aeac49\"" May 17 00:29:30.939379 env[1216]: time="2025-05-17T00:29:30.939343111Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.33.1\"" May 17 00:29:32.103492 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1374330596.mount: Deactivated successfully. May 17 00:29:32.997028 env[1216]: time="2025-05-17T00:29:32.996962808Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.33.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:29:33.006584 env[1216]: time="2025-05-17T00:29:33.006521113Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b79c189b052cdbe0e837d0caa6faf1d9fd696d8664fcc462f67d9ea51f26fef2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:29:33.010275 env[1216]: time="2025-05-17T00:29:33.010202777Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.33.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:29:33.013300 env[1216]: time="2025-05-17T00:29:33.013237179Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:7ddf379897139ae8ade8b33cb9373b70c632a4d5491da6e234f5d830e0a50807,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:29:33.014622 env[1216]: time="2025-05-17T00:29:33.014563935Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.33.1\" returns image reference \"sha256:b79c189b052cdbe0e837d0caa6faf1d9fd696d8664fcc462f67d9ea51f26fef2\"" May 17 00:29:33.015459 env[1216]: time="2025-05-17T00:29:33.015420541Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.12.0\"" May 17 00:29:33.453747 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount218852162.mount: Deactivated successfully. May 17 00:29:34.921207 env[1216]: time="2025-05-17T00:29:34.921126095Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.12.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:29:34.925274 env[1216]: time="2025-05-17T00:29:34.925213090Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1cf5f116067c67da67f97bff78c4bbc76913f59057c18627b96facaced73ea0b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:29:34.928609 env[1216]: time="2025-05-17T00:29:34.928539857Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.12.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:29:34.931838 env[1216]: time="2025-05-17T00:29:34.931783560Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:40384aa1f5ea6bfdc77997d243aec73da05f27aed0c5e9d65bfa98933c519d97,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:29:34.933188 env[1216]: time="2025-05-17T00:29:34.933126525Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.12.0\" returns image reference \"sha256:1cf5f116067c67da67f97bff78c4bbc76913f59057c18627b96facaced73ea0b\"" May 17 00:29:34.934233 env[1216]: time="2025-05-17T00:29:34.934173835Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" May 17 00:29:35.348343 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount288613091.mount: Deactivated successfully. May 17 00:29:35.356508 env[1216]: time="2025-05-17T00:29:35.356442547Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:29:35.359369 env[1216]: time="2025-05-17T00:29:35.359284964Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:29:35.362098 env[1216]: time="2025-05-17T00:29:35.361983363Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:29:35.365491 env[1216]: time="2025-05-17T00:29:35.365436400Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:29:35.366421 env[1216]: time="2025-05-17T00:29:35.366362435Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136\"" May 17 00:29:35.369368 env[1216]: time="2025-05-17T00:29:35.369300125Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.21-0\"" May 17 00:29:36.074000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:36.074981 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. May 17 00:29:36.075322 systemd[1]: Stopped kubelet.service. May 17 00:29:36.078257 systemd[1]: Starting kubelet.service... May 17 00:29:36.085344 kernel: kauditd_printk_skb: 88 callbacks suppressed May 17 00:29:36.085516 kernel: audit: type=1130 audit(1747441776.074:239): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:36.126129 kernel: audit: type=1131 audit(1747441776.074:240): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:36.074000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:37.049000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:37.050028 systemd[1]: Started kubelet.service. May 17 00:29:37.073208 kernel: audit: type=1130 audit(1747441777.049:241): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:37.130509 kubelet[1583]: E0517 00:29:37.130454 1583 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:29:37.134000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 17 00:29:37.134386 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:29:37.156771 kernel: audit: type=1131 audit(1747441777.134:242): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 17 00:29:37.134619 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:29:39.204976 env[1216]: time="2025-05-17T00:29:39.204867203Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.21-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:29:39.210495 env[1216]: time="2025-05-17T00:29:39.210426625Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:499038711c0816eda03a1ad96a8eb0440c005baa6949698223c6176b7f5077e1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:29:39.215455 env[1216]: time="2025-05-17T00:29:39.215382786Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.21-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:29:39.219841 env[1216]: time="2025-05-17T00:29:39.219755978Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:d58c035df557080a27387d687092e3fc2b64c6d0e3162dc51453a115f847d121,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:29:39.221656 env[1216]: time="2025-05-17T00:29:39.221589713Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.21-0\" returns image reference \"sha256:499038711c0816eda03a1ad96a8eb0440c005baa6949698223c6176b7f5077e1\"" May 17 00:29:42.251883 systemd[1]: systemd-hostnamed.service: Deactivated successfully. May 17 00:29:42.276002 kernel: audit: type=1131 audit(1747441782.251:243): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:42.251000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:42.293000 audit: BPF prog-id=44 op=UNLOAD May 17 00:29:42.301778 kernel: audit: type=1334 audit(1747441782.293:244): prog-id=44 op=UNLOAD May 17 00:29:42.293000 audit: BPF prog-id=43 op=UNLOAD May 17 00:29:42.309748 kernel: audit: type=1334 audit(1747441782.293:245): prog-id=43 op=UNLOAD May 17 00:29:42.293000 audit: BPF prog-id=42 op=UNLOAD May 17 00:29:42.317760 kernel: audit: type=1334 audit(1747441782.293:246): prog-id=42 op=UNLOAD May 17 00:29:44.662828 systemd[1]: Stopped kubelet.service. May 17 00:29:44.687412 kernel: audit: type=1130 audit(1747441784.662:247): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:44.662000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:44.668039 systemd[1]: Starting kubelet.service... May 17 00:29:44.663000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:44.714105 kernel: audit: type=1131 audit(1747441784.663:248): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:44.753767 systemd[1]: Reloading. May 17 00:29:44.977242 /usr/lib/systemd/system-generators/torcx-generator[1637]: time="2025-05-17T00:29:44Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:29:44.979135 /usr/lib/systemd/system-generators/torcx-generator[1637]: time="2025-05-17T00:29:44Z" level=info msg="torcx already run" May 17 00:29:45.116205 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:29:45.116244 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:29:45.143940 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:29:45.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.272750 kernel: audit: type=1400 audit(1747441785.249:249): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.317079 kernel: audit: type=1400 audit(1747441785.249:250): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.317280 kernel: audit: type=1400 audit(1747441785.249:251): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.317347 kernel: audit: type=1400 audit(1747441785.249:252): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.270000 audit: BPF prog-id=46 op=LOAD May 17 00:29:45.270000 audit: BPF prog-id=27 op=UNLOAD May 17 00:29:45.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.270000 audit: BPF prog-id=47 op=LOAD May 17 00:29:45.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.270000 audit: BPF prog-id=48 op=LOAD May 17 00:29:45.270000 audit: BPF prog-id=28 op=UNLOAD May 17 00:29:45.270000 audit: BPF prog-id=29 op=UNLOAD May 17 00:29:45.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.354000 audit: BPF prog-id=49 op=LOAD May 17 00:29:45.354000 audit: BPF prog-id=37 op=UNLOAD May 17 00:29:45.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.357000 audit: BPF prog-id=50 op=LOAD May 17 00:29:45.357000 audit: BPF prog-id=36 op=UNLOAD May 17 00:29:45.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.358000 audit: BPF prog-id=51 op=LOAD May 17 00:29:45.358000 audit: BPF prog-id=30 op=UNLOAD May 17 00:29:45.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.362000 audit: BPF prog-id=52 op=LOAD May 17 00:29:45.362000 audit: BPF prog-id=41 op=UNLOAD May 17 00:29:45.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.364000 audit: BPF prog-id=53 op=LOAD May 17 00:29:45.364000 audit: BPF prog-id=38 op=UNLOAD May 17 00:29:45.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.364000 audit: BPF prog-id=54 op=LOAD May 17 00:29:45.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.365000 audit: BPF prog-id=55 op=LOAD May 17 00:29:45.365000 audit: BPF prog-id=39 op=UNLOAD May 17 00:29:45.365000 audit: BPF prog-id=40 op=UNLOAD May 17 00:29:45.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.365000 audit: BPF prog-id=56 op=LOAD May 17 00:29:45.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.365000 audit: BPF prog-id=57 op=LOAD May 17 00:29:45.365000 audit: BPF prog-id=31 op=UNLOAD May 17 00:29:45.365000 audit: BPF prog-id=32 op=UNLOAD May 17 00:29:45.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.367000 audit: BPF prog-id=58 op=LOAD May 17 00:29:45.367000 audit: BPF prog-id=33 op=UNLOAD May 17 00:29:45.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.368000 audit: BPF prog-id=59 op=LOAD May 17 00:29:45.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:45.368000 audit: BPF prog-id=60 op=LOAD May 17 00:29:45.368000 audit: BPF prog-id=34 op=UNLOAD May 17 00:29:45.368000 audit: BPF prog-id=35 op=UNLOAD May 17 00:29:45.401899 systemd[1]: Started kubelet.service. May 17 00:29:45.400000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:45.406788 systemd[1]: Stopping kubelet.service... May 17 00:29:45.406000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:45.407586 systemd[1]: kubelet.service: Deactivated successfully. May 17 00:29:45.407957 systemd[1]: Stopped kubelet.service. May 17 00:29:45.411219 systemd[1]: Starting kubelet.service... May 17 00:29:45.742000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:45.742988 systemd[1]: Started kubelet.service. May 17 00:29:45.820541 kubelet[1689]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:29:45.820541 kubelet[1689]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. May 17 00:29:45.820541 kubelet[1689]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:29:45.821261 kubelet[1689]: I0517 00:29:45.820667 1689 server.go:212] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 17 00:29:46.390872 kubelet[1689]: I0517 00:29:46.390799 1689 server.go:530] "Kubelet version" kubeletVersion="v1.33.0" May 17 00:29:46.390872 kubelet[1689]: I0517 00:29:46.390845 1689 server.go:532] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 17 00:29:46.391268 kubelet[1689]: I0517 00:29:46.391224 1689 server.go:956] "Client rotation is on, will bootstrap in background" May 17 00:29:46.478443 kubelet[1689]: E0517 00:29:46.478363 1689 certificate_manager.go:596] "Failed while requesting a signed certificate from the control plane" err="cannot create certificate signing request: Post \"https://10.128.0.54:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.128.0.54:6443: connect: connection refused" logger="kubernetes.io/kube-apiserver-client-kubelet.UnhandledError" May 17 00:29:46.482594 kubelet[1689]: I0517 00:29:46.482548 1689 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 17 00:29:46.496267 kubelet[1689]: E0517 00:29:46.496062 1689 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 17 00:29:46.496267 kubelet[1689]: I0517 00:29:46.496140 1689 server.go:1423] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 17 00:29:46.505743 kubelet[1689]: I0517 00:29:46.505673 1689 server.go:782] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 17 00:29:46.506190 kubelet[1689]: I0517 00:29:46.506114 1689 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 17 00:29:46.506448 kubelet[1689]: I0517 00:29:46.506165 1689 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"MemoryManagerPolicy":"None","MemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 17 00:29:46.506448 kubelet[1689]: I0517 00:29:46.506446 1689 topology_manager.go:138] "Creating topology manager with none policy" May 17 00:29:46.506768 kubelet[1689]: I0517 00:29:46.506466 1689 container_manager_linux.go:303] "Creating device plugin manager" May 17 00:29:46.508500 kubelet[1689]: I0517 00:29:46.508444 1689 state_mem.go:36] "Initialized new in-memory state store" May 17 00:29:46.513001 kubelet[1689]: I0517 00:29:46.512927 1689 kubelet.go:480] "Attempting to sync node with API server" May 17 00:29:46.513001 kubelet[1689]: I0517 00:29:46.512975 1689 kubelet.go:375] "Adding static pod path" path="/etc/kubernetes/manifests" May 17 00:29:46.513249 kubelet[1689]: I0517 00:29:46.513021 1689 kubelet.go:386] "Adding apiserver pod source" May 17 00:29:46.513249 kubelet[1689]: I0517 00:29:46.513050 1689 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 17 00:29:46.547367 kubelet[1689]: E0517 00:29:46.547277 1689 reflector.go:200] "Failed to watch" err="failed to list *v1.Service: Get \"https://10.128.0.54:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.128.0.54:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Service" May 17 00:29:46.551995 kubelet[1689]: E0517 00:29:46.551881 1689 reflector.go:200] "Failed to watch" err="failed to list *v1.Node: Get \"https://10.128.0.54:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7&limit=500&resourceVersion=0\": dial tcp 10.128.0.54:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Node" May 17 00:29:46.552425 kubelet[1689]: I0517 00:29:46.552386 1689 kuberuntime_manager.go:279] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 17 00:29:46.553482 kubelet[1689]: I0517 00:29:46.553450 1689 kubelet.go:935] "Not starting ClusterTrustBundle informer because we are in static kubelet mode or the ClusterTrustBundleProjection featuregate is disabled" May 17 00:29:46.558251 kubelet[1689]: W0517 00:29:46.558186 1689 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 17 00:29:46.574542 kubelet[1689]: I0517 00:29:46.574492 1689 watchdog_linux.go:99] "Systemd watchdog is not enabled" May 17 00:29:46.574741 kubelet[1689]: I0517 00:29:46.574626 1689 server.go:1289] "Started kubelet" May 17 00:29:46.585252 kubelet[1689]: I0517 00:29:46.585158 1689 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 17 00:29:46.585920 kubelet[1689]: I0517 00:29:46.585709 1689 server.go:255] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 17 00:29:46.586269 kubelet[1689]: I0517 00:29:46.586154 1689 server.go:180] "Starting to listen" address="0.0.0.0" port=10250 May 17 00:29:46.590000 audit[1689]: AVC avc: denied { mac_admin } for pid=1689 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:46.590000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:29:46.590000 audit[1689]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00051e450 a1=c000a1ce70 a2=c00051e420 a3=25 items=0 ppid=1 pid=1689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:29:46.590000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:29:46.591763 kubelet[1689]: I0517 00:29:46.591685 1689 kubelet.go:1552] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" May 17 00:29:46.591977 kubelet[1689]: I0517 00:29:46.591947 1689 kubelet.go:1556] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" May 17 00:29:46.592221 kubelet[1689]: I0517 00:29:46.592201 1689 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 17 00:29:46.591000 audit[1689]: AVC avc: denied { mac_admin } for pid=1689 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:46.591000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:29:46.591000 audit[1689]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0000e3800 a1=c000a1ce88 a2=c00051e570 a3=25 items=0 ppid=1 pid=1689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:29:46.591000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:29:46.593383 kubelet[1689]: E0517 00:29:46.589026 1689 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.128.0.54:6443/api/v1/namespaces/default/events\": dial tcp 10.128.0.54:6443: connect: connection refused" event="&Event{ObjectMeta:{ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7.1840290bea734987 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7,UID:ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7,},FirstTimestamp:2025-05-17 00:29:46.574555527 +0000 UTC m=+0.822351603,LastTimestamp:2025-05-17 00:29:46.574555527 +0000 UTC m=+0.822351603,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7,}" May 17 00:29:46.594420 kubelet[1689]: I0517 00:29:46.594377 1689 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 17 00:29:46.595150 kubelet[1689]: I0517 00:29:46.595123 1689 server.go:317] "Adding debug handlers to kubelet server" May 17 00:29:46.597990 kubelet[1689]: I0517 00:29:46.597945 1689 volume_manager.go:297] "Starting Kubelet Volume Manager" May 17 00:29:46.598518 kubelet[1689]: E0517 00:29:46.598481 1689 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7\" not found" May 17 00:29:46.599521 kubelet[1689]: I0517 00:29:46.599486 1689 desired_state_of_world_populator.go:150] "Desired state populator starts to run" May 17 00:29:46.599635 kubelet[1689]: I0517 00:29:46.599568 1689 reconciler.go:26] "Reconciler: start to sync state" May 17 00:29:46.602059 kubelet[1689]: E0517 00:29:46.602021 1689 reflector.go:200] "Failed to watch" err="failed to list *v1.CSIDriver: Get \"https://10.128.0.54:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.128.0.54:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.CSIDriver" May 17 00:29:46.602230 kubelet[1689]: E0517 00:29:46.602151 1689 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.54:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7?timeout=10s\": dial tcp 10.128.0.54:6443: connect: connection refused" interval="200ms" May 17 00:29:46.606217 kubelet[1689]: E0517 00:29:46.606173 1689 kubelet.go:1600] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 17 00:29:46.606655 kubelet[1689]: I0517 00:29:46.606604 1689 factory.go:223] Registration of the containerd container factory successfully May 17 00:29:46.606867 kubelet[1689]: I0517 00:29:46.606847 1689 factory.go:223] Registration of the systemd container factory successfully May 17 00:29:46.607193 kubelet[1689]: I0517 00:29:46.607144 1689 factory.go:221] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 17 00:29:46.609000 audit[1708]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1708 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:29:46.609000 audit[1708]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd62d41130 a2=0 a3=7ffd62d4111c items=0 ppid=1689 pid=1708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:29:46.609000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 17 00:29:46.613000 audit[1709]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1709 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:29:46.613000 audit[1709]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeab4d2670 a2=0 a3=7ffeab4d265c items=0 ppid=1689 pid=1709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:29:46.613000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 17 00:29:46.618000 audit[1711]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1711 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:29:46.618000 audit[1711]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff7d789c90 a2=0 a3=7fff7d789c7c items=0 ppid=1689 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:29:46.618000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:29:46.624000 audit[1713]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1713 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:29:46.624000 audit[1713]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffbdc436f0 a2=0 a3=7fffbdc436dc items=0 ppid=1689 pid=1713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:29:46.624000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:29:46.638299 kubelet[1689]: I0517 00:29:46.637858 1689 cpu_manager.go:221] "Starting CPU manager" policy="none" May 17 00:29:46.638299 kubelet[1689]: I0517 00:29:46.637882 1689 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" May 17 00:29:46.638299 kubelet[1689]: I0517 00:29:46.637925 1689 state_mem.go:36] "Initialized new in-memory state store" May 17 00:29:46.646796 kubelet[1689]: I0517 00:29:46.641925 1689 policy_none.go:49] "None policy: Start" May 17 00:29:46.646796 kubelet[1689]: I0517 00:29:46.641984 1689 memory_manager.go:186] "Starting memorymanager" policy="None" May 17 00:29:46.646796 kubelet[1689]: I0517 00:29:46.642006 1689 state_mem.go:35] "Initializing new in-memory state store" May 17 00:29:46.655000 audit[1717]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1717 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:29:46.655000 audit[1717]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffde2825ac0 a2=0 a3=7ffde2825aac items=0 ppid=1689 pid=1717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:29:46.656766 systemd[1]: Created slice kubepods.slice. May 17 00:29:46.655000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 17 00:29:46.658918 kubelet[1689]: I0517 00:29:46.658859 1689 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv4" May 17 00:29:46.660000 audit[1718]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1718 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:29:46.660000 audit[1718]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe540eeff0 a2=0 a3=7ffe540eefdc items=0 ppid=1689 pid=1718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:29:46.660000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 17 00:29:46.667000 audit[1719]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1719 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:29:46.667000 audit[1719]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffef7c131e0 a2=0 a3=7ffef7c131cc items=0 ppid=1689 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:29:46.667000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 17 00:29:46.669046 systemd[1]: Created slice kubepods-burstable.slice. May 17 00:29:46.670035 kubelet[1689]: I0517 00:29:46.670007 1689 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv6" May 17 00:29:46.670183 kubelet[1689]: I0517 00:29:46.670169 1689 status_manager.go:230] "Starting to sync pod status with apiserver" May 17 00:29:46.670335 kubelet[1689]: I0517 00:29:46.670320 1689 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." May 17 00:29:46.670435 kubelet[1689]: I0517 00:29:46.670421 1689 kubelet.go:2436] "Starting kubelet main sync loop" May 17 00:29:46.670614 kubelet[1689]: E0517 00:29:46.670571 1689 kubelet.go:2460] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 17 00:29:46.676015 kubelet[1689]: E0517 00:29:46.675976 1689 reflector.go:200] "Failed to watch" err="failed to list *v1.RuntimeClass: Get \"https://10.128.0.54:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.128.0.54:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.RuntimeClass" May 17 00:29:46.676000 audit[1720]: NETFILTER_CFG table=mangle:33 family=10 entries=1 op=nft_register_chain pid=1720 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:29:46.676000 audit[1720]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffef9727dc0 a2=0 a3=7ffef9727dac items=0 ppid=1689 pid=1720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:29:46.676000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 17 00:29:46.678000 audit[1721]: NETFILTER_CFG table=nat:34 family=10 entries=2 op=nft_register_chain pid=1721 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:29:46.678000 audit[1721]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffc911eab80 a2=0 a3=7ffc911eab6c items=0 ppid=1689 pid=1721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:29:46.678000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 17 00:29:46.681000 audit[1722]: NETFILTER_CFG table=filter:35 family=10 entries=2 op=nft_register_chain pid=1722 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:29:46.681000 audit[1722]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffeafce9510 a2=0 a3=7ffeafce94fc items=0 ppid=1689 pid=1722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:29:46.681000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 17 00:29:46.685469 systemd[1]: Created slice kubepods-besteffort.slice. May 17 00:29:46.685000 audit[1723]: NETFILTER_CFG table=nat:36 family=2 entries=1 op=nft_register_chain pid=1723 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:29:46.685000 audit[1723]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe56e1f840 a2=0 a3=7ffe56e1f82c items=0 ppid=1689 pid=1723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:29:46.685000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 17 00:29:46.694000 audit[1724]: NETFILTER_CFG table=filter:37 family=2 entries=1 op=nft_register_chain pid=1724 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:29:46.694000 audit[1724]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeb0314860 a2=0 a3=7ffeb031484c items=0 ppid=1689 pid=1724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:29:46.694000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 17 00:29:46.697193 kubelet[1689]: E0517 00:29:46.697147 1689 manager.go:517] "Failed to read data from checkpoint" err="checkpoint is not found" checkpoint="kubelet_internal_checkpoint" May 17 00:29:46.696000 audit[1689]: AVC avc: denied { mac_admin } for pid=1689 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:46.696000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:29:46.696000 audit[1689]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000cda570 a1=c000cec930 a2=c000cda540 a3=25 items=0 ppid=1 pid=1689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:29:46.696000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:29:46.697785 kubelet[1689]: E0517 00:29:46.697262 1689 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" path="/var/lib/kubelet/device-plugins/" May 17 00:29:46.697785 kubelet[1689]: I0517 00:29:46.697440 1689 eviction_manager.go:189] "Eviction manager: starting control loop" May 17 00:29:46.697785 kubelet[1689]: I0517 00:29:46.697461 1689 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 17 00:29:46.698136 kubelet[1689]: I0517 00:29:46.698111 1689 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 17 00:29:46.703552 kubelet[1689]: E0517 00:29:46.703503 1689 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" May 17 00:29:46.703874 kubelet[1689]: E0517 00:29:46.703851 1689 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7\" not found" May 17 00:29:46.796968 systemd[1]: Created slice kubepods-burstable-pod1f230bbcb289b8683d925b75c174d24f.slice. May 17 00:29:46.805189 kubelet[1689]: E0517 00:29:46.805135 1689 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.54:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7?timeout=10s\": dial tcp 10.128.0.54:6443: connect: connection refused" interval="400ms" May 17 00:29:46.806084 kubelet[1689]: E0517 00:29:46.806045 1689 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7\" not found" node="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:29:46.810437 kubelet[1689]: I0517 00:29:46.809856 1689 kubelet_node_status.go:75] "Attempting to register node" node="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:29:46.810895 kubelet[1689]: E0517 00:29:46.810863 1689 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.128.0.54:6443/api/v1/nodes\": dial tcp 10.128.0.54:6443: connect: connection refused" node="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:29:46.814212 systemd[1]: Created slice kubepods-burstable-pode8d9d526d1fb8ca54826425c7b8d4039.slice. May 17 00:29:46.819558 kubelet[1689]: E0517 00:29:46.819494 1689 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7\" not found" node="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:29:46.822591 systemd[1]: Created slice kubepods-burstable-pod43481a7f9c10ac9d15cdc09752a2cf26.slice. May 17 00:29:46.825313 kubelet[1689]: E0517 00:29:46.825265 1689 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7\" not found" node="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:29:46.900174 kubelet[1689]: I0517 00:29:46.899973 1689 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/1f230bbcb289b8683d925b75c174d24f-k8s-certs\") pod \"kube-apiserver-ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7\" (UID: \"1f230bbcb289b8683d925b75c174d24f\") " pod="kube-system/kube-apiserver-ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:29:46.900174 kubelet[1689]: I0517 00:29:46.900085 1689 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/1f230bbcb289b8683d925b75c174d24f-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7\" (UID: \"1f230bbcb289b8683d925b75c174d24f\") " pod="kube-system/kube-apiserver-ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:29:46.900174 kubelet[1689]: I0517 00:29:46.900144 1689 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/e8d9d526d1fb8ca54826425c7b8d4039-flexvolume-dir\") pod \"kube-controller-manager-ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7\" (UID: \"e8d9d526d1fb8ca54826425c7b8d4039\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:29:46.900531 kubelet[1689]: I0517 00:29:46.900183 1689 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/e8d9d526d1fb8ca54826425c7b8d4039-kubeconfig\") pod \"kube-controller-manager-ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7\" (UID: \"e8d9d526d1fb8ca54826425c7b8d4039\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:29:46.900531 kubelet[1689]: I0517 00:29:46.900219 1689 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/e8d9d526d1fb8ca54826425c7b8d4039-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7\" (UID: \"e8d9d526d1fb8ca54826425c7b8d4039\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:29:46.900531 kubelet[1689]: I0517 00:29:46.900298 1689 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/43481a7f9c10ac9d15cdc09752a2cf26-kubeconfig\") pod \"kube-scheduler-ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7\" (UID: \"43481a7f9c10ac9d15cdc09752a2cf26\") " pod="kube-system/kube-scheduler-ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:29:46.900531 kubelet[1689]: I0517 00:29:46.900329 1689 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/1f230bbcb289b8683d925b75c174d24f-ca-certs\") pod \"kube-apiserver-ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7\" (UID: \"1f230bbcb289b8683d925b75c174d24f\") " pod="kube-system/kube-apiserver-ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:29:46.900894 kubelet[1689]: I0517 00:29:46.900361 1689 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/e8d9d526d1fb8ca54826425c7b8d4039-ca-certs\") pod \"kube-controller-manager-ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7\" (UID: \"e8d9d526d1fb8ca54826425c7b8d4039\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:29:46.900894 kubelet[1689]: I0517 00:29:46.900401 1689 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/e8d9d526d1fb8ca54826425c7b8d4039-k8s-certs\") pod \"kube-controller-manager-ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7\" (UID: \"e8d9d526d1fb8ca54826425c7b8d4039\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:29:47.017089 kubelet[1689]: I0517 00:29:47.017014 1689 kubelet_node_status.go:75] "Attempting to register node" node="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:29:47.017549 kubelet[1689]: E0517 00:29:47.017483 1689 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.128.0.54:6443/api/v1/nodes\": dial tcp 10.128.0.54:6443: connect: connection refused" node="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:29:47.108506 env[1216]: time="2025-05-17T00:29:47.108442797Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7,Uid:1f230bbcb289b8683d925b75c174d24f,Namespace:kube-system,Attempt:0,}" May 17 00:29:47.122144 env[1216]: time="2025-05-17T00:29:47.122062157Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7,Uid:e8d9d526d1fb8ca54826425c7b8d4039,Namespace:kube-system,Attempt:0,}" May 17 00:29:47.127518 env[1216]: time="2025-05-17T00:29:47.127425984Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7,Uid:43481a7f9c10ac9d15cdc09752a2cf26,Namespace:kube-system,Attempt:0,}" May 17 00:29:47.208502 kubelet[1689]: E0517 00:29:47.206585 1689 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.54:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7?timeout=10s\": dial tcp 10.128.0.54:6443: connect: connection refused" interval="800ms" May 17 00:29:47.423194 kubelet[1689]: I0517 00:29:47.423146 1689 kubelet_node_status.go:75] "Attempting to register node" node="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:29:47.423671 kubelet[1689]: E0517 00:29:47.423619 1689 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.128.0.54:6443/api/v1/nodes\": dial tcp 10.128.0.54:6443: connect: connection refused" node="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:29:47.605049 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3296989224.mount: Deactivated successfully. May 17 00:29:47.607432 kubelet[1689]: E0517 00:29:47.607378 1689 reflector.go:200] "Failed to watch" err="failed to list *v1.Service: Get \"https://10.128.0.54:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.128.0.54:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Service" May 17 00:29:47.616480 env[1216]: time="2025-05-17T00:29:47.616404990Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:29:47.619252 env[1216]: time="2025-05-17T00:29:47.619192677Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:29:47.620891 env[1216]: time="2025-05-17T00:29:47.620827826Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:29:47.622315 env[1216]: time="2025-05-17T00:29:47.622240902Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:29:47.626370 env[1216]: time="2025-05-17T00:29:47.626310925Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:29:47.628955 env[1216]: time="2025-05-17T00:29:47.628910076Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:29:47.633243 env[1216]: time="2025-05-17T00:29:47.633175827Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:29:47.635045 env[1216]: time="2025-05-17T00:29:47.634993727Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:29:47.637259 env[1216]: time="2025-05-17T00:29:47.637183637Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:29:47.640499 env[1216]: time="2025-05-17T00:29:47.640425146Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:29:47.644321 env[1216]: time="2025-05-17T00:29:47.644231582Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:29:47.650106 env[1216]: time="2025-05-17T00:29:47.650037384Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:29:47.698973 env[1216]: time="2025-05-17T00:29:47.693310851Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:29:47.698973 env[1216]: time="2025-05-17T00:29:47.693369562Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:29:47.698973 env[1216]: time="2025-05-17T00:29:47.693389397Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:29:47.698973 env[1216]: time="2025-05-17T00:29:47.693575100Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b922ad6d3f25901a369a908d2538907aec55b47be3d091cde532cec7d3ddf02b pid=1733 runtime=io.containerd.runc.v2 May 17 00:29:47.711047 env[1216]: time="2025-05-17T00:29:47.707515068Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:29:47.711047 env[1216]: time="2025-05-17T00:29:47.707586351Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:29:47.711047 env[1216]: time="2025-05-17T00:29:47.707613054Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:29:47.711047 env[1216]: time="2025-05-17T00:29:47.707837436Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ef86b9aebf8ae12a88d68cdbccfdb8cc53aae0e6f85defa13ff369975c43549a pid=1752 runtime=io.containerd.runc.v2 May 17 00:29:47.734634 env[1216]: time="2025-05-17T00:29:47.734487833Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:29:47.734634 env[1216]: time="2025-05-17T00:29:47.734579162Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:29:47.735013 env[1216]: time="2025-05-17T00:29:47.734601204Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:29:47.735171 env[1216]: time="2025-05-17T00:29:47.734981378Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1ce23735f771bcbd4563ac66def37c81bc6d723acde21b97565c1b335493a0e1 pid=1770 runtime=io.containerd.runc.v2 May 17 00:29:47.747941 kubelet[1689]: E0517 00:29:47.747880 1689 reflector.go:200] "Failed to watch" err="failed to list *v1.Node: Get \"https://10.128.0.54:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7&limit=500&resourceVersion=0\": dial tcp 10.128.0.54:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Node" May 17 00:29:47.757916 systemd[1]: Started cri-containerd-ef86b9aebf8ae12a88d68cdbccfdb8cc53aae0e6f85defa13ff369975c43549a.scope. May 17 00:29:47.781620 systemd[1]: Started cri-containerd-b922ad6d3f25901a369a908d2538907aec55b47be3d091cde532cec7d3ddf02b.scope. May 17 00:29:47.810390 systemd[1]: Started cri-containerd-1ce23735f771bcbd4563ac66def37c81bc6d723acde21b97565c1b335493a0e1.scope. May 17 00:29:47.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.827604 kernel: kauditd_printk_skb: 219 callbacks suppressed May 17 00:29:47.827763 kernel: audit: type=1400 audit(1747441787.819:439): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.840208 kubelet[1689]: E0517 00:29:47.839897 1689 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.128.0.54:6443/api/v1/namespaces/default/events\": dial tcp 10.128.0.54:6443: connect: connection refused" event="&Event{ObjectMeta:{ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7.1840290bea734987 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7,UID:ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7,},FirstTimestamp:2025-05-17 00:29:46.574555527 +0000 UTC m=+0.822351603,LastTimestamp:2025-05-17 00:29:46.574555527 +0000 UTC m=+0.822351603,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7,}" May 17 00:29:47.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.875709 kernel: audit: type=1400 audit(1747441787.819:440): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.875878 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 17 00:29:47.899952 kernel: audit: type=1400 audit(1747441787.819:441): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.900190 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 May 17 00:29:47.900252 kernel: audit: backlog limit exceeded May 17 00:29:47.900314 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 17 00:29:47.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.949375 kernel: audit: type=1400 audit(1747441787.819:442): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.949563 kernel: audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 May 17 00:29:47.949617 kernel: audit: backlog limit exceeded May 17 00:29:47.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.819000 audit: BPF prog-id=61 op=LOAD May 17 00:29:47.847000 audit[1763]: AVC avc: denied { bpf } for pid=1763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.847000 audit[1763]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1752 pid=1763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:29:47.847000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566383662396165626638616531326138386436386364626363666462 May 17 00:29:47.847000 audit[1763]: AVC avc: denied { perfmon } for pid=1763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.847000 audit[1763]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1752 pid=1763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:29:47.847000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566383662396165626638616531326138386436386364626363666462 May 17 00:29:47.847000 audit[1763]: AVC avc: denied { bpf } for pid=1763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.847000 audit[1763]: AVC avc: denied { bpf } for pid=1763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.847000 audit[1763]: AVC avc: denied { bpf } for pid=1763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.847000 audit[1763]: AVC avc: denied { perfmon } for pid=1763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.847000 audit[1763]: AVC avc: denied { perfmon } for pid=1763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.847000 audit[1763]: AVC avc: denied { perfmon } for pid=1763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.847000 audit[1763]: AVC avc: denied { perfmon } for pid=1763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.847000 audit[1763]: AVC avc: denied { perfmon } for pid=1763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.847000 audit[1763]: AVC avc: denied { bpf } for pid=1763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.847000 audit[1763]: AVC avc: denied { bpf } for pid=1763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.847000 audit: BPF prog-id=62 op=LOAD May 17 00:29:47.847000 audit[1763]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000a1a00 items=0 ppid=1752 pid=1763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:29:47.847000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566383662396165626638616531326138386436386364626363666462 May 17 00:29:47.847000 audit[1763]: AVC avc: denied { bpf } for pid=1763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.847000 audit[1763]: AVC avc: denied { bpf } for pid=1763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.847000 audit[1763]: AVC avc: denied { perfmon } for pid=1763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.847000 audit[1763]: AVC avc: denied { perfmon } for pid=1763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.847000 audit[1763]: AVC avc: denied { perfmon } for pid=1763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.847000 audit[1763]: AVC avc: denied { perfmon } for pid=1763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.847000 audit[1763]: AVC avc: denied { perfmon } for pid=1763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.847000 audit[1763]: AVC avc: denied { bpf } for pid=1763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.847000 audit[1763]: AVC avc: denied { bpf } for pid=1763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.847000 audit: BPF prog-id=63 op=LOAD May 17 00:29:47.847000 audit[1763]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000a1a48 items=0 ppid=1752 pid=1763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:29:47.847000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566383662396165626638616531326138386436386364626363666462 May 17 00:29:47.847000 audit: BPF prog-id=63 op=UNLOAD May 17 00:29:47.847000 audit: BPF prog-id=62 op=UNLOAD May 17 00:29:47.847000 audit[1763]: AVC avc: denied { bpf } for pid=1763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.847000 audit[1763]: AVC avc: denied { bpf } for pid=1763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.847000 audit[1763]: AVC avc: denied { bpf } for pid=1763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.847000 audit[1763]: AVC avc: denied { perfmon } for pid=1763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.847000 audit[1763]: AVC avc: denied { perfmon } for pid=1763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.847000 audit[1763]: AVC avc: denied { perfmon } for pid=1763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.847000 audit[1763]: AVC avc: denied { perfmon } for pid=1763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.847000 audit[1763]: AVC avc: denied { perfmon } for pid=1763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.847000 audit[1763]: AVC avc: denied { bpf } for pid=1763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.847000 audit[1763]: AVC avc: denied { bpf } for pid=1763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.847000 audit: BPF prog-id=64 op=LOAD May 17 00:29:47.847000 audit[1763]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0000a1e58 items=0 ppid=1752 pid=1763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:29:47.847000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566383662396165626638616531326138386436386364626363666462 May 17 00:29:47.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.956000 audit: BPF prog-id=65 op=LOAD May 17 00:29:47.957000 audit[1771]: AVC avc: denied { bpf } for pid=1771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.957000 audit[1771]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1733 pid=1771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:29:47.957000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239323261643664336632353930316133363961393038643235333839 May 17 00:29:47.957000 audit[1771]: AVC avc: denied { perfmon } for pid=1771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.957000 audit[1771]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1733 pid=1771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:29:47.957000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239323261643664336632353930316133363961393038643235333839 May 17 00:29:47.957000 audit[1771]: AVC avc: denied { bpf } for pid=1771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.957000 audit[1771]: AVC avc: denied { bpf } for pid=1771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.957000 audit[1771]: AVC avc: denied { bpf } for pid=1771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.957000 audit[1771]: AVC avc: denied { perfmon } for pid=1771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.957000 audit[1771]: AVC avc: denied { perfmon } for pid=1771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.957000 audit[1771]: AVC avc: denied { perfmon } for pid=1771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.957000 audit[1771]: AVC avc: denied { perfmon } for pid=1771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.957000 audit[1771]: AVC avc: denied { perfmon } for pid=1771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.957000 audit[1771]: AVC avc: denied { bpf } for pid=1771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.957000 audit[1771]: AVC avc: denied { bpf } for pid=1771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.957000 audit: BPF prog-id=66 op=LOAD May 17 00:29:47.957000 audit[1771]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00028b2a0 items=0 ppid=1733 pid=1771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:29:47.957000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239323261643664336632353930316133363961393038643235333839 May 17 00:29:47.958000 audit[1771]: AVC avc: denied { bpf } for pid=1771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.958000 audit[1771]: AVC avc: denied { bpf } for pid=1771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.958000 audit[1771]: AVC avc: denied { perfmon } for pid=1771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.958000 audit[1771]: AVC avc: denied { perfmon } for pid=1771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.958000 audit[1771]: AVC avc: denied { perfmon } for pid=1771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.958000 audit[1771]: AVC avc: denied { perfmon } for pid=1771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.958000 audit[1771]: AVC avc: denied { perfmon } for pid=1771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.958000 audit[1771]: AVC avc: denied { bpf } for pid=1771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.958000 audit[1771]: AVC avc: denied { bpf } for pid=1771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.958000 audit: BPF prog-id=67 op=LOAD May 17 00:29:47.958000 audit[1771]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00028b2e8 items=0 ppid=1733 pid=1771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:29:47.958000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239323261643664336632353930316133363961393038643235333839 May 17 00:29:47.958000 audit: BPF prog-id=67 op=UNLOAD May 17 00:29:47.958000 audit: BPF prog-id=66 op=UNLOAD May 17 00:29:47.958000 audit[1771]: AVC avc: denied { bpf } for pid=1771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.958000 audit[1771]: AVC avc: denied { bpf } for pid=1771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.958000 audit[1771]: AVC avc: denied { bpf } for pid=1771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.958000 audit[1771]: AVC avc: denied { perfmon } for pid=1771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.958000 audit[1771]: AVC avc: denied { perfmon } for pid=1771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.958000 audit[1771]: AVC avc: denied { perfmon } for pid=1771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.958000 audit[1771]: AVC avc: denied { perfmon } for pid=1771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.958000 audit[1771]: AVC avc: denied { perfmon } for pid=1771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.958000 audit[1771]: AVC avc: denied { bpf } for pid=1771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.958000 audit[1771]: AVC avc: denied { bpf } for pid=1771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.958000 audit: BPF prog-id=68 op=LOAD May 17 00:29:47.958000 audit[1771]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00028b6f8 items=0 ppid=1733 pid=1771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:29:47.958000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239323261643664336632353930316133363961393038643235333839 May 17 00:29:47.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.981000 audit: BPF prog-id=69 op=LOAD May 17 00:29:47.983000 audit[1785]: AVC avc: denied { bpf } for pid=1785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.983000 audit[1785]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1770 pid=1785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:29:47.983000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163653233373335663737316263626434353633616336366465663337 May 17 00:29:47.983000 audit[1785]: AVC avc: denied { perfmon } for pid=1785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.983000 audit[1785]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1770 pid=1785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:29:47.983000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163653233373335663737316263626434353633616336366465663337 May 17 00:29:47.983000 audit[1785]: AVC avc: denied { bpf } for pid=1785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.983000 audit[1785]: AVC avc: denied { bpf } for pid=1785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.983000 audit[1785]: AVC avc: denied { bpf } for pid=1785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.983000 audit[1785]: AVC avc: denied { perfmon } for pid=1785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.983000 audit[1785]: AVC avc: denied { perfmon } for pid=1785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.983000 audit[1785]: AVC avc: denied { perfmon } for pid=1785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.983000 audit[1785]: AVC avc: denied { perfmon } for pid=1785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.983000 audit[1785]: AVC avc: denied { perfmon } for pid=1785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.983000 audit[1785]: AVC avc: denied { bpf } for pid=1785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.983000 audit[1785]: AVC avc: denied { bpf } for pid=1785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.983000 audit: BPF prog-id=70 op=LOAD May 17 00:29:47.983000 audit[1785]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000380360 items=0 ppid=1770 pid=1785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:29:47.983000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163653233373335663737316263626434353633616336366465663337 May 17 00:29:47.984000 audit[1785]: AVC avc: denied { bpf } for pid=1785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.984000 audit[1785]: AVC avc: denied { bpf } for pid=1785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.984000 audit[1785]: AVC avc: denied { perfmon } for pid=1785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.984000 audit[1785]: AVC avc: denied { perfmon } for pid=1785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.984000 audit[1785]: AVC avc: denied { perfmon } for pid=1785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.984000 audit[1785]: AVC avc: denied { perfmon } for pid=1785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.984000 audit[1785]: AVC avc: denied { perfmon } for pid=1785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.984000 audit[1785]: AVC avc: denied { bpf } for pid=1785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.984000 audit[1785]: AVC avc: denied { bpf } for pid=1785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.984000 audit: BPF prog-id=71 op=LOAD May 17 00:29:47.984000 audit[1785]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003803a8 items=0 ppid=1770 pid=1785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:29:47.984000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163653233373335663737316263626434353633616336366465663337 May 17 00:29:47.984000 audit: BPF prog-id=71 op=UNLOAD May 17 00:29:47.984000 audit: BPF prog-id=70 op=UNLOAD May 17 00:29:47.984000 audit[1785]: AVC avc: denied { bpf } for pid=1785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.984000 audit[1785]: AVC avc: denied { bpf } for pid=1785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.984000 audit[1785]: AVC avc: denied { bpf } for pid=1785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.984000 audit[1785]: AVC avc: denied { perfmon } for pid=1785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.984000 audit[1785]: AVC avc: denied { perfmon } for pid=1785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.984000 audit[1785]: AVC avc: denied { perfmon } for pid=1785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.984000 audit[1785]: AVC avc: denied { perfmon } for pid=1785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.984000 audit[1785]: AVC avc: denied { perfmon } for pid=1785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.984000 audit[1785]: AVC avc: denied { bpf } for pid=1785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.984000 audit[1785]: AVC avc: denied { bpf } for pid=1785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:47.984000 audit: BPF prog-id=72 op=LOAD May 17 00:29:47.984000 audit[1785]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003807b8 items=0 ppid=1770 pid=1785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:29:47.984000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163653233373335663737316263626434353633616336366465663337 May 17 00:29:47.995196 env[1216]: time="2025-05-17T00:29:47.995125388Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7,Uid:e8d9d526d1fb8ca54826425c7b8d4039,Namespace:kube-system,Attempt:0,} returns sandbox id \"ef86b9aebf8ae12a88d68cdbccfdb8cc53aae0e6f85defa13ff369975c43549a\"" May 17 00:29:47.998774 kubelet[1689]: E0517 00:29:47.998557 1689 kubelet_pods.go:553] "Hostname for pod was too long, truncated it" podName="kube-controller-manager-ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" hostnameMaxLen=63 truncatedHostname="kube-controller-manager-ci-3510-3-7-nightly-20250516-2100-98e6c" May 17 00:29:48.008724 env[1216]: time="2025-05-17T00:29:48.005834863Z" level=info msg="CreateContainer within sandbox \"ef86b9aebf8ae12a88d68cdbccfdb8cc53aae0e6f85defa13ff369975c43549a\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" May 17 00:29:48.008919 kubelet[1689]: E0517 00:29:48.008194 1689 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.54:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7?timeout=10s\": dial tcp 10.128.0.54:6443: connect: connection refused" interval="1.6s" May 17 00:29:48.052468 env[1216]: time="2025-05-17T00:29:48.052382731Z" level=info msg="CreateContainer within sandbox \"ef86b9aebf8ae12a88d68cdbccfdb8cc53aae0e6f85defa13ff369975c43549a\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"83201156ce7cf511e108acee1638dbe485ff711210fb5c76a2a91ea1ce577a10\"" May 17 00:29:48.057864 env[1216]: time="2025-05-17T00:29:48.057813890Z" level=info msg="StartContainer for \"83201156ce7cf511e108acee1638dbe485ff711210fb5c76a2a91ea1ce577a10\"" May 17 00:29:48.066666 env[1216]: time="2025-05-17T00:29:48.066597411Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7,Uid:43481a7f9c10ac9d15cdc09752a2cf26,Namespace:kube-system,Attempt:0,} returns sandbox id \"b922ad6d3f25901a369a908d2538907aec55b47be3d091cde532cec7d3ddf02b\"" May 17 00:29:48.070073 kubelet[1689]: E0517 00:29:48.069351 1689 kubelet_pods.go:553] "Hostname for pod was too long, truncated it" podName="kube-scheduler-ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" hostnameMaxLen=63 truncatedHostname="kube-scheduler-ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b08" May 17 00:29:48.074628 env[1216]: time="2025-05-17T00:29:48.074572743Z" level=info msg="CreateContainer within sandbox \"b922ad6d3f25901a369a908d2538907aec55b47be3d091cde532cec7d3ddf02b\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" May 17 00:29:48.089986 env[1216]: time="2025-05-17T00:29:48.089908287Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7,Uid:1f230bbcb289b8683d925b75c174d24f,Namespace:kube-system,Attempt:0,} returns sandbox id \"1ce23735f771bcbd4563ac66def37c81bc6d723acde21b97565c1b335493a0e1\"" May 17 00:29:48.096144 kubelet[1689]: E0517 00:29:48.095680 1689 kubelet_pods.go:553] "Hostname for pod was too long, truncated it" podName="kube-apiserver-ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" hostnameMaxLen=63 truncatedHostname="kube-apiserver-ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b08" May 17 00:29:48.099962 env[1216]: time="2025-05-17T00:29:48.099908554Z" level=info msg="CreateContainer within sandbox \"1ce23735f771bcbd4563ac66def37c81bc6d723acde21b97565c1b335493a0e1\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" May 17 00:29:48.104038 env[1216]: time="2025-05-17T00:29:48.103955933Z" level=info msg="CreateContainer within sandbox \"b922ad6d3f25901a369a908d2538907aec55b47be3d091cde532cec7d3ddf02b\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"69f6b873b8755ab1b2eb28cf586ce6964d800c692445238c9f9a8ce88f05ce7d\"" May 17 00:29:48.106772 env[1216]: time="2025-05-17T00:29:48.106715194Z" level=info msg="StartContainer for \"69f6b873b8755ab1b2eb28cf586ce6964d800c692445238c9f9a8ce88f05ce7d\"" May 17 00:29:48.112222 systemd[1]: Started cri-containerd-83201156ce7cf511e108acee1638dbe485ff711210fb5c76a2a91ea1ce577a10.scope. May 17 00:29:48.134949 kubelet[1689]: E0517 00:29:48.134642 1689 reflector.go:200] "Failed to watch" err="failed to list *v1.CSIDriver: Get \"https://10.128.0.54:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.128.0.54:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.CSIDriver" May 17 00:29:48.134949 kubelet[1689]: E0517 00:29:48.134819 1689 reflector.go:200] "Failed to watch" err="failed to list *v1.RuntimeClass: Get \"https://10.128.0.54:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.128.0.54:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.RuntimeClass" May 17 00:29:48.147075 env[1216]: time="2025-05-17T00:29:48.147011977Z" level=info msg="CreateContainer within sandbox \"1ce23735f771bcbd4563ac66def37c81bc6d723acde21b97565c1b335493a0e1\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"48947eba3e7ade71987d7c863ecf9ce023a3de0aabd5c3203979ff046bafa359\"" May 17 00:29:48.148489 env[1216]: time="2025-05-17T00:29:48.148433297Z" level=info msg="StartContainer for \"48947eba3e7ade71987d7c863ecf9ce023a3de0aabd5c3203979ff046bafa359\"" May 17 00:29:48.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.158000 audit: BPF prog-id=73 op=LOAD May 17 00:29:48.159000 audit[1861]: AVC avc: denied { bpf } for pid=1861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.159000 audit[1861]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1752 pid=1861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:29:48.159000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833323031313536636537636635313165313038616365653136333864 May 17 00:29:48.159000 audit[1861]: AVC avc: denied { perfmon } for pid=1861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.159000 audit[1861]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1752 pid=1861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:29:48.159000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833323031313536636537636635313165313038616365653136333864 May 17 00:29:48.159000 audit[1861]: AVC avc: denied { bpf } for pid=1861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.159000 audit[1861]: AVC avc: denied { bpf } for pid=1861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.159000 audit[1861]: AVC avc: denied { bpf } for pid=1861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.159000 audit[1861]: AVC avc: denied { perfmon } for pid=1861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.159000 audit[1861]: AVC avc: denied { perfmon } for pid=1861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.159000 audit[1861]: AVC avc: denied { perfmon } for pid=1861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.159000 audit[1861]: AVC avc: denied { perfmon } for pid=1861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.159000 audit[1861]: AVC avc: denied { perfmon } for pid=1861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.159000 audit[1861]: AVC avc: denied { bpf } for pid=1861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.159000 audit[1861]: AVC avc: denied { bpf } for pid=1861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.159000 audit: BPF prog-id=74 op=LOAD May 17 00:29:48.159000 audit[1861]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003c0ff0 items=0 ppid=1752 pid=1861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:29:48.159000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833323031313536636537636635313165313038616365653136333864 May 17 00:29:48.160000 audit[1861]: AVC avc: denied { bpf } for pid=1861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.160000 audit[1861]: AVC avc: denied { bpf } for pid=1861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.160000 audit[1861]: AVC avc: denied { perfmon } for pid=1861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.160000 audit[1861]: AVC avc: denied { perfmon } for pid=1861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.160000 audit[1861]: AVC avc: denied { perfmon } for pid=1861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.160000 audit[1861]: AVC avc: denied { perfmon } for pid=1861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.160000 audit[1861]: AVC avc: denied { perfmon } for pid=1861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.160000 audit[1861]: AVC avc: denied { bpf } for pid=1861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.160000 audit[1861]: AVC avc: denied { bpf } for pid=1861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.160000 audit: BPF prog-id=75 op=LOAD May 17 00:29:48.160000 audit[1861]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003c1038 items=0 ppid=1752 pid=1861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:29:48.160000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833323031313536636537636635313165313038616365653136333864 May 17 00:29:48.160000 audit: BPF prog-id=75 op=UNLOAD May 17 00:29:48.160000 audit: BPF prog-id=74 op=UNLOAD May 17 00:29:48.160000 audit[1861]: AVC avc: denied { bpf } for pid=1861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.160000 audit[1861]: AVC avc: denied { bpf } for pid=1861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.160000 audit[1861]: AVC avc: denied { bpf } for pid=1861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.160000 audit[1861]: AVC avc: denied { perfmon } for pid=1861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.160000 audit[1861]: AVC avc: denied { perfmon } for pid=1861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.160000 audit[1861]: AVC avc: denied { perfmon } for pid=1861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.160000 audit[1861]: AVC avc: denied { perfmon } for pid=1861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.160000 audit[1861]: AVC avc: denied { perfmon } for pid=1861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.160000 audit[1861]: AVC avc: denied { bpf } for pid=1861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.160000 audit[1861]: AVC avc: denied { bpf } for pid=1861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.160000 audit: BPF prog-id=76 op=LOAD May 17 00:29:48.160000 audit[1861]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003c1448 items=0 ppid=1752 pid=1861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:29:48.160000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833323031313536636537636635313165313038616365653136333864 May 17 00:29:48.194684 systemd[1]: Started cri-containerd-48947eba3e7ade71987d7c863ecf9ce023a3de0aabd5c3203979ff046bafa359.scope. May 17 00:29:48.217729 systemd[1]: Started cri-containerd-69f6b873b8755ab1b2eb28cf586ce6964d800c692445238c9f9a8ce88f05ce7d.scope. May 17 00:29:48.236065 kubelet[1689]: I0517 00:29:48.236004 1689 kubelet_node_status.go:75] "Attempting to register node" node="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:29:48.237154 kubelet[1689]: E0517 00:29:48.237097 1689 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.128.0.54:6443/api/v1/nodes\": dial tcp 10.128.0.54:6443: connect: connection refused" node="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:29:48.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.248000 audit: BPF prog-id=77 op=LOAD May 17 00:29:48.249000 audit[1904]: AVC avc: denied { bpf } for pid=1904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.249000 audit[1904]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1770 pid=1904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:29:48.249000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438393437656261336537616465373139383764376338363365636639 May 17 00:29:48.250000 audit[1904]: AVC avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.250000 audit[1904]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1770 pid=1904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:29:48.250000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438393437656261336537616465373139383764376338363365636639 May 17 00:29:48.250000 audit[1904]: AVC avc: denied { bpf } for pid=1904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.250000 audit[1904]: AVC avc: denied { bpf } for pid=1904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.250000 audit[1904]: AVC avc: denied { bpf } for pid=1904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.250000 audit[1904]: AVC avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.250000 audit[1904]: AVC avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.250000 audit[1904]: AVC avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.250000 audit[1904]: AVC avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.250000 audit[1904]: AVC avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.250000 audit[1904]: AVC avc: denied { bpf } for pid=1904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.250000 audit[1904]: AVC avc: denied { bpf } for pid=1904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.250000 audit: BPF prog-id=78 op=LOAD May 17 00:29:48.250000 audit[1904]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001d3720 items=0 ppid=1770 pid=1904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:29:48.250000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438393437656261336537616465373139383764376338363365636639 May 17 00:29:48.252000 audit[1904]: AVC avc: denied { bpf } for pid=1904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.252000 audit[1904]: AVC avc: denied { bpf } for pid=1904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.252000 audit[1904]: AVC avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.252000 audit[1904]: AVC avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.252000 audit[1904]: AVC avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.252000 audit[1904]: AVC avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.252000 audit[1904]: AVC avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.252000 audit[1904]: AVC avc: denied { bpf } for pid=1904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.252000 audit[1904]: AVC avc: denied { bpf } for pid=1904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.252000 audit: BPF prog-id=79 op=LOAD May 17 00:29:48.252000 audit[1904]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001d3768 items=0 ppid=1770 pid=1904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:29:48.252000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438393437656261336537616465373139383764376338363365636639 May 17 00:29:48.252000 audit: BPF prog-id=79 op=UNLOAD May 17 00:29:48.252000 audit: BPF prog-id=78 op=UNLOAD May 17 00:29:48.252000 audit[1904]: AVC avc: denied { bpf } for pid=1904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.252000 audit[1904]: AVC avc: denied { bpf } for pid=1904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.252000 audit[1904]: AVC avc: denied { bpf } for pid=1904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.252000 audit[1904]: AVC avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.252000 audit[1904]: AVC avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.252000 audit[1904]: AVC avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.252000 audit[1904]: AVC avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.252000 audit[1904]: AVC avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.252000 audit[1904]: AVC avc: denied { bpf } for pid=1904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.252000 audit[1904]: AVC avc: denied { bpf } for pid=1904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.252000 audit: BPF prog-id=80 op=LOAD May 17 00:29:48.252000 audit[1904]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001d3b78 items=0 ppid=1770 pid=1904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:29:48.252000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438393437656261336537616465373139383764376338363365636639 May 17 00:29:48.266000 env[1216]: time="2025-05-17T00:29:48.265921565Z" level=info msg="StartContainer for \"83201156ce7cf511e108acee1638dbe485ff711210fb5c76a2a91ea1ce577a10\" returns successfully" May 17 00:29:48.322685 env[1216]: time="2025-05-17T00:29:48.322616372Z" level=info msg="StartContainer for \"48947eba3e7ade71987d7c863ecf9ce023a3de0aabd5c3203979ff046bafa359\" returns successfully" May 17 00:29:48.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.340000 audit: BPF prog-id=81 op=LOAD May 17 00:29:48.342000 audit[1892]: AVC avc: denied { bpf } for pid=1892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.342000 audit[1892]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1733 pid=1892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:29:48.342000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639663662383733623837353561623162326562323863663538366365 May 17 00:29:48.342000 audit[1892]: AVC avc: denied { perfmon } for pid=1892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.342000 audit[1892]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1733 pid=1892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:29:48.342000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639663662383733623837353561623162326562323863663538366365 May 17 00:29:48.342000 audit[1892]: AVC avc: denied { bpf } for pid=1892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.342000 audit[1892]: AVC avc: denied { bpf } for pid=1892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.342000 audit[1892]: AVC avc: denied { bpf } for pid=1892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.342000 audit[1892]: AVC avc: denied { perfmon } for pid=1892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.342000 audit[1892]: AVC avc: denied { perfmon } for pid=1892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.342000 audit[1892]: AVC avc: denied { perfmon } for pid=1892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.342000 audit[1892]: AVC avc: denied { perfmon } for pid=1892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.342000 audit[1892]: AVC avc: denied { perfmon } for pid=1892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.342000 audit[1892]: AVC avc: denied { bpf } for pid=1892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.342000 audit[1892]: AVC avc: denied { bpf } for pid=1892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.342000 audit: BPF prog-id=82 op=LOAD May 17 00:29:48.342000 audit[1892]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002868f0 items=0 ppid=1733 pid=1892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:29:48.342000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639663662383733623837353561623162326562323863663538366365 May 17 00:29:48.342000 audit[1892]: AVC avc: denied { bpf } for pid=1892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.342000 audit[1892]: AVC avc: denied { bpf } for pid=1892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.342000 audit[1892]: AVC avc: denied { perfmon } for pid=1892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.342000 audit[1892]: AVC avc: denied { perfmon } for pid=1892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.342000 audit[1892]: AVC avc: denied { perfmon } for pid=1892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.342000 audit[1892]: AVC avc: denied { perfmon } for pid=1892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.342000 audit[1892]: AVC avc: denied { perfmon } for pid=1892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.342000 audit[1892]: AVC avc: denied { bpf } for pid=1892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.342000 audit[1892]: AVC avc: denied { bpf } for pid=1892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.342000 audit: BPF prog-id=83 op=LOAD May 17 00:29:48.342000 audit[1892]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000286938 items=0 ppid=1733 pid=1892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:29:48.342000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639663662383733623837353561623162326562323863663538366365 May 17 00:29:48.342000 audit: BPF prog-id=83 op=UNLOAD May 17 00:29:48.342000 audit: BPF prog-id=82 op=UNLOAD May 17 00:29:48.342000 audit[1892]: AVC avc: denied { bpf } for pid=1892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.342000 audit[1892]: AVC avc: denied { bpf } for pid=1892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.342000 audit[1892]: AVC avc: denied { bpf } for pid=1892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.342000 audit[1892]: AVC avc: denied { perfmon } for pid=1892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.342000 audit[1892]: AVC avc: denied { perfmon } for pid=1892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.342000 audit[1892]: AVC avc: denied { perfmon } for pid=1892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.342000 audit[1892]: AVC avc: denied { perfmon } for pid=1892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.342000 audit[1892]: AVC avc: denied { perfmon } for pid=1892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.342000 audit[1892]: AVC avc: denied { bpf } for pid=1892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.342000 audit[1892]: AVC avc: denied { bpf } for pid=1892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:48.342000 audit: BPF prog-id=84 op=LOAD May 17 00:29:48.342000 audit[1892]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000286d48 items=0 ppid=1733 pid=1892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:29:48.342000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639663662383733623837353561623162326562323863663538366365 May 17 00:29:48.405924 env[1216]: time="2025-05-17T00:29:48.405774264Z" level=info msg="StartContainer for \"69f6b873b8755ab1b2eb28cf586ce6964d800c692445238c9f9a8ce88f05ce7d\" returns successfully" May 17 00:29:48.721823 kubelet[1689]: E0517 00:29:48.721648 1689 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7\" not found" node="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:29:48.724153 kubelet[1689]: E0517 00:29:48.724092 1689 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7\" not found" node="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:29:48.730399 kubelet[1689]: E0517 00:29:48.730356 1689 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7\" not found" node="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:29:49.731820 kubelet[1689]: E0517 00:29:49.731774 1689 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7\" not found" node="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:29:49.732421 kubelet[1689]: E0517 00:29:49.732382 1689 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7\" not found" node="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:29:49.844832 kubelet[1689]: I0517 00:29:49.843846 1689 kubelet_node_status.go:75] "Attempting to register node" node="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:29:50.435000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c296,c329 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:29:50.435000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000ad5b30 a2=fc6 a3=0 items=0 ppid=1752 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c296,c329 key=(null) May 17 00:29:50.435000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:29:50.436000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520987 scontext=system_u:system_r:svirt_lxc_net_t:s0:c296,c329 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:29:50.436000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00037d1e0 a2=fc6 a3=0 items=0 ppid=1752 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c296,c329 key=(null) May 17 00:29:50.436000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:29:51.371000 audit[1917]: AVC avc: denied { watch } for pid=1917 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c258,c418 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:29:51.371000 audit[1917]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c006b09ce0 a2=fc6 a3=0 items=0 ppid=1770 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c258,c418 key=(null) May 17 00:29:51.371000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:29:51.372000 audit[1917]: AVC avc: denied { watch } for pid=1917 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520989 scontext=system_u:system_r:svirt_lxc_net_t:s0:c258,c418 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:29:51.372000 audit[1917]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c004359ad0 a2=fc6 a3=0 items=0 ppid=1770 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c258,c418 key=(null) May 17 00:29:51.372000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:29:51.373000 audit[1917]: AVC avc: denied { watch } for pid=1917 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520995 scontext=system_u:system_r:svirt_lxc_net_t:s0:c258,c418 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:29:51.373000 audit[1917]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=43 a1=c006b09e90 a2=fc6 a3=0 items=0 ppid=1770 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c258,c418 key=(null) May 17 00:29:51.373000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:29:51.373000 audit[1917]: AVC avc: denied { watch } for pid=1917 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520987 scontext=system_u:system_r:svirt_lxc_net_t:s0:c258,c418 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:29:51.373000 audit[1917]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=43 a1=c00262d6c0 a2=fc6 a3=0 items=0 ppid=1770 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c258,c418 key=(null) May 17 00:29:51.373000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:29:51.524000 audit[1917]: AVC avc: denied { watch } for pid=1917 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520987 scontext=system_u:system_r:svirt_lxc_net_t:s0:c258,c418 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:29:51.524000 audit[1917]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=93 a1=c0057bdb40 a2=fc6 a3=0 items=0 ppid=1770 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c258,c418 key=(null) May 17 00:29:51.524000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:29:51.525000 audit[1917]: AVC avc: denied { watch } for pid=1917 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c258,c418 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:29:51.525000 audit[1917]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=93 a1=c007162bd0 a2=fc6 a3=0 items=0 ppid=1770 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c258,c418 key=(null) May 17 00:29:51.525000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:29:51.682470 kubelet[1689]: E0517 00:29:51.682306 1689 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7\" not found" node="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:29:51.801933 kubelet[1689]: I0517 00:29:51.801849 1689 kubelet_node_status.go:78] "Successfully registered node" node="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:29:51.801933 kubelet[1689]: E0517 00:29:51.801942 1689 kubelet_node_status.go:548] "Error updating node status, will retry" err="error getting node \"ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7\": node \"ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7\" not found" May 17 00:29:51.899882 kubelet[1689]: I0517 00:29:51.899817 1689 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:29:51.911251 kubelet[1689]: E0517 00:29:51.911194 1689 kubelet.go:3311] "Failed creating a mirror pod" err="pods \"kube-scheduler-ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-scheduler-ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:29:51.911573 kubelet[1689]: I0517 00:29:51.911543 1689 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:29:51.914462 kubelet[1689]: E0517 00:29:51.914410 1689 kubelet.go:3311] "Failed creating a mirror pod" err="pods \"kube-apiserver-ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-apiserver-ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:29:51.914462 kubelet[1689]: I0517 00:29:51.914459 1689 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:29:51.918343 kubelet[1689]: E0517 00:29:51.918283 1689 kubelet.go:3311] "Failed creating a mirror pod" err="pods \"kube-controller-manager-ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-controller-manager-ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:29:52.551787 kubelet[1689]: I0517 00:29:52.551740 1689 apiserver.go:52] "Watching apiserver" May 17 00:29:52.600183 kubelet[1689]: I0517 00:29:52.600112 1689 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" May 17 00:29:53.774565 systemd[1]: Reloading. May 17 00:29:53.955293 /usr/lib/systemd/system-generators/torcx-generator[2002]: time="2025-05-17T00:29:53Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:29:53.955352 /usr/lib/systemd/system-generators/torcx-generator[2002]: time="2025-05-17T00:29:53Z" level=info msg="torcx already run" May 17 00:29:54.047799 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:29:54.047835 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:29:54.078960 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:29:54.225965 kernel: kauditd_printk_skb: 360 callbacks suppressed May 17 00:29:54.226170 kernel: audit: type=1400 audit(1747441794.199:553): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.199000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.261644 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 17 00:29:54.261863 kernel: audit: type=1400 audit(1747441794.199:554): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.261927 kernel: audit: audit_lost=3 audit_rate_limit=0 audit_backlog_limit=64 May 17 00:29:54.261980 kernel: audit: backlog limit exceeded May 17 00:29:54.199000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.272869 kernel: audit: type=1400 audit(1747441794.199:555): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.273066 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 17 00:29:54.199000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.300230 kernel: audit: type=1400 audit(1747441794.199:556): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.300451 kernel: audit: audit_lost=4 audit_rate_limit=0 audit_backlog_limit=64 May 17 00:29:54.199000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.348833 kernel: audit: type=1400 audit(1747441794.199:557): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.199000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.199000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.199000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.199000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.199000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.225000 audit: BPF prog-id=85 op=LOAD May 17 00:29:54.225000 audit: BPF prog-id=77 op=UNLOAD May 17 00:29:54.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.227000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.227000 audit: BPF prog-id=86 op=LOAD May 17 00:29:54.227000 audit: BPF prog-id=81 op=UNLOAD May 17 00:29:54.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.231000 audit: BPF prog-id=87 op=LOAD May 17 00:29:54.231000 audit: BPF prog-id=73 op=UNLOAD May 17 00:29:54.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.234000 audit: BPF prog-id=88 op=LOAD May 17 00:29:54.234000 audit: BPF prog-id=46 op=UNLOAD May 17 00:29:54.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.234000 audit: BPF prog-id=89 op=LOAD May 17 00:29:54.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.268000 audit: BPF prog-id=90 op=LOAD May 17 00:29:54.268000 audit: BPF prog-id=47 op=UNLOAD May 17 00:29:54.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.353000 audit: BPF prog-id=92 op=LOAD May 17 00:29:54.353000 audit: BPF prog-id=50 op=UNLOAD May 17 00:29:54.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.355000 audit: BPF prog-id=93 op=LOAD May 17 00:29:54.356000 audit: BPF prog-id=51 op=UNLOAD May 17 00:29:54.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.357000 audit: BPF prog-id=94 op=LOAD May 17 00:29:54.357000 audit: BPF prog-id=65 op=UNLOAD May 17 00:29:54.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.359000 audit: BPF prog-id=95 op=LOAD May 17 00:29:54.359000 audit: BPF prog-id=61 op=UNLOAD May 17 00:29:54.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.362000 audit: BPF prog-id=96 op=LOAD May 17 00:29:54.362000 audit: BPF prog-id=52 op=UNLOAD May 17 00:29:54.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.363000 audit: BPF prog-id=97 op=LOAD May 17 00:29:54.363000 audit: BPF prog-id=69 op=UNLOAD May 17 00:29:54.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.366000 audit: BPF prog-id=98 op=LOAD May 17 00:29:54.366000 audit: BPF prog-id=53 op=UNLOAD May 17 00:29:54.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.366000 audit: BPF prog-id=99 op=LOAD May 17 00:29:54.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.366000 audit: BPF prog-id=100 op=LOAD May 17 00:29:54.366000 audit: BPF prog-id=54 op=UNLOAD May 17 00:29:54.366000 audit: BPF prog-id=55 op=UNLOAD May 17 00:29:54.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.367000 audit: BPF prog-id=101 op=LOAD May 17 00:29:54.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.367000 audit: BPF prog-id=102 op=LOAD May 17 00:29:54.367000 audit: BPF prog-id=56 op=UNLOAD May 17 00:29:54.367000 audit: BPF prog-id=57 op=UNLOAD May 17 00:29:54.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.369000 audit: BPF prog-id=103 op=LOAD May 17 00:29:54.369000 audit: BPF prog-id=58 op=UNLOAD May 17 00:29:54.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.370000 audit: BPF prog-id=104 op=LOAD May 17 00:29:54.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.370000 audit: BPF prog-id=105 op=LOAD May 17 00:29:54.370000 audit: BPF prog-id=59 op=UNLOAD May 17 00:29:54.370000 audit: BPF prog-id=60 op=UNLOAD May 17 00:29:54.398181 systemd[1]: Stopping kubelet.service... May 17 00:29:54.428445 systemd[1]: kubelet.service: Deactivated successfully. May 17 00:29:54.428848 systemd[1]: Stopped kubelet.service. May 17 00:29:54.428000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:54.428998 systemd[1]: kubelet.service: Consumed 1.330s CPU time. May 17 00:29:54.432445 systemd[1]: Starting kubelet.service... May 17 00:29:54.699000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:29:54.698922 systemd[1]: Started kubelet.service. May 17 00:29:54.796442 kubelet[2047]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:29:54.796442 kubelet[2047]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. May 17 00:29:54.796442 kubelet[2047]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:29:54.796442 kubelet[2047]: I0517 00:29:54.795659 2047 server.go:212] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 17 00:29:54.809872 kubelet[2047]: I0517 00:29:54.809785 2047 server.go:530] "Kubelet version" kubeletVersion="v1.33.0" May 17 00:29:54.809872 kubelet[2047]: I0517 00:29:54.809832 2047 server.go:532] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 17 00:29:54.810295 kubelet[2047]: I0517 00:29:54.810260 2047 server.go:956] "Client rotation is on, will bootstrap in background" May 17 00:29:54.813110 kubelet[2047]: I0517 00:29:54.813064 2047 certificate_store.go:147] "Loading cert/key pair from a file" filePath="/var/lib/kubelet/pki/kubelet-client-current.pem" May 17 00:29:54.818904 kubelet[2047]: I0517 00:29:54.818845 2047 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 17 00:29:54.826402 kubelet[2047]: E0517 00:29:54.826364 2047 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 17 00:29:54.826610 kubelet[2047]: I0517 00:29:54.826591 2047 server.go:1423] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 17 00:29:54.831253 kubelet[2047]: I0517 00:29:54.831216 2047 server.go:782] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 17 00:29:54.831816 kubelet[2047]: I0517 00:29:54.831773 2047 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 17 00:29:54.832247 kubelet[2047]: I0517 00:29:54.831973 2047 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"MemoryManagerPolicy":"None","MemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 17 00:29:54.832544 kubelet[2047]: I0517 00:29:54.832522 2047 topology_manager.go:138] "Creating topology manager with none policy" May 17 00:29:54.832677 kubelet[2047]: I0517 00:29:54.832660 2047 container_manager_linux.go:303] "Creating device plugin manager" May 17 00:29:54.832890 kubelet[2047]: I0517 00:29:54.832872 2047 state_mem.go:36] "Initialized new in-memory state store" May 17 00:29:54.833244 kubelet[2047]: I0517 00:29:54.833225 2047 kubelet.go:480] "Attempting to sync node with API server" May 17 00:29:54.841229 kubelet[2047]: I0517 00:29:54.841191 2047 kubelet.go:375] "Adding static pod path" path="/etc/kubernetes/manifests" May 17 00:29:54.841573 kubelet[2047]: I0517 00:29:54.841552 2047 kubelet.go:386] "Adding apiserver pod source" May 17 00:29:54.841759 kubelet[2047]: I0517 00:29:54.841740 2047 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 17 00:29:54.868685 kubelet[2047]: I0517 00:29:54.867281 2047 kuberuntime_manager.go:279] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 17 00:29:54.868685 kubelet[2047]: I0517 00:29:54.868462 2047 kubelet.go:935] "Not starting ClusterTrustBundle informer because we are in static kubelet mode or the ClusterTrustBundleProjection featuregate is disabled" May 17 00:29:54.874803 kubelet[2047]: I0517 00:29:54.872033 2047 apiserver.go:52] "Watching apiserver" May 17 00:29:54.900887 kubelet[2047]: I0517 00:29:54.900825 2047 watchdog_linux.go:99] "Systemd watchdog is not enabled" May 17 00:29:54.901113 kubelet[2047]: I0517 00:29:54.900964 2047 server.go:1289] "Started kubelet" May 17 00:29:54.906727 kubelet[2047]: I0517 00:29:54.904097 2047 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 17 00:29:54.906727 kubelet[2047]: I0517 00:29:54.904997 2047 server.go:255] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 17 00:29:54.906727 kubelet[2047]: I0517 00:29:54.905083 2047 server.go:180] "Starting to listen" address="0.0.0.0" port=10250 May 17 00:29:54.913856 kubelet[2047]: I0517 00:29:54.913816 2047 server.go:317] "Adding debug handlers to kubelet server" May 17 00:29:54.915000 audit[2047]: AVC avc: denied { mac_admin } for pid=2047 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.915000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:29:54.915000 audit[2047]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000af6ff0 a1=c000cccbe8 a2=c000af6fc0 a3=25 items=0 ppid=1 pid=2047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:29:54.919489 kubelet[2047]: E0517 00:29:54.919444 2047 kubelet.go:1600] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 17 00:29:54.915000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:29:54.924922 kubelet[2047]: I0517 00:29:54.924873 2047 kubelet.go:1552] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" May 17 00:29:54.924000 audit[2047]: AVC avc: denied { mac_admin } for pid=2047 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:54.924000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:29:54.924000 audit[2047]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00064db80 a1=c000ccd0c8 a2=c0005ca4b0 a3=25 items=0 ppid=1 pid=2047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:29:54.924000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:29:54.925615 kubelet[2047]: I0517 00:29:54.925577 2047 kubelet.go:1556] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" May 17 00:29:54.925888 kubelet[2047]: I0517 00:29:54.925825 2047 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 17 00:29:54.927346 kubelet[2047]: I0517 00:29:54.926164 2047 volume_manager.go:297] "Starting Kubelet Volume Manager" May 17 00:29:54.927346 kubelet[2047]: I0517 00:29:54.926392 2047 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 17 00:29:54.934320 kubelet[2047]: I0517 00:29:54.933737 2047 factory.go:223] Registration of the systemd container factory successfully May 17 00:29:54.934904 kubelet[2047]: I0517 00:29:54.934866 2047 factory.go:221] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 17 00:29:54.935472 kubelet[2047]: I0517 00:29:54.935449 2047 desired_state_of_world_populator.go:150] "Desired state populator starts to run" May 17 00:29:54.935893 kubelet[2047]: I0517 00:29:54.935872 2047 reconciler.go:26] "Reconciler: start to sync state" May 17 00:29:54.945077 kubelet[2047]: I0517 00:29:54.945039 2047 factory.go:223] Registration of the containerd container factory successfully May 17 00:29:55.053579 kubelet[2047]: I0517 00:29:55.049281 2047 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv4" May 17 00:29:55.059630 kubelet[2047]: I0517 00:29:55.059099 2047 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv6" May 17 00:29:55.059630 kubelet[2047]: I0517 00:29:55.059134 2047 status_manager.go:230] "Starting to sync pod status with apiserver" May 17 00:29:55.059630 kubelet[2047]: I0517 00:29:55.059163 2047 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." May 17 00:29:55.059630 kubelet[2047]: I0517 00:29:55.059175 2047 kubelet.go:2436] "Starting kubelet main sync loop" May 17 00:29:55.060988 kubelet[2047]: E0517 00:29:55.060943 2047 kubelet.go:2460] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 17 00:29:55.062196 kubelet[2047]: I0517 00:29:55.062174 2047 cpu_manager.go:221] "Starting CPU manager" policy="none" May 17 00:29:55.066913 kubelet[2047]: I0517 00:29:55.066865 2047 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" May 17 00:29:55.067261 kubelet[2047]: I0517 00:29:55.067239 2047 state_mem.go:36] "Initialized new in-memory state store" May 17 00:29:55.075628 kubelet[2047]: I0517 00:29:55.075577 2047 state_mem.go:88] "Updated default CPUSet" cpuSet="" May 17 00:29:55.075992 kubelet[2047]: I0517 00:29:55.075921 2047 state_mem.go:96] "Updated CPUSet assignments" assignments={} May 17 00:29:55.076168 kubelet[2047]: I0517 00:29:55.076151 2047 policy_none.go:49] "None policy: Start" May 17 00:29:55.076353 kubelet[2047]: I0517 00:29:55.076335 2047 memory_manager.go:186] "Starting memorymanager" policy="None" May 17 00:29:55.076508 kubelet[2047]: I0517 00:29:55.076491 2047 state_mem.go:35] "Initializing new in-memory state store" May 17 00:29:55.076914 kubelet[2047]: I0517 00:29:55.076896 2047 state_mem.go:75] "Updated machine memory state" May 17 00:29:55.089123 kubelet[2047]: E0517 00:29:55.089086 2047 manager.go:517] "Failed to read data from checkpoint" err="checkpoint is not found" checkpoint="kubelet_internal_checkpoint" May 17 00:29:55.088000 audit[2047]: AVC avc: denied { mac_admin } for pid=2047 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:29:55.088000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:29:55.088000 audit[2047]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c001012c00 a1=c000641a40 a2=c001012bd0 a3=25 items=0 ppid=1 pid=2047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:29:55.088000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:29:55.091454 kubelet[2047]: E0517 00:29:55.091399 2047 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" path="/var/lib/kubelet/device-plugins/" May 17 00:29:55.091982 kubelet[2047]: I0517 00:29:55.091957 2047 eviction_manager.go:189] "Eviction manager: starting control loop" May 17 00:29:55.092202 kubelet[2047]: I0517 00:29:55.092137 2047 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 17 00:29:55.092982 kubelet[2047]: I0517 00:29:55.092956 2047 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 17 00:29:55.097288 kubelet[2047]: E0517 00:29:55.097254 2047 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" May 17 00:29:55.163137 kubelet[2047]: I0517 00:29:55.163052 2047 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:29:55.163525 kubelet[2047]: I0517 00:29:55.163072 2047 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:29:55.163884 kubelet[2047]: I0517 00:29:55.163835 2047 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:29:55.172034 kubelet[2047]: I0517 00:29:55.171980 2047 warnings.go:110] "Warning: metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters]" May 17 00:29:55.175614 kubelet[2047]: I0517 00:29:55.175560 2047 warnings.go:110] "Warning: metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters]" May 17 00:29:55.176038 kubelet[2047]: I0517 00:29:55.176014 2047 warnings.go:110] "Warning: metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters]" May 17 00:29:55.226518 kubelet[2047]: I0517 00:29:55.225572 2047 kubelet_node_status.go:75] "Attempting to register node" node="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:29:55.236555 kubelet[2047]: I0517 00:29:55.236154 2047 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" May 17 00:29:55.239917 kubelet[2047]: I0517 00:29:55.239870 2047 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/e8d9d526d1fb8ca54826425c7b8d4039-ca-certs\") pod \"kube-controller-manager-ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7\" (UID: \"e8d9d526d1fb8ca54826425c7b8d4039\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:29:55.240120 kubelet[2047]: I0517 00:29:55.239931 2047 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/e8d9d526d1fb8ca54826425c7b8d4039-flexvolume-dir\") pod \"kube-controller-manager-ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7\" (UID: \"e8d9d526d1fb8ca54826425c7b8d4039\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:29:55.240120 kubelet[2047]: I0517 00:29:55.239968 2047 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/1f230bbcb289b8683d925b75c174d24f-ca-certs\") pod \"kube-apiserver-ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7\" (UID: \"1f230bbcb289b8683d925b75c174d24f\") " pod="kube-system/kube-apiserver-ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:29:55.240120 kubelet[2047]: I0517 00:29:55.240008 2047 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/e8d9d526d1fb8ca54826425c7b8d4039-k8s-certs\") pod \"kube-controller-manager-ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7\" (UID: \"e8d9d526d1fb8ca54826425c7b8d4039\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:29:55.240120 kubelet[2047]: I0517 00:29:55.240044 2047 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/e8d9d526d1fb8ca54826425c7b8d4039-kubeconfig\") pod \"kube-controller-manager-ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7\" (UID: \"e8d9d526d1fb8ca54826425c7b8d4039\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:29:55.240499 kubelet[2047]: I0517 00:29:55.240103 2047 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/e8d9d526d1fb8ca54826425c7b8d4039-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7\" (UID: \"e8d9d526d1fb8ca54826425c7b8d4039\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:29:55.240499 kubelet[2047]: I0517 00:29:55.240146 2047 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/43481a7f9c10ac9d15cdc09752a2cf26-kubeconfig\") pod \"kube-scheduler-ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7\" (UID: \"43481a7f9c10ac9d15cdc09752a2cf26\") " pod="kube-system/kube-scheduler-ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:29:55.240499 kubelet[2047]: I0517 00:29:55.240178 2047 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/1f230bbcb289b8683d925b75c174d24f-k8s-certs\") pod \"kube-apiserver-ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7\" (UID: \"1f230bbcb289b8683d925b75c174d24f\") " pod="kube-system/kube-apiserver-ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:29:55.240499 kubelet[2047]: I0517 00:29:55.240228 2047 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/1f230bbcb289b8683d925b75c174d24f-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7\" (UID: \"1f230bbcb289b8683d925b75c174d24f\") " pod="kube-system/kube-apiserver-ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:29:55.243013 kubelet[2047]: I0517 00:29:55.242342 2047 kubelet_node_status.go:124] "Node was previously registered" node="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:29:55.243013 kubelet[2047]: I0517 00:29:55.242459 2047 kubelet_node_status.go:78] "Successfully registered node" node="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:29:55.911054 kubelet[2047]: I0517 00:29:55.910977 2047 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" podStartSLOduration=0.910952197 podStartE2EDuration="910.952197ms" podCreationTimestamp="2025-05-17 00:29:55 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:29:55.906865369 +0000 UTC m=+1.195972259" watchObservedRunningTime="2025-05-17 00:29:55.910952197 +0000 UTC m=+1.200059091" May 17 00:29:55.949324 kubelet[2047]: I0517 00:29:55.949238 2047 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" podStartSLOduration=0.949211471 podStartE2EDuration="949.211471ms" podCreationTimestamp="2025-05-17 00:29:55 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:29:55.931584287 +0000 UTC m=+1.220691176" watchObservedRunningTime="2025-05-17 00:29:55.949211471 +0000 UTC m=+1.238318350" May 17 00:29:55.967216 kubelet[2047]: I0517 00:29:55.967125 2047 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" podStartSLOduration=0.967098021 podStartE2EDuration="967.098021ms" podCreationTimestamp="2025-05-17 00:29:55 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:29:55.949787379 +0000 UTC m=+1.238894268" watchObservedRunningTime="2025-05-17 00:29:55.967098021 +0000 UTC m=+1.256204908" May 17 00:29:56.642172 update_engine[1201]: I0517 00:29:56.642076 1201 update_attempter.cc:509] Updating boot flags... May 17 00:29:56.741000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520987 scontext=system_u:system_r:svirt_lxc_net_t:s0:c296,c329 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:29:56.741000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0000e7320 a2=fc6 a3=0 items=0 ppid=1752 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c296,c329 key=(null) May 17 00:29:56.741000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:29:56.744000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520987 scontext=system_u:system_r:svirt_lxc_net_t:s0:c296,c329 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:29:56.744000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000c12060 a2=fc6 a3=0 items=0 ppid=1752 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c296,c329 key=(null) May 17 00:29:56.744000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:29:56.745000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520987 scontext=system_u:system_r:svirt_lxc_net_t:s0:c296,c329 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:29:56.745000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000c120a0 a2=fc6 a3=0 items=0 ppid=1752 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c296,c329 key=(null) May 17 00:29:56.745000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:29:56.745000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520987 scontext=system_u:system_r:svirt_lxc_net_t:s0:c296,c329 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:29:56.745000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000c120e0 a2=fc6 a3=0 items=0 ppid=1752 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c296,c329 key=(null) May 17 00:29:56.745000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:29:59.677000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=521020 scontext=system_u:system_r:svirt_lxc_net_t:s0:c296,c329 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 17 00:29:59.684099 kernel: kauditd_printk_skb: 282 callbacks suppressed May 17 00:29:59.684282 kernel: audit: type=1400 audit(1747441799.677:795): avc: denied { watch } for pid=1877 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=521020 scontext=system_u:system_r:svirt_lxc_net_t:s0:c296,c329 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 17 00:29:59.677000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000e43940 a2=fc6 a3=0 items=0 ppid=1752 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c296,c329 key=(null) May 17 00:29:59.747074 kernel: audit: type=1300 audit(1747441799.677:795): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000e43940 a2=fc6 a3=0 items=0 ppid=1752 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c296,c329 key=(null) May 17 00:29:59.747268 kernel: audit: type=1327 audit(1747441799.677:795): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:29:59.677000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:30:00.126646 kubelet[2047]: I0517 00:30:00.126602 2047 kuberuntime_manager.go:1746] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" May 17 00:30:00.128016 env[1216]: time="2025-05-17T00:30:00.127956334Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 17 00:30:00.129090 kubelet[2047]: I0517 00:30:00.129044 2047 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" May 17 00:30:01.170445 systemd[1]: Created slice kubepods-besteffort-pod1d582fb6_1b37_491b_a827_67f49ae60828.slice. May 17 00:30:01.295824 kubelet[2047]: I0517 00:30:01.295763 2047 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/1d582fb6-1b37-491b-a827-67f49ae60828-kube-proxy\") pod \"kube-proxy-6bb5w\" (UID: \"1d582fb6-1b37-491b-a827-67f49ae60828\") " pod="kube-system/kube-proxy-6bb5w" May 17 00:30:01.296554 kubelet[2047]: I0517 00:30:01.295846 2047 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/1d582fb6-1b37-491b-a827-67f49ae60828-lib-modules\") pod \"kube-proxy-6bb5w\" (UID: \"1d582fb6-1b37-491b-a827-67f49ae60828\") " pod="kube-system/kube-proxy-6bb5w" May 17 00:30:01.296554 kubelet[2047]: I0517 00:30:01.295942 2047 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/1d582fb6-1b37-491b-a827-67f49ae60828-xtables-lock\") pod \"kube-proxy-6bb5w\" (UID: \"1d582fb6-1b37-491b-a827-67f49ae60828\") " pod="kube-system/kube-proxy-6bb5w" May 17 00:30:01.296554 kubelet[2047]: I0517 00:30:01.296012 2047 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-sgrgr\" (UniqueName: \"kubernetes.io/projected/1d582fb6-1b37-491b-a827-67f49ae60828-kube-api-access-sgrgr\") pod \"kube-proxy-6bb5w\" (UID: \"1d582fb6-1b37-491b-a827-67f49ae60828\") " pod="kube-system/kube-proxy-6bb5w" May 17 00:30:01.361641 systemd[1]: Created slice kubepods-besteffort-podd93ab025_8bca_46af_8b07_d55e0ef22b01.slice. May 17 00:30:01.404395 kubelet[2047]: I0517 00:30:01.404344 2047 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" May 17 00:30:01.487014 env[1216]: time="2025-05-17T00:30:01.486847732Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-6bb5w,Uid:1d582fb6-1b37-491b-a827-67f49ae60828,Namespace:kube-system,Attempt:0,}" May 17 00:30:01.497804 kubelet[2047]: I0517 00:30:01.497752 2047 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4x4bf\" (UniqueName: \"kubernetes.io/projected/d93ab025-8bca-46af-8b07-d55e0ef22b01-kube-api-access-4x4bf\") pod \"tigera-operator-844669ff44-lf4qg\" (UID: \"d93ab025-8bca-46af-8b07-d55e0ef22b01\") " pod="tigera-operator/tigera-operator-844669ff44-lf4qg" May 17 00:30:01.498267 kubelet[2047]: I0517 00:30:01.498221 2047 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/d93ab025-8bca-46af-8b07-d55e0ef22b01-var-lib-calico\") pod \"tigera-operator-844669ff44-lf4qg\" (UID: \"d93ab025-8bca-46af-8b07-d55e0ef22b01\") " pod="tigera-operator/tigera-operator-844669ff44-lf4qg" May 17 00:30:01.522547 env[1216]: time="2025-05-17T00:30:01.522425375Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:30:01.522547 env[1216]: time="2025-05-17T00:30:01.522483325Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:30:01.522982 env[1216]: time="2025-05-17T00:30:01.522522807Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:30:01.523339 env[1216]: time="2025-05-17T00:30:01.523266704Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0f6d71b35f88e0f2e5e502920c04703143cd5b22efff227b06c5f46504cafd26 pid=2122 runtime=io.containerd.runc.v2 May 17 00:30:01.560428 systemd[1]: Started cri-containerd-0f6d71b35f88e0f2e5e502920c04703143cd5b22efff227b06c5f46504cafd26.scope. May 17 00:30:01.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:01.599871 kernel: audit: type=1400 audit(1747441801.576:796): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:01.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:01.623805 kernel: audit: type=1400 audit(1747441801.576:797): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:01.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:01.647016 kernel: audit: type=1400 audit(1747441801.576:798): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:01.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:01.668769 kernel: audit: type=1400 audit(1747441801.576:799): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:01.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:01.697735 kernel: audit: type=1400 audit(1747441801.576:800): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:01.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:01.714953 env[1216]: time="2025-05-17T00:30:01.707479672Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-6bb5w,Uid:1d582fb6-1b37-491b-a827-67f49ae60828,Namespace:kube-system,Attempt:0,} returns sandbox id \"0f6d71b35f88e0f2e5e502920c04703143cd5b22efff227b06c5f46504cafd26\"" May 17 00:30:01.718161 env[1216]: time="2025-05-17T00:30:01.718102043Z" level=info msg="CreateContainer within sandbox \"0f6d71b35f88e0f2e5e502920c04703143cd5b22efff227b06c5f46504cafd26\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 17 00:30:01.748871 kernel: audit: type=1400 audit(1747441801.576:801): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:01.749049 kernel: audit: type=1400 audit(1747441801.576:802): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:01.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:01.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:01.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:01.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:01.576000 audit: BPF prog-id=106 op=LOAD May 17 00:30:01.579000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:01.579000 audit[2132]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2122 pid=2132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:01.579000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066366437316233356638386530663265356535303239323063303437 May 17 00:30:01.579000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:01.579000 audit[2132]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=2122 pid=2132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:01.579000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066366437316233356638386530663265356535303239323063303437 May 17 00:30:01.579000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:01.579000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:01.579000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:01.579000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:01.579000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:01.579000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:01.579000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:01.579000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:01.579000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:01.579000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:01.579000 audit: BPF prog-id=107 op=LOAD May 17 00:30:01.579000 audit[2132]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0003bc1c0 items=0 ppid=2122 pid=2132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:01.579000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066366437316233356638386530663265356535303239323063303437 May 17 00:30:01.623000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:01.623000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:01.623000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:01.623000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:01.623000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:01.623000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:01.623000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:01.623000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:01.623000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:01.623000 audit: BPF prog-id=108 op=LOAD May 17 00:30:01.623000 audit[2132]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0003bc208 items=0 ppid=2122 pid=2132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:01.623000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066366437316233356638386530663265356535303239323063303437 May 17 00:30:01.623000 audit: BPF prog-id=108 op=UNLOAD May 17 00:30:01.623000 audit: BPF prog-id=107 op=UNLOAD May 17 00:30:01.623000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:01.623000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:01.623000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:01.623000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:01.623000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:01.623000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:01.623000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:01.623000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:01.623000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:01.623000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:01.623000 audit: BPF prog-id=109 op=LOAD May 17 00:30:01.623000 audit[2132]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0003bc618 items=0 ppid=2122 pid=2132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:01.623000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066366437316233356638386530663265356535303239323063303437 May 17 00:30:01.768227 env[1216]: time="2025-05-17T00:30:01.768154831Z" level=info msg="CreateContainer within sandbox \"0f6d71b35f88e0f2e5e502920c04703143cd5b22efff227b06c5f46504cafd26\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"93b142f2a68e18588c2fd78563dae7d5d9e9140e829133418221d7498f66e158\"" May 17 00:30:01.771422 env[1216]: time="2025-05-17T00:30:01.771342706Z" level=info msg="StartContainer for \"93b142f2a68e18588c2fd78563dae7d5d9e9140e829133418221d7498f66e158\"" May 17 00:30:01.808802 systemd[1]: Started cri-containerd-93b142f2a68e18588c2fd78563dae7d5d9e9140e829133418221d7498f66e158.scope. May 17 00:30:01.840000 audit[2165]: AVC avc: denied { perfmon } for pid=2165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:01.840000 audit[2165]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fbc13481108 items=0 ppid=2122 pid=2165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:01.840000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933623134326632613638653138353838633266643738353633646165 May 17 00:30:01.841000 audit[2165]: AVC avc: denied { bpf } for pid=2165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:01.841000 audit[2165]: AVC avc: denied { bpf } for pid=2165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:01.841000 audit[2165]: AVC avc: denied { bpf } for pid=2165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:01.841000 audit[2165]: AVC avc: denied { perfmon } for pid=2165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:01.841000 audit[2165]: AVC avc: denied { perfmon } for pid=2165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:01.841000 audit[2165]: AVC avc: denied { perfmon } for pid=2165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:01.841000 audit[2165]: AVC avc: denied { perfmon } for pid=2165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:01.841000 audit[2165]: AVC avc: denied { perfmon } for pid=2165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:01.841000 audit[2165]: AVC avc: denied { bpf } for pid=2165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:01.841000 audit[2165]: AVC avc: denied { bpf } for pid=2165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:01.841000 audit: BPF prog-id=110 op=LOAD May 17 00:30:01.841000 audit[2165]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0002c7ea8 items=0 ppid=2122 pid=2165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:01.841000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933623134326632613638653138353838633266643738353633646165 May 17 00:30:01.843000 audit[2165]: AVC avc: denied { bpf } for pid=2165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:01.843000 audit[2165]: AVC avc: denied { bpf } for pid=2165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:01.843000 audit[2165]: AVC avc: denied { perfmon } for pid=2165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:01.843000 audit[2165]: AVC avc: denied { perfmon } for pid=2165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:01.843000 audit[2165]: AVC avc: denied { perfmon } for pid=2165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:01.843000 audit[2165]: AVC avc: denied { perfmon } for pid=2165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:01.843000 audit[2165]: AVC avc: denied { perfmon } for pid=2165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:01.843000 audit[2165]: AVC avc: denied { bpf } for pid=2165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:01.843000 audit[2165]: AVC avc: denied { bpf } for pid=2165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:01.843000 audit: BPF prog-id=111 op=LOAD May 17 00:30:01.843000 audit[2165]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0002c7ef8 items=0 ppid=2122 pid=2165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:01.843000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933623134326632613638653138353838633266643738353633646165 May 17 00:30:01.844000 audit: BPF prog-id=111 op=UNLOAD May 17 00:30:01.844000 audit: BPF prog-id=110 op=UNLOAD May 17 00:30:01.844000 audit[2165]: AVC avc: denied { bpf } for pid=2165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:01.844000 audit[2165]: AVC avc: denied { bpf } for pid=2165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:01.844000 audit[2165]: AVC avc: denied { bpf } for pid=2165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:01.844000 audit[2165]: AVC avc: denied { perfmon } for pid=2165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:01.844000 audit[2165]: AVC avc: denied { perfmon } for pid=2165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:01.844000 audit[2165]: AVC avc: denied { perfmon } for pid=2165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:01.844000 audit[2165]: AVC avc: denied { perfmon } for pid=2165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:01.844000 audit[2165]: AVC avc: denied { perfmon } for pid=2165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:01.844000 audit[2165]: AVC avc: denied { bpf } for pid=2165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:01.844000 audit[2165]: AVC avc: denied { bpf } for pid=2165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:01.844000 audit: BPF prog-id=112 op=LOAD May 17 00:30:01.844000 audit[2165]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0002c7f88 items=0 ppid=2122 pid=2165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:01.844000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933623134326632613638653138353838633266643738353633646165 May 17 00:30:01.882988 env[1216]: time="2025-05-17T00:30:01.882923330Z" level=info msg="StartContainer for \"93b142f2a68e18588c2fd78563dae7d5d9e9140e829133418221d7498f66e158\" returns successfully" May 17 00:30:01.972761 env[1216]: time="2025-05-17T00:30:01.972677917Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-844669ff44-lf4qg,Uid:d93ab025-8bca-46af-8b07-d55e0ef22b01,Namespace:tigera-operator,Attempt:0,}" May 17 00:30:02.000257 env[1216]: time="2025-05-17T00:30:01.999895615Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:30:02.000257 env[1216]: time="2025-05-17T00:30:01.999953109Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:30:02.000257 env[1216]: time="2025-05-17T00:30:01.999975537Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:30:02.000842 env[1216]: time="2025-05-17T00:30:02.000723582Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6aa74835b18328f5a53b8cf0f06d6ed6fc3f9bda5d54aeac44fbffcf6ffab68d pid=2209 runtime=io.containerd.runc.v2 May 17 00:30:02.034670 systemd[1]: Started cri-containerd-6aa74835b18328f5a53b8cf0f06d6ed6fc3f9bda5d54aeac44fbffcf6ffab68d.scope. May 17 00:30:02.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:02.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:02.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:02.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:02.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:02.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:02.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:02.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:02.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:02.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:02.071000 audit: BPF prog-id=113 op=LOAD May 17 00:30:02.072000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:02.072000 audit[2218]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2209 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:02.072000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661613734383335623138333238663561353362386366306630366436 May 17 00:30:02.072000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:02.072000 audit[2218]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2209 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:02.072000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661613734383335623138333238663561353362386366306630366436 May 17 00:30:02.073000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:02.073000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:02.073000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:02.073000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:02.073000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:02.073000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:02.073000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:02.073000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:02.073000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:02.073000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:02.073000 audit: BPF prog-id=114 op=LOAD May 17 00:30:02.073000 audit[2218]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000098ec0 items=0 ppid=2209 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:02.073000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661613734383335623138333238663561353362386366306630366436 May 17 00:30:02.073000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:02.073000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:02.073000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:02.073000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:02.073000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:02.073000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:02.073000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:02.073000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:02.073000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:02.073000 audit: BPF prog-id=115 op=LOAD May 17 00:30:02.073000 audit[2218]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000098f08 items=0 ppid=2209 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:02.073000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661613734383335623138333238663561353362386366306630366436 May 17 00:30:02.073000 audit: BPF prog-id=115 op=UNLOAD May 17 00:30:02.073000 audit: BPF prog-id=114 op=UNLOAD May 17 00:30:02.073000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:02.073000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:02.073000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:02.073000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:02.073000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:02.073000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:02.073000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:02.073000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:02.073000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:02.073000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:02.073000 audit: BPF prog-id=116 op=LOAD May 17 00:30:02.073000 audit[2218]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000099318 items=0 ppid=2209 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:02.073000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661613734383335623138333238663561353362386366306630366436 May 17 00:30:02.134000 audit[2263]: NETFILTER_CFG table=mangle:38 family=10 entries=1 op=nft_register_chain pid=2263 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:30:02.137000 audit[2262]: NETFILTER_CFG table=mangle:39 family=2 entries=1 op=nft_register_chain pid=2262 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:30:02.137000 audit[2262]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd0d265980 a2=0 a3=7ffd0d26596c items=0 ppid=2176 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:02.137000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 17 00:30:02.134000 audit[2263]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffce7d22d30 a2=0 a3=7ffce7d22d1c items=0 ppid=2176 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:02.134000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 17 00:30:02.169000 audit[2268]: NETFILTER_CFG table=nat:40 family=10 entries=1 op=nft_register_chain pid=2268 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:30:02.169000 audit[2268]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff321edf70 a2=0 a3=7fff321edf5c items=0 ppid=2176 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:02.169000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 17 00:30:02.173000 audit[2275]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=2275 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:30:02.173000 audit[2275]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc29d8d0a0 a2=0 a3=7ffc29d8d08c items=0 ppid=2176 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:02.173000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 17 00:30:02.174000 audit[2267]: NETFILTER_CFG table=nat:42 family=2 entries=1 op=nft_register_chain pid=2267 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:30:02.174000 audit[2267]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe284af2e0 a2=0 a3=7ffe284af2cc items=0 ppid=2176 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:02.174000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 17 00:30:02.178753 env[1216]: time="2025-05-17T00:30:02.178652503Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-844669ff44-lf4qg,Uid:d93ab025-8bca-46af-8b07-d55e0ef22b01,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"6aa74835b18328f5a53b8cf0f06d6ed6fc3f9bda5d54aeac44fbffcf6ffab68d\"" May 17 00:30:02.181155 env[1216]: time="2025-05-17T00:30:02.181102541Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.0\"" May 17 00:30:02.189000 audit[2276]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=2276 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:30:02.189000 audit[2276]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe33ffa840 a2=0 a3=7ffe33ffa82c items=0 ppid=2176 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:02.189000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 17 00:30:02.253000 audit[2277]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2277 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:30:02.253000 audit[2277]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff60fa0080 a2=0 a3=7fff60fa006c items=0 ppid=2176 pid=2277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:02.253000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 17 00:30:02.261000 audit[2279]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2279 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:30:02.261000 audit[2279]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc6dd48890 a2=0 a3=7ffc6dd4887c items=0 ppid=2176 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:02.261000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 17 00:30:02.267000 audit[2282]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2282 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:30:02.267000 audit[2282]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc30962150 a2=0 a3=7ffc3096213c items=0 ppid=2176 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:02.267000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 17 00:30:02.270000 audit[2283]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2283 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:30:02.270000 audit[2283]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffee90fe150 a2=0 a3=7ffee90fe13c items=0 ppid=2176 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:02.270000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 17 00:30:02.274000 audit[2285]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2285 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:30:02.274000 audit[2285]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd7ac4b890 a2=0 a3=7ffd7ac4b87c items=0 ppid=2176 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:02.274000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 17 00:30:02.276000 audit[2286]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2286 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:30:02.276000 audit[2286]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff05f714e0 a2=0 a3=7fff05f714cc items=0 ppid=2176 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:02.276000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 17 00:30:02.281000 audit[2288]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2288 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:30:02.281000 audit[2288]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc26f5d710 a2=0 a3=7ffc26f5d6fc items=0 ppid=2176 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:02.281000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 17 00:30:02.289000 audit[2291]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2291 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:30:02.289000 audit[2291]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fffd9853a70 a2=0 a3=7fffd9853a5c items=0 ppid=2176 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:02.289000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 17 00:30:02.292000 audit[2292]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2292 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:30:02.292000 audit[2292]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc33b59ff0 a2=0 a3=7ffc33b59fdc items=0 ppid=2176 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:02.292000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 17 00:30:02.298000 audit[2294]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2294 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:30:02.298000 audit[2294]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffccd874510 a2=0 a3=7ffccd8744fc items=0 ppid=2176 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:02.298000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 17 00:30:02.301000 audit[2295]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2295 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:30:02.301000 audit[2295]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffc3df71c0 a2=0 a3=7fffc3df71ac items=0 ppid=2176 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:02.301000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 17 00:30:02.306000 audit[2297]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2297 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:30:02.306000 audit[2297]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcd6ab4540 a2=0 a3=7ffcd6ab452c items=0 ppid=2176 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:02.306000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 00:30:02.312000 audit[2300]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2300 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:30:02.312000 audit[2300]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffca5c72470 a2=0 a3=7ffca5c7245c items=0 ppid=2176 pid=2300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:02.312000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 00:30:02.319000 audit[2303]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2303 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:30:02.319000 audit[2303]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffb3c9b2d0 a2=0 a3=7fffb3c9b2bc items=0 ppid=2176 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:02.319000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 17 00:30:02.321000 audit[2304]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2304 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:30:02.321000 audit[2304]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffdd6ee8ee0 a2=0 a3=7ffdd6ee8ecc items=0 ppid=2176 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:02.321000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 17 00:30:02.325000 audit[2306]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2306 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:30:02.325000 audit[2306]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffd93be7d50 a2=0 a3=7ffd93be7d3c items=0 ppid=2176 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:02.325000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:30:02.331000 audit[2309]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2309 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:30:02.331000 audit[2309]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffef7ca95f0 a2=0 a3=7ffef7ca95dc items=0 ppid=2176 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:02.331000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:30:02.333000 audit[2310]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2310 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:30:02.333000 audit[2310]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffc0e415a0 a2=0 a3=7fffc0e4158c items=0 ppid=2176 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:02.333000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 17 00:30:02.337000 audit[2312]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2312 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:30:02.337000 audit[2312]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffe22fce210 a2=0 a3=7ffe22fce1fc items=0 ppid=2176 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:02.337000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 17 00:30:02.376000 audit[2318]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2318 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:30:02.376000 audit[2318]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7fffa85602d0 a2=0 a3=7fffa85602bc items=0 ppid=2176 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:02.376000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:30:02.389000 audit[2318]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2318 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:30:02.389000 audit[2318]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7fffa85602d0 a2=0 a3=7fffa85602bc items=0 ppid=2176 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:02.389000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:30:02.393000 audit[2323]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2323 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:30:02.393000 audit[2323]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff26cc0f60 a2=0 a3=7fff26cc0f4c items=0 ppid=2176 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:02.393000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 17 00:30:02.399000 audit[2325]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2325 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:30:02.399000 audit[2325]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff45c6c7e0 a2=0 a3=7fff45c6c7cc items=0 ppid=2176 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:02.399000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 17 00:30:02.415000 audit[2328]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2328 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:30:02.415000 audit[2328]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc05fb3160 a2=0 a3=7ffc05fb314c items=0 ppid=2176 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:02.415000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 17 00:30:02.423000 audit[2329]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2329 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:30:02.423000 audit[2329]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdce32c400 a2=0 a3=7ffdce32c3ec items=0 ppid=2176 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:02.423000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 17 00:30:02.429000 audit[2331]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2331 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:30:02.429000 audit[2331]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdedd057c0 a2=0 a3=7ffdedd057ac items=0 ppid=2176 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:02.429000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 17 00:30:02.432000 audit[2332]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2332 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:30:02.432000 audit[2332]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff2ed0ef30 a2=0 a3=7fff2ed0ef1c items=0 ppid=2176 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:02.432000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 17 00:30:02.437000 audit[2334]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2334 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:30:02.437000 audit[2334]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffdc6f63d20 a2=0 a3=7ffdc6f63d0c items=0 ppid=2176 pid=2334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:02.437000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 17 00:30:02.444000 audit[2337]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2337 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:30:02.444000 audit[2337]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffc06b6b5d0 a2=0 a3=7ffc06b6b5bc items=0 ppid=2176 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:02.444000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 17 00:30:02.446000 audit[2338]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2338 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:30:02.446000 audit[2338]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff7467ed70 a2=0 a3=7fff7467ed5c items=0 ppid=2176 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:02.446000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 17 00:30:02.451000 audit[2340]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2340 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:30:02.451000 audit[2340]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdcafc3240 a2=0 a3=7ffdcafc322c items=0 ppid=2176 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:02.451000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 17 00:30:02.453000 audit[2341]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2341 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:30:02.453000 audit[2341]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc24c311f0 a2=0 a3=7ffc24c311dc items=0 ppid=2176 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:02.453000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 17 00:30:02.457000 audit[2343]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2343 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:30:02.457000 audit[2343]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffe20fbf80 a2=0 a3=7fffe20fbf6c items=0 ppid=2176 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:02.457000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 00:30:02.463000 audit[2346]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2346 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:30:02.463000 audit[2346]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd2cd90d80 a2=0 a3=7ffd2cd90d6c items=0 ppid=2176 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:02.463000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 17 00:30:02.469000 audit[2349]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2349 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:30:02.469000 audit[2349]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdd91d60c0 a2=0 a3=7ffdd91d60ac items=0 ppid=2176 pid=2349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:02.469000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 17 00:30:02.472000 audit[2350]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2350 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:30:02.472000 audit[2350]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe43b613b0 a2=0 a3=7ffe43b6139c items=0 ppid=2176 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:02.472000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 17 00:30:02.476000 audit[2352]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2352 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:30:02.476000 audit[2352]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffde6af2a60 a2=0 a3=7ffde6af2a4c items=0 ppid=2176 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:02.476000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:30:02.485000 audit[2355]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2355 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:30:02.485000 audit[2355]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffc7b1223b0 a2=0 a3=7ffc7b12239c items=0 ppid=2176 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:02.485000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:30:02.487000 audit[2356]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2356 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:30:02.487000 audit[2356]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffde8204e50 a2=0 a3=7ffde8204e3c items=0 ppid=2176 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:02.487000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 17 00:30:02.491000 audit[2358]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2358 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:30:02.491000 audit[2358]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffd5c239460 a2=0 a3=7ffd5c23944c items=0 ppid=2176 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:02.491000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 17 00:30:02.494000 audit[2359]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2359 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:30:02.494000 audit[2359]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc421f51f0 a2=0 a3=7ffc421f51dc items=0 ppid=2176 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:02.494000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 17 00:30:02.498000 audit[2361]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2361 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:30:02.498000 audit[2361]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffeaa3858f0 a2=0 a3=7ffeaa3858dc items=0 ppid=2176 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:02.498000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:30:02.507000 audit[2364]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2364 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:30:02.507000 audit[2364]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd27dd7780 a2=0 a3=7ffd27dd776c items=0 ppid=2176 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:02.507000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:30:02.516000 audit[2366]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2366 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 17 00:30:02.516000 audit[2366]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7fff35bd2900 a2=0 a3=7fff35bd28ec items=0 ppid=2176 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:02.516000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:30:02.517000 audit[2366]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2366 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 17 00:30:02.517000 audit[2366]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7fff35bd2900 a2=0 a3=7fff35bd28ec items=0 ppid=2176 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:02.517000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:30:03.745060 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2062899525.mount: Deactivated successfully. May 17 00:30:04.789947 env[1216]: time="2025-05-17T00:30:04.786819636Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.38.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:30:04.794088 env[1216]: time="2025-05-17T00:30:04.794024155Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5e43c1322619406528ff596056dfeb70cb8d20c5c00439feb752a7725302e033,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:30:04.797631 env[1216]: time="2025-05-17T00:30:04.797576063Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.38.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:30:04.800972 env[1216]: time="2025-05-17T00:30:04.800916532Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:e0a34b265aebce1a2db906d8dad99190706e8bf3910cae626b9c2eb6bbb21775,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:30:04.801945 env[1216]: time="2025-05-17T00:30:04.801891073Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.0\" returns image reference \"sha256:5e43c1322619406528ff596056dfeb70cb8d20c5c00439feb752a7725302e033\"" May 17 00:30:04.810381 env[1216]: time="2025-05-17T00:30:04.810309804Z" level=info msg="CreateContainer within sandbox \"6aa74835b18328f5a53b8cf0f06d6ed6fc3f9bda5d54aeac44fbffcf6ffab68d\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" May 17 00:30:04.831828 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3000077225.mount: Deactivated successfully. May 17 00:30:04.842375 env[1216]: time="2025-05-17T00:30:04.842265374Z" level=info msg="CreateContainer within sandbox \"6aa74835b18328f5a53b8cf0f06d6ed6fc3f9bda5d54aeac44fbffcf6ffab68d\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"0da07648dc8e45f6ae47d6085048f332ed3582b0266ca578b42f058610536d1d\"" May 17 00:30:04.844752 env[1216]: time="2025-05-17T00:30:04.843306070Z" level=info msg="StartContainer for \"0da07648dc8e45f6ae47d6085048f332ed3582b0266ca578b42f058610536d1d\"" May 17 00:30:04.891060 systemd[1]: Started cri-containerd-0da07648dc8e45f6ae47d6085048f332ed3582b0266ca578b42f058610536d1d.scope. May 17 00:30:04.926807 kernel: kauditd_printk_skb: 303 callbacks suppressed May 17 00:30:04.926990 kernel: audit: type=1400 audit(1747441804.911:889): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:04.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:04.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:04.961895 kernel: audit: type=1400 audit(1747441804.911:890): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:04.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:04.984990 kernel: audit: type=1400 audit(1747441804.911:891): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:04.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:05.007029 kernel: audit: type=1400 audit(1747441804.911:892): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:04.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:05.034763 kernel: audit: type=1400 audit(1747441804.911:893): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:05.034920 kernel: audit: type=1400 audit(1747441804.911:894): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:04.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:04.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:05.082735 kernel: audit: type=1400 audit(1747441804.911:895): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:05.082937 kernel: audit: type=1400 audit(1747441804.911:896): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:04.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:04.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:05.120613 kernel: audit: type=1400 audit(1747441804.911:897): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:05.120826 kernel: audit: type=1400 audit(1747441804.917:898): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:04.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:04.917000 audit: BPF prog-id=117 op=LOAD May 17 00:30:04.928000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:04.928000 audit[2374]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2209 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:04.928000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064613037363438646338653435663661653437643630383530343866 May 17 00:30:04.928000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:04.928000 audit[2374]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2209 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:04.928000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064613037363438646338653435663661653437643630383530343866 May 17 00:30:04.928000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:04.928000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:04.928000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:04.928000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:04.928000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:04.928000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:04.928000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:04.928000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:04.928000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:04.928000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:04.928000 audit: BPF prog-id=118 op=LOAD May 17 00:30:04.928000 audit[2374]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002e6190 items=0 ppid=2209 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:04.928000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064613037363438646338653435663661653437643630383530343866 May 17 00:30:04.938000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:04.938000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:04.938000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:04.938000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:04.938000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:04.938000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:04.938000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:04.938000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:04.938000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:04.938000 audit: BPF prog-id=119 op=LOAD May 17 00:30:04.938000 audit[2374]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002e61d8 items=0 ppid=2209 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:04.938000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064613037363438646338653435663661653437643630383530343866 May 17 00:30:04.939000 audit: BPF prog-id=119 op=UNLOAD May 17 00:30:04.939000 audit: BPF prog-id=118 op=UNLOAD May 17 00:30:04.939000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:04.939000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:04.939000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:04.939000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:04.939000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:04.939000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:04.939000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:04.939000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:04.939000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:04.939000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:04.939000 audit: BPF prog-id=120 op=LOAD May 17 00:30:04.939000 audit[2374]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002e65e8 items=0 ppid=2209 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:04.939000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064613037363438646338653435663661653437643630383530343866 May 17 00:30:05.145425 env[1216]: time="2025-05-17T00:30:05.142283802Z" level=info msg="StartContainer for \"0da07648dc8e45f6ae47d6085048f332ed3582b0266ca578b42f058610536d1d\" returns successfully" May 17 00:30:05.189504 kubelet[2047]: I0517 00:30:05.189405 2047 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-6bb5w" podStartSLOduration=4.189376358 podStartE2EDuration="4.189376358s" podCreationTimestamp="2025-05-17 00:30:01 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:30:02.130596896 +0000 UTC m=+7.419703790" watchObservedRunningTime="2025-05-17 00:30:05.189376358 +0000 UTC m=+10.478483246" May 17 00:30:07.238103 kubelet[2047]: I0517 00:30:07.238013 2047 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-844669ff44-lf4qg" podStartSLOduration=3.614940023 podStartE2EDuration="6.237983854s" podCreationTimestamp="2025-05-17 00:30:01 +0000 UTC" firstStartedPulling="2025-05-17 00:30:02.180304754 +0000 UTC m=+7.469411641" lastFinishedPulling="2025-05-17 00:30:04.803348609 +0000 UTC m=+10.092455472" observedRunningTime="2025-05-17 00:30:05.192041568 +0000 UTC m=+10.481148459" watchObservedRunningTime="2025-05-17 00:30:07.237983854 +0000 UTC m=+12.527090745" May 17 00:30:12.799000 audit[1435]: USER_END pid=1435 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:30:12.800350 sudo[1435]: pam_unix(sudo:session): session closed for user root May 17 00:30:12.805894 kernel: kauditd_printk_skb: 47 callbacks suppressed May 17 00:30:12.806065 kernel: audit: type=1106 audit(1747441812.799:907): pid=1435 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:30:12.799000 audit[1435]: CRED_DISP pid=1435 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:30:12.857771 kernel: audit: type=1104 audit(1747441812.799:908): pid=1435 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:30:12.874845 sshd[1432]: pam_unix(sshd:session): session closed for user core May 17 00:30:12.876000 audit[1432]: USER_END pid=1432 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:30:12.881903 systemd[1]: sshd@6-10.128.0.54:22-139.178.89.65:34528.service: Deactivated successfully. May 17 00:30:12.883365 systemd[1]: session-7.scope: Deactivated successfully. May 17 00:30:12.883647 systemd[1]: session-7.scope: Consumed 8.600s CPU time. May 17 00:30:12.908340 systemd-logind[1224]: Session 7 logged out. Waiting for processes to exit. May 17 00:30:12.911357 kernel: audit: type=1106 audit(1747441812.876:909): pid=1432 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:30:12.910798 systemd-logind[1224]: Removed session 7. May 17 00:30:12.876000 audit[1432]: CRED_DISP pid=1432 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:30:12.881000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.54:22-139.178.89.65:34528 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:30:12.965822 kernel: audit: type=1104 audit(1747441812.876:910): pid=1432 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:30:12.966053 kernel: audit: type=1131 audit(1747441812.881:911): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.54:22-139.178.89.65:34528 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:30:14.316000 audit[2450]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2450 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:30:14.335757 kernel: audit: type=1325 audit(1747441814.316:912): table=filter:89 family=2 entries=15 op=nft_register_rule pid=2450 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:30:14.316000 audit[2450]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7fff5a68d900 a2=0 a3=7fff5a68d8ec items=0 ppid=2176 pid=2450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:14.377749 kernel: audit: type=1300 audit(1747441814.316:912): arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7fff5a68d900 a2=0 a3=7fff5a68d8ec items=0 ppid=2176 pid=2450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:14.316000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:30:14.406736 kernel: audit: type=1327 audit(1747441814.316:912): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:30:14.343000 audit[2450]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2450 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:30:14.343000 audit[2450]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff5a68d900 a2=0 a3=0 items=0 ppid=2176 pid=2450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:14.457390 kernel: audit: type=1325 audit(1747441814.343:913): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2450 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:30:14.457587 kernel: audit: type=1300 audit(1747441814.343:913): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff5a68d900 a2=0 a3=0 items=0 ppid=2176 pid=2450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:14.343000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:30:14.439000 audit[2452]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2452 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:30:14.439000 audit[2452]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffca25f8da0 a2=0 a3=7ffca25f8d8c items=0 ppid=2176 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:14.439000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:30:14.468000 audit[2452]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2452 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:30:14.468000 audit[2452]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffca25f8da0 a2=0 a3=0 items=0 ppid=2176 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:14.468000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:30:18.529000 audit[2458]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2458 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:30:18.535761 kernel: kauditd_printk_skb: 7 callbacks suppressed May 17 00:30:18.535979 kernel: audit: type=1325 audit(1747441818.529:916): table=filter:93 family=2 entries=17 op=nft_register_rule pid=2458 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:30:18.529000 audit[2458]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffc3c8bd620 a2=0 a3=7ffc3c8bd60c items=0 ppid=2176 pid=2458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:18.592743 kernel: audit: type=1300 audit(1747441818.529:916): arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffc3c8bd620 a2=0 a3=7ffc3c8bd60c items=0 ppid=2176 pid=2458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:18.529000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:30:18.612739 kernel: audit: type=1327 audit(1747441818.529:916): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:30:18.578000 audit[2458]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2458 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:30:18.578000 audit[2458]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc3c8bd620 a2=0 a3=0 items=0 ppid=2176 pid=2458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:18.661681 kernel: audit: type=1325 audit(1747441818.578:917): table=nat:94 family=2 entries=12 op=nft_register_rule pid=2458 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:30:18.661888 kernel: audit: type=1300 audit(1747441818.578:917): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc3c8bd620 a2=0 a3=0 items=0 ppid=2176 pid=2458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:18.661972 kernel: audit: type=1327 audit(1747441818.578:917): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:30:18.578000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:30:18.699000 audit[2460]: NETFILTER_CFG table=filter:95 family=2 entries=18 op=nft_register_rule pid=2460 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:30:18.716726 kernel: audit: type=1325 audit(1747441818.699:918): table=filter:95 family=2 entries=18 op=nft_register_rule pid=2460 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:30:18.716920 kernel: audit: type=1300 audit(1747441818.699:918): arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffd7ff8eee0 a2=0 a3=7ffd7ff8eecc items=0 ppid=2176 pid=2460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:18.699000 audit[2460]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffd7ff8eee0 a2=0 a3=7ffd7ff8eecc items=0 ppid=2176 pid=2460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:18.699000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:30:18.765825 kernel: audit: type=1327 audit(1747441818.699:918): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:30:18.766000 audit[2460]: NETFILTER_CFG table=nat:96 family=2 entries=12 op=nft_register_rule pid=2460 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:30:18.766000 audit[2460]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd7ff8eee0 a2=0 a3=0 items=0 ppid=2176 pid=2460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:18.766000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:30:18.785061 kernel: audit: type=1325 audit(1747441818.766:919): table=nat:96 family=2 entries=12 op=nft_register_rule pid=2460 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:30:18.947660 systemd[1]: Created slice kubepods-besteffort-podce1590f5_10fe_4df6_85bd_3737d292bc50.slice. May 17 00:30:18.957729 kubelet[2047]: I0517 00:30:18.957658 2047 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/ce1590f5-10fe-4df6-85bd-3737d292bc50-tigera-ca-bundle\") pod \"calico-typha-7484876447-qxs9n\" (UID: \"ce1590f5-10fe-4df6-85bd-3737d292bc50\") " pod="calico-system/calico-typha-7484876447-qxs9n" May 17 00:30:18.958547 kubelet[2047]: I0517 00:30:18.958504 2047 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-z6qj7\" (UniqueName: \"kubernetes.io/projected/ce1590f5-10fe-4df6-85bd-3737d292bc50-kube-api-access-z6qj7\") pod \"calico-typha-7484876447-qxs9n\" (UID: \"ce1590f5-10fe-4df6-85bd-3737d292bc50\") " pod="calico-system/calico-typha-7484876447-qxs9n" May 17 00:30:18.958854 kubelet[2047]: I0517 00:30:18.958777 2047 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/ce1590f5-10fe-4df6-85bd-3737d292bc50-typha-certs\") pod \"calico-typha-7484876447-qxs9n\" (UID: \"ce1590f5-10fe-4df6-85bd-3737d292bc50\") " pod="calico-system/calico-typha-7484876447-qxs9n" May 17 00:30:19.254617 env[1216]: time="2025-05-17T00:30:19.254540643Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-7484876447-qxs9n,Uid:ce1590f5-10fe-4df6-85bd-3737d292bc50,Namespace:calico-system,Attempt:0,}" May 17 00:30:19.302656 env[1216]: time="2025-05-17T00:30:19.302304983Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:30:19.302656 env[1216]: time="2025-05-17T00:30:19.302425270Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:30:19.302656 env[1216]: time="2025-05-17T00:30:19.302467651Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:30:19.303045 env[1216]: time="2025-05-17T00:30:19.302913355Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2b762cc1eaecab0640ce5e627c54f0005da3e9db28425ae7bac5fe42fead659b pid=2469 runtime=io.containerd.runc.v2 May 17 00:30:19.357978 systemd[1]: Started cri-containerd-2b762cc1eaecab0640ce5e627c54f0005da3e9db28425ae7bac5fe42fead659b.scope. May 17 00:30:19.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:19.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:19.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:19.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:19.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:19.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:19.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:19.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:19.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:19.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:19.408000 audit: BPF prog-id=121 op=LOAD May 17 00:30:19.410000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:19.410000 audit[2480]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2469 pid=2480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:19.410000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262373632636331656165636162303634306365356536323763353466 May 17 00:30:19.410000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:19.410000 audit[2480]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2469 pid=2480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:19.410000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262373632636331656165636162303634306365356536323763353466 May 17 00:30:19.411000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:19.411000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:19.411000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:19.411000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:19.411000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:19.411000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:19.411000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:19.411000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:19.411000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:19.411000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:19.411000 audit: BPF prog-id=122 op=LOAD May 17 00:30:19.411000 audit[2480]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000300360 items=0 ppid=2469 pid=2480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:19.411000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262373632636331656165636162303634306365356536323763353466 May 17 00:30:19.412000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:19.412000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:19.412000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:19.412000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:19.412000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:19.412000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:19.412000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:19.412000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:19.412000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:19.412000 audit: BPF prog-id=123 op=LOAD May 17 00:30:19.412000 audit[2480]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003003a8 items=0 ppid=2469 pid=2480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:19.412000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262373632636331656165636162303634306365356536323763353466 May 17 00:30:19.414000 audit: BPF prog-id=123 op=UNLOAD May 17 00:30:19.415000 audit: BPF prog-id=122 op=UNLOAD May 17 00:30:19.416000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:19.416000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:19.416000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:19.416000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:19.416000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:19.416000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:19.416000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:19.416000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:19.416000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:19.416000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:19.416000 audit: BPF prog-id=124 op=LOAD May 17 00:30:19.416000 audit[2480]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003007b8 items=0 ppid=2469 pid=2480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:19.416000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262373632636331656165636162303634306365356536323763353466 May 17 00:30:19.447819 systemd[1]: Created slice kubepods-besteffort-podbef4f664_d1af_42c6_981d_ca0b9d422fee.slice. May 17 00:30:19.460008 kubelet[2047]: I0517 00:30:19.459962 2047 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/bef4f664-d1af-42c6-981d-ca0b9d422fee-lib-modules\") pod \"calico-node-tvs9d\" (UID: \"bef4f664-d1af-42c6-981d-ca0b9d422fee\") " pod="calico-system/calico-node-tvs9d" May 17 00:30:19.460314 kubelet[2047]: I0517 00:30:19.460282 2047 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/bef4f664-d1af-42c6-981d-ca0b9d422fee-node-certs\") pod \"calico-node-tvs9d\" (UID: \"bef4f664-d1af-42c6-981d-ca0b9d422fee\") " pod="calico-system/calico-node-tvs9d" May 17 00:30:19.460490 kubelet[2047]: I0517 00:30:19.460464 2047 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/bef4f664-d1af-42c6-981d-ca0b9d422fee-cni-bin-dir\") pod \"calico-node-tvs9d\" (UID: \"bef4f664-d1af-42c6-981d-ca0b9d422fee\") " pod="calico-system/calico-node-tvs9d" May 17 00:30:19.460758 kubelet[2047]: I0517 00:30:19.460729 2047 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/bef4f664-d1af-42c6-981d-ca0b9d422fee-cni-log-dir\") pod \"calico-node-tvs9d\" (UID: \"bef4f664-d1af-42c6-981d-ca0b9d422fee\") " pod="calico-system/calico-node-tvs9d" May 17 00:30:19.460953 kubelet[2047]: I0517 00:30:19.460924 2047 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/bef4f664-d1af-42c6-981d-ca0b9d422fee-cni-net-dir\") pod \"calico-node-tvs9d\" (UID: \"bef4f664-d1af-42c6-981d-ca0b9d422fee\") " pod="calico-system/calico-node-tvs9d" May 17 00:30:19.461122 kubelet[2047]: I0517 00:30:19.461093 2047 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/bef4f664-d1af-42c6-981d-ca0b9d422fee-flexvol-driver-host\") pod \"calico-node-tvs9d\" (UID: \"bef4f664-d1af-42c6-981d-ca0b9d422fee\") " pod="calico-system/calico-node-tvs9d" May 17 00:30:19.461342 kubelet[2047]: I0517 00:30:19.461301 2047 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/bef4f664-d1af-42c6-981d-ca0b9d422fee-xtables-lock\") pod \"calico-node-tvs9d\" (UID: \"bef4f664-d1af-42c6-981d-ca0b9d422fee\") " pod="calico-system/calico-node-tvs9d" May 17 00:30:19.461537 kubelet[2047]: I0517 00:30:19.461511 2047 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/bef4f664-d1af-42c6-981d-ca0b9d422fee-tigera-ca-bundle\") pod \"calico-node-tvs9d\" (UID: \"bef4f664-d1af-42c6-981d-ca0b9d422fee\") " pod="calico-system/calico-node-tvs9d" May 17 00:30:19.461735 kubelet[2047]: I0517 00:30:19.461703 2047 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/bef4f664-d1af-42c6-981d-ca0b9d422fee-var-lib-calico\") pod \"calico-node-tvs9d\" (UID: \"bef4f664-d1af-42c6-981d-ca0b9d422fee\") " pod="calico-system/calico-node-tvs9d" May 17 00:30:19.461920 kubelet[2047]: I0517 00:30:19.461893 2047 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/bef4f664-d1af-42c6-981d-ca0b9d422fee-var-run-calico\") pod \"calico-node-tvs9d\" (UID: \"bef4f664-d1af-42c6-981d-ca0b9d422fee\") " pod="calico-system/calico-node-tvs9d" May 17 00:30:19.462098 kubelet[2047]: I0517 00:30:19.462072 2047 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-whpsf\" (UniqueName: \"kubernetes.io/projected/bef4f664-d1af-42c6-981d-ca0b9d422fee-kube-api-access-whpsf\") pod \"calico-node-tvs9d\" (UID: \"bef4f664-d1af-42c6-981d-ca0b9d422fee\") " pod="calico-system/calico-node-tvs9d" May 17 00:30:19.462272 kubelet[2047]: I0517 00:30:19.462248 2047 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/bef4f664-d1af-42c6-981d-ca0b9d422fee-policysync\") pod \"calico-node-tvs9d\" (UID: \"bef4f664-d1af-42c6-981d-ca0b9d422fee\") " pod="calico-system/calico-node-tvs9d" May 17 00:30:19.533903 env[1216]: time="2025-05-17T00:30:19.533741623Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-7484876447-qxs9n,Uid:ce1590f5-10fe-4df6-85bd-3737d292bc50,Namespace:calico-system,Attempt:0,} returns sandbox id \"2b762cc1eaecab0640ce5e627c54f0005da3e9db28425ae7bac5fe42fead659b\"" May 17 00:30:19.540631 env[1216]: time="2025-05-17T00:30:19.540569744Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.0\"" May 17 00:30:19.565920 kubelet[2047]: E0517 00:30:19.565879 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:19.566212 kubelet[2047]: W0517 00:30:19.566181 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:19.566412 kubelet[2047]: E0517 00:30:19.566386 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:19.567026 kubelet[2047]: E0517 00:30:19.567004 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:19.567168 kubelet[2047]: W0517 00:30:19.567146 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:19.567308 kubelet[2047]: E0517 00:30:19.567283 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:19.567837 kubelet[2047]: E0517 00:30:19.567815 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:19.567999 kubelet[2047]: W0517 00:30:19.567976 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:19.568111 kubelet[2047]: E0517 00:30:19.568091 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:19.568581 kubelet[2047]: E0517 00:30:19.568558 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:19.570772 kubelet[2047]: W0517 00:30:19.570741 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:19.570964 kubelet[2047]: E0517 00:30:19.570939 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:19.572496 kubelet[2047]: E0517 00:30:19.572471 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:19.572681 kubelet[2047]: W0517 00:30:19.572654 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:19.572836 kubelet[2047]: E0517 00:30:19.572813 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:19.576778 kubelet[2047]: E0517 00:30:19.574824 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:19.576778 kubelet[2047]: W0517 00:30:19.574845 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:19.576778 kubelet[2047]: E0517 00:30:19.574865 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:19.576778 kubelet[2047]: E0517 00:30:19.575280 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:19.576778 kubelet[2047]: W0517 00:30:19.575296 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:19.576778 kubelet[2047]: E0517 00:30:19.575314 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:19.576778 kubelet[2047]: E0517 00:30:19.575681 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:19.576778 kubelet[2047]: W0517 00:30:19.575715 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:19.576778 kubelet[2047]: E0517 00:30:19.575734 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:19.576778 kubelet[2047]: E0517 00:30:19.576129 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:19.577440 kubelet[2047]: W0517 00:30:19.576144 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:19.577440 kubelet[2047]: E0517 00:30:19.576161 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:19.577440 kubelet[2047]: E0517 00:30:19.576499 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:19.577440 kubelet[2047]: W0517 00:30:19.576514 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:19.577440 kubelet[2047]: E0517 00:30:19.576530 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:19.578763 kubelet[2047]: E0517 00:30:19.578733 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:19.578763 kubelet[2047]: W0517 00:30:19.578762 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:19.579042 kubelet[2047]: E0517 00:30:19.578786 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:19.580877 kubelet[2047]: E0517 00:30:19.580843 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:19.580877 kubelet[2047]: W0517 00:30:19.580875 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:19.581067 kubelet[2047]: E0517 00:30:19.580902 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:19.581446 kubelet[2047]: E0517 00:30:19.581418 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:19.581562 kubelet[2047]: W0517 00:30:19.581446 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:19.581562 kubelet[2047]: E0517 00:30:19.581468 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:19.581896 kubelet[2047]: E0517 00:30:19.581869 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:19.581896 kubelet[2047]: W0517 00:30:19.581896 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:19.582119 kubelet[2047]: E0517 00:30:19.581916 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:19.582342 kubelet[2047]: E0517 00:30:19.582314 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:19.582432 kubelet[2047]: W0517 00:30:19.582342 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:19.582432 kubelet[2047]: E0517 00:30:19.582363 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:19.582907 kubelet[2047]: E0517 00:30:19.582878 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:19.582907 kubelet[2047]: W0517 00:30:19.582906 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:19.583121 kubelet[2047]: E0517 00:30:19.582928 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:19.585279 kubelet[2047]: E0517 00:30:19.585249 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:19.585402 kubelet[2047]: W0517 00:30:19.585278 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:19.585402 kubelet[2047]: E0517 00:30:19.585302 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:19.585855 kubelet[2047]: E0517 00:30:19.585819 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:19.585855 kubelet[2047]: W0517 00:30:19.585845 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:19.586029 kubelet[2047]: E0517 00:30:19.585868 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:19.595581 kubelet[2047]: E0517 00:30:19.595546 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:19.598037 kubelet[2047]: W0517 00:30:19.595720 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:19.598037 kubelet[2047]: E0517 00:30:19.595756 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:19.598037 kubelet[2047]: E0517 00:30:19.597185 2047 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-f5rgx" podUID="5b8b07bb-2baf-4857-913a-a85ceb0e478f" May 17 00:30:19.661153 kubelet[2047]: E0517 00:30:19.661113 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:19.661453 kubelet[2047]: W0517 00:30:19.661420 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:19.661646 kubelet[2047]: E0517 00:30:19.661617 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:19.662258 kubelet[2047]: E0517 00:30:19.662234 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:19.662421 kubelet[2047]: W0517 00:30:19.662397 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:19.662568 kubelet[2047]: E0517 00:30:19.662547 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:19.664150 kubelet[2047]: E0517 00:30:19.664122 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:19.664345 kubelet[2047]: W0517 00:30:19.664310 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:19.664607 kubelet[2047]: E0517 00:30:19.664582 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:19.665335 kubelet[2047]: E0517 00:30:19.665310 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:19.665515 kubelet[2047]: W0517 00:30:19.665490 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:19.665737 kubelet[2047]: E0517 00:30:19.665660 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:19.666418 kubelet[2047]: E0517 00:30:19.666394 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:19.666578 kubelet[2047]: W0517 00:30:19.666553 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:19.666763 kubelet[2047]: E0517 00:30:19.666740 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:19.667351 kubelet[2047]: E0517 00:30:19.667327 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:19.667478 kubelet[2047]: W0517 00:30:19.667459 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:19.667650 kubelet[2047]: E0517 00:30:19.667627 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:19.668289 kubelet[2047]: E0517 00:30:19.668265 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:19.668454 kubelet[2047]: W0517 00:30:19.668429 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:19.668622 kubelet[2047]: E0517 00:30:19.668600 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:19.669222 kubelet[2047]: E0517 00:30:19.669201 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:19.669379 kubelet[2047]: W0517 00:30:19.669357 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:19.669539 kubelet[2047]: E0517 00:30:19.669517 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:19.670123 kubelet[2047]: E0517 00:30:19.670101 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:19.670293 kubelet[2047]: W0517 00:30:19.670268 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:19.670434 kubelet[2047]: E0517 00:30:19.670413 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:19.670955 kubelet[2047]: E0517 00:30:19.670934 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:19.671113 kubelet[2047]: W0517 00:30:19.671090 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:19.671243 kubelet[2047]: E0517 00:30:19.671220 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:19.671750 kubelet[2047]: E0517 00:30:19.671729 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:19.671893 kubelet[2047]: W0517 00:30:19.671869 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:19.672119 kubelet[2047]: E0517 00:30:19.672095 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:19.672579 kubelet[2047]: E0517 00:30:19.672558 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:19.672830 kubelet[2047]: W0517 00:30:19.672776 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:19.672992 kubelet[2047]: E0517 00:30:19.672968 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:19.673510 kubelet[2047]: E0517 00:30:19.673488 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:19.673647 kubelet[2047]: W0517 00:30:19.673624 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:19.673838 kubelet[2047]: E0517 00:30:19.673815 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:19.674296 kubelet[2047]: E0517 00:30:19.674274 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:19.674433 kubelet[2047]: W0517 00:30:19.674413 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:19.674553 kubelet[2047]: E0517 00:30:19.674529 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:19.675067 kubelet[2047]: E0517 00:30:19.675046 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:19.675197 kubelet[2047]: W0517 00:30:19.675177 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:19.675320 kubelet[2047]: E0517 00:30:19.675300 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:19.675785 kubelet[2047]: E0517 00:30:19.675764 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:19.676026 kubelet[2047]: W0517 00:30:19.675968 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:19.676233 kubelet[2047]: E0517 00:30:19.676209 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:19.676955 kubelet[2047]: E0517 00:30:19.676928 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:19.677118 kubelet[2047]: W0517 00:30:19.677092 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:19.677286 kubelet[2047]: E0517 00:30:19.677259 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:19.677785 kubelet[2047]: E0517 00:30:19.677763 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:19.677978 kubelet[2047]: W0517 00:30:19.677951 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:19.678111 kubelet[2047]: E0517 00:30:19.678089 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:19.678581 kubelet[2047]: E0517 00:30:19.678558 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:19.678818 kubelet[2047]: W0517 00:30:19.678781 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:19.678981 kubelet[2047]: E0517 00:30:19.678957 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:19.679510 kubelet[2047]: E0517 00:30:19.679486 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:19.679685 kubelet[2047]: W0517 00:30:19.679661 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:19.679880 kubelet[2047]: E0517 00:30:19.679853 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:19.680527 kubelet[2047]: E0517 00:30:19.680503 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:19.680677 kubelet[2047]: W0517 00:30:19.680655 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:19.680907 kubelet[2047]: E0517 00:30:19.680885 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:19.681069 kubelet[2047]: I0517 00:30:19.681044 2047 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/5b8b07bb-2baf-4857-913a-a85ceb0e478f-socket-dir\") pod \"csi-node-driver-f5rgx\" (UID: \"5b8b07bb-2baf-4857-913a-a85ceb0e478f\") " pod="calico-system/csi-node-driver-f5rgx" May 17 00:30:19.682052 kubelet[2047]: E0517 00:30:19.682025 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:19.682210 kubelet[2047]: W0517 00:30:19.682185 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:19.682351 kubelet[2047]: E0517 00:30:19.682329 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:19.682903 kubelet[2047]: E0517 00:30:19.682880 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:19.683060 kubelet[2047]: W0517 00:30:19.683037 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:19.683206 kubelet[2047]: E0517 00:30:19.683183 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:19.683735 kubelet[2047]: E0517 00:30:19.683686 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:19.683930 kubelet[2047]: W0517 00:30:19.683905 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:19.684097 kubelet[2047]: E0517 00:30:19.684072 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:19.684272 kubelet[2047]: I0517 00:30:19.684248 2047 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/5b8b07bb-2baf-4857-913a-a85ceb0e478f-varrun\") pod \"csi-node-driver-f5rgx\" (UID: \"5b8b07bb-2baf-4857-913a-a85ceb0e478f\") " pod="calico-system/csi-node-driver-f5rgx" May 17 00:30:19.684831 kubelet[2047]: E0517 00:30:19.684797 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:19.684986 kubelet[2047]: W0517 00:30:19.684962 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:19.685116 kubelet[2047]: E0517 00:30:19.685094 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:19.685609 kubelet[2047]: E0517 00:30:19.685588 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:19.685794 kubelet[2047]: W0517 00:30:19.685770 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:19.685955 kubelet[2047]: E0517 00:30:19.685931 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:19.686425 kubelet[2047]: E0517 00:30:19.686403 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:19.686580 kubelet[2047]: W0517 00:30:19.686556 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:19.686768 kubelet[2047]: E0517 00:30:19.686745 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:19.686950 kubelet[2047]: I0517 00:30:19.686925 2047 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jlxcw\" (UniqueName: \"kubernetes.io/projected/5b8b07bb-2baf-4857-913a-a85ceb0e478f-kube-api-access-jlxcw\") pod \"csi-node-driver-f5rgx\" (UID: \"5b8b07bb-2baf-4857-913a-a85ceb0e478f\") " pod="calico-system/csi-node-driver-f5rgx" May 17 00:30:19.687978 kubelet[2047]: E0517 00:30:19.687951 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:19.688145 kubelet[2047]: W0517 00:30:19.688117 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:19.688281 kubelet[2047]: E0517 00:30:19.688259 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:19.688825 kubelet[2047]: E0517 00:30:19.688793 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:19.688967 kubelet[2047]: W0517 00:30:19.688943 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:19.689089 kubelet[2047]: E0517 00:30:19.689067 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:19.689573 kubelet[2047]: E0517 00:30:19.689553 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:19.689728 kubelet[2047]: W0517 00:30:19.689685 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:19.689878 kubelet[2047]: E0517 00:30:19.689856 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:19.690029 kubelet[2047]: I0517 00:30:19.689999 2047 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/5b8b07bb-2baf-4857-913a-a85ceb0e478f-kubelet-dir\") pod \"csi-node-driver-f5rgx\" (UID: \"5b8b07bb-2baf-4857-913a-a85ceb0e478f\") " pod="calico-system/csi-node-driver-f5rgx" May 17 00:30:19.690574 kubelet[2047]: E0517 00:30:19.690545 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:19.693053 kubelet[2047]: W0517 00:30:19.693003 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:19.693308 kubelet[2047]: E0517 00:30:19.693214 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:19.693887 kubelet[2047]: E0517 00:30:19.693864 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:19.694038 kubelet[2047]: W0517 00:30:19.694010 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:19.694170 kubelet[2047]: E0517 00:30:19.694145 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:19.694785 kubelet[2047]: E0517 00:30:19.694761 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:19.694949 kubelet[2047]: W0517 00:30:19.694923 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:19.695141 kubelet[2047]: E0517 00:30:19.695115 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:19.695306 kubelet[2047]: I0517 00:30:19.695282 2047 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/5b8b07bb-2baf-4857-913a-a85ceb0e478f-registration-dir\") pod \"csi-node-driver-f5rgx\" (UID: \"5b8b07bb-2baf-4857-913a-a85ceb0e478f\") " pod="calico-system/csi-node-driver-f5rgx" May 17 00:30:19.695905 kubelet[2047]: E0517 00:30:19.695879 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:19.696078 kubelet[2047]: W0517 00:30:19.696051 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:19.696245 kubelet[2047]: E0517 00:30:19.696220 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:19.696733 kubelet[2047]: E0517 00:30:19.696709 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:19.696919 kubelet[2047]: W0517 00:30:19.696878 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:19.697082 kubelet[2047]: E0517 00:30:19.697059 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:19.760792 env[1216]: time="2025-05-17T00:30:19.760679151Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-tvs9d,Uid:bef4f664-d1af-42c6-981d-ca0b9d422fee,Namespace:calico-system,Attempt:0,}" May 17 00:30:19.787909 env[1216]: time="2025-05-17T00:30:19.787640490Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:30:19.788135 env[1216]: time="2025-05-17T00:30:19.787751847Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:30:19.788135 env[1216]: time="2025-05-17T00:30:19.787776149Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:30:19.796518 env[1216]: time="2025-05-17T00:30:19.794910466Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/104be65566d4a99e3262e874421473765998b3ddba899d8de5de3ad48f4910dc pid=2566 runtime=io.containerd.runc.v2 May 17 00:30:19.801441 kubelet[2047]: E0517 00:30:19.801072 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:19.801441 kubelet[2047]: W0517 00:30:19.801109 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:19.801441 kubelet[2047]: E0517 00:30:19.801146 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:19.801821 kubelet[2047]: E0517 00:30:19.801642 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:19.801821 kubelet[2047]: W0517 00:30:19.801660 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:19.801821 kubelet[2047]: E0517 00:30:19.801685 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:19.802129 kubelet[2047]: E0517 00:30:19.802095 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:19.802129 kubelet[2047]: W0517 00:30:19.802114 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:19.802294 kubelet[2047]: E0517 00:30:19.802139 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:19.802728 kubelet[2047]: E0517 00:30:19.802682 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:19.802728 kubelet[2047]: W0517 00:30:19.802727 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:19.802939 kubelet[2047]: E0517 00:30:19.802749 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:19.805236 kubelet[2047]: E0517 00:30:19.803279 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:19.805236 kubelet[2047]: W0517 00:30:19.803309 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:19.805236 kubelet[2047]: E0517 00:30:19.803331 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:19.805236 kubelet[2047]: E0517 00:30:19.803974 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:19.805236 kubelet[2047]: W0517 00:30:19.803999 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:19.805236 kubelet[2047]: E0517 00:30:19.804022 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:19.805236 kubelet[2047]: E0517 00:30:19.804430 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:19.805236 kubelet[2047]: W0517 00:30:19.804445 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:19.805236 kubelet[2047]: E0517 00:30:19.804464 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:19.805236 kubelet[2047]: E0517 00:30:19.804910 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:19.806028 kubelet[2047]: W0517 00:30:19.804938 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:19.806028 kubelet[2047]: E0517 00:30:19.804956 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:19.806028 kubelet[2047]: E0517 00:30:19.805318 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:19.806028 kubelet[2047]: W0517 00:30:19.805332 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:19.806028 kubelet[2047]: E0517 00:30:19.805352 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:19.806028 kubelet[2047]: E0517 00:30:19.805687 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:19.806028 kubelet[2047]: W0517 00:30:19.805719 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:19.806028 kubelet[2047]: E0517 00:30:19.805736 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:19.806649 kubelet[2047]: E0517 00:30:19.806071 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:19.806649 kubelet[2047]: W0517 00:30:19.806085 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:19.806649 kubelet[2047]: E0517 00:30:19.806101 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:19.806649 kubelet[2047]: E0517 00:30:19.806455 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:19.806649 kubelet[2047]: W0517 00:30:19.806470 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:19.806649 kubelet[2047]: E0517 00:30:19.806489 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:19.807212 kubelet[2047]: E0517 00:30:19.806825 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:19.807212 kubelet[2047]: W0517 00:30:19.806839 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:19.807212 kubelet[2047]: E0517 00:30:19.806857 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:19.807212 kubelet[2047]: E0517 00:30:19.807178 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:19.807212 kubelet[2047]: W0517 00:30:19.807192 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:19.807212 kubelet[2047]: E0517 00:30:19.807209 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:19.807638 kubelet[2047]: E0517 00:30:19.807512 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:19.807638 kubelet[2047]: W0517 00:30:19.807525 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:19.807638 kubelet[2047]: E0517 00:30:19.807541 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:19.807887 kubelet[2047]: E0517 00:30:19.807870 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:19.807887 kubelet[2047]: W0517 00:30:19.807883 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:19.808029 kubelet[2047]: E0517 00:30:19.807901 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:19.814734 kubelet[2047]: E0517 00:30:19.808335 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:19.814734 kubelet[2047]: W0517 00:30:19.808354 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:19.814734 kubelet[2047]: E0517 00:30:19.808371 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:19.814734 kubelet[2047]: E0517 00:30:19.808887 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:19.814734 kubelet[2047]: W0517 00:30:19.808903 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:19.814734 kubelet[2047]: E0517 00:30:19.808932 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:19.814734 kubelet[2047]: E0517 00:30:19.809285 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:19.814734 kubelet[2047]: W0517 00:30:19.809305 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:19.814734 kubelet[2047]: E0517 00:30:19.809324 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:19.814734 kubelet[2047]: E0517 00:30:19.809937 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:19.815544 kubelet[2047]: W0517 00:30:19.809952 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:19.815544 kubelet[2047]: E0517 00:30:19.809969 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:19.815544 kubelet[2047]: E0517 00:30:19.814070 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:19.815544 kubelet[2047]: W0517 00:30:19.814087 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:19.815544 kubelet[2047]: E0517 00:30:19.814109 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:19.815544 kubelet[2047]: E0517 00:30:19.814526 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:19.815544 kubelet[2047]: W0517 00:30:19.814541 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:19.815544 kubelet[2047]: E0517 00:30:19.814559 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:19.815544 kubelet[2047]: E0517 00:30:19.815023 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:19.815544 kubelet[2047]: W0517 00:30:19.815039 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:19.816215 kubelet[2047]: E0517 00:30:19.815058 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:19.816215 kubelet[2047]: E0517 00:30:19.815428 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:19.816215 kubelet[2047]: W0517 00:30:19.815443 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:19.816215 kubelet[2047]: E0517 00:30:19.815459 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:19.816215 kubelet[2047]: E0517 00:30:19.816162 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:19.816215 kubelet[2047]: W0517 00:30:19.816177 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:19.816215 kubelet[2047]: E0517 00:30:19.816197 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:19.835000 audit[2610]: NETFILTER_CFG table=filter:97 family=2 entries=20 op=nft_register_rule pid=2610 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:30:19.835000 audit[2610]: SYSCALL arch=c000003e syscall=46 success=yes exit=8224 a0=3 a1=7ffdc22bef80 a2=0 a3=7ffdc22bef6c items=0 ppid=2176 pid=2610 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:19.835000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:30:19.837579 systemd[1]: Started cri-containerd-104be65566d4a99e3262e874421473765998b3ddba899d8de5de3ad48f4910dc.scope. May 17 00:30:19.840000 audit[2610]: NETFILTER_CFG table=nat:98 family=2 entries=12 op=nft_register_rule pid=2610 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:30:19.840000 audit[2610]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffdc22bef80 a2=0 a3=0 items=0 ppid=2176 pid=2610 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:19.840000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:30:19.850523 kubelet[2047]: E0517 00:30:19.850464 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:19.850523 kubelet[2047]: W0517 00:30:19.850492 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:19.850523 kubelet[2047]: E0517 00:30:19.850523 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:19.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:19.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:19.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:19.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:19.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:19.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:19.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:19.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:19.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:19.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:19.885000 audit: BPF prog-id=125 op=LOAD May 17 00:30:19.886000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:19.886000 audit[2581]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2566 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:19.886000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130346265363535363664346139396533323632653837343432313437 May 17 00:30:19.886000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:19.886000 audit[2581]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2566 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:19.886000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130346265363535363664346139396533323632653837343432313437 May 17 00:30:19.886000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:19.886000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:19.886000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:19.886000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:19.886000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:19.886000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:19.886000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:19.886000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:19.886000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:19.886000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:19.886000 audit: BPF prog-id=126 op=LOAD May 17 00:30:19.886000 audit[2581]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000025070 items=0 ppid=2566 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:19.886000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130346265363535363664346139396533323632653837343432313437 May 17 00:30:19.886000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:19.886000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:19.886000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:19.886000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:19.886000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:19.886000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:19.886000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:19.886000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:19.886000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:19.886000 audit: BPF prog-id=127 op=LOAD May 17 00:30:19.886000 audit[2581]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0000250b8 items=0 ppid=2566 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:19.886000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130346265363535363664346139396533323632653837343432313437 May 17 00:30:19.887000 audit: BPF prog-id=127 op=UNLOAD May 17 00:30:19.887000 audit: BPF prog-id=126 op=UNLOAD May 17 00:30:19.887000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:19.887000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:19.887000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:19.887000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:19.887000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:19.887000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:19.887000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:19.887000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:19.887000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:19.887000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:19.887000 audit: BPF prog-id=128 op=LOAD May 17 00:30:19.887000 audit[2581]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0000254c8 items=0 ppid=2566 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:19.887000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130346265363535363664346139396533323632653837343432313437 May 17 00:30:19.913387 env[1216]: time="2025-05-17T00:30:19.913248801Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-tvs9d,Uid:bef4f664-d1af-42c6-981d-ca0b9d422fee,Namespace:calico-system,Attempt:0,} returns sandbox id \"104be65566d4a99e3262e874421473765998b3ddba899d8de5de3ad48f4910dc\"" May 17 00:30:20.092427 systemd[1]: run-containerd-runc-k8s.io-2b762cc1eaecab0640ce5e627c54f0005da3e9db28425ae7bac5fe42fead659b-runc.h2uIWm.mount: Deactivated successfully. May 17 00:30:20.560182 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1613249019.mount: Deactivated successfully. May 17 00:30:21.062271 kubelet[2047]: E0517 00:30:21.062209 2047 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-f5rgx" podUID="5b8b07bb-2baf-4857-913a-a85ceb0e478f" May 17 00:30:21.931959 env[1216]: time="2025-05-17T00:30:21.931877985Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:30:21.937532 env[1216]: time="2025-05-17T00:30:21.937466718Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:71be0570e8645ac646675719e0da6ac33a05810991b31aecc303e7add70933be,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:30:21.940481 env[1216]: time="2025-05-17T00:30:21.940420688Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:30:21.949470 env[1216]: time="2025-05-17T00:30:21.949404308Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:d282f6c773c4631b9dc8379eb093c54ca34c7728d55d6509cb45da5e1f5baf8f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:30:21.950012 env[1216]: time="2025-05-17T00:30:21.949964499Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.0\" returns image reference \"sha256:71be0570e8645ac646675719e0da6ac33a05810991b31aecc303e7add70933be\"" May 17 00:30:21.957308 env[1216]: time="2025-05-17T00:30:21.957253512Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0\"" May 17 00:30:21.983680 env[1216]: time="2025-05-17T00:30:21.983611024Z" level=info msg="CreateContainer within sandbox \"2b762cc1eaecab0640ce5e627c54f0005da3e9db28425ae7bac5fe42fead659b\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" May 17 00:30:22.018659 env[1216]: time="2025-05-17T00:30:22.018562759Z" level=info msg="CreateContainer within sandbox \"2b762cc1eaecab0640ce5e627c54f0005da3e9db28425ae7bac5fe42fead659b\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"0f3a386f64e145f69cafa8f034ac8b9a68489e3b4cac51af5eb2c139a0d8867d\"" May 17 00:30:22.020406 env[1216]: time="2025-05-17T00:30:22.020322409Z" level=info msg="StartContainer for \"0f3a386f64e145f69cafa8f034ac8b9a68489e3b4cac51af5eb2c139a0d8867d\"" May 17 00:30:22.055918 systemd[1]: Started cri-containerd-0f3a386f64e145f69cafa8f034ac8b9a68489e3b4cac51af5eb2c139a0d8867d.scope. May 17 00:30:22.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:22.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:22.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:22.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:22.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:22.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:22.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:22.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:22.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:22.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:22.099000 audit: BPF prog-id=129 op=LOAD May 17 00:30:22.101000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:22.101000 audit[2637]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2469 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:22.101000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066336133383666363465313435663639636166613866303334616338 May 17 00:30:22.102000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:22.102000 audit[2637]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2469 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:22.102000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066336133383666363465313435663639636166613866303334616338 May 17 00:30:22.103000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:22.103000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:22.103000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:22.103000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:22.103000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:22.103000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:22.103000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:22.103000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:22.103000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:22.103000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:22.103000 audit: BPF prog-id=130 op=LOAD May 17 00:30:22.103000 audit[2637]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001f0520 items=0 ppid=2469 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:22.103000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066336133383666363465313435663639636166613866303334616338 May 17 00:30:22.104000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:22.104000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:22.104000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:22.104000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:22.104000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:22.104000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:22.104000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:22.104000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:22.104000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:22.104000 audit: BPF prog-id=131 op=LOAD May 17 00:30:22.104000 audit[2637]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001f0568 items=0 ppid=2469 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:22.104000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066336133383666363465313435663639636166613866303334616338 May 17 00:30:22.105000 audit: BPF prog-id=131 op=UNLOAD May 17 00:30:22.105000 audit: BPF prog-id=130 op=UNLOAD May 17 00:30:22.105000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:22.105000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:22.105000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:22.105000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:22.105000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:22.105000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:22.105000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:22.105000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:22.105000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:22.105000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:22.105000 audit: BPF prog-id=132 op=LOAD May 17 00:30:22.105000 audit[2637]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001f0978 items=0 ppid=2469 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:22.105000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066336133383666363465313435663639636166613866303334616338 May 17 00:30:22.157740 env[1216]: time="2025-05-17T00:30:22.157649937Z" level=info msg="StartContainer for \"0f3a386f64e145f69cafa8f034ac8b9a68489e3b4cac51af5eb2c139a0d8867d\" returns successfully" May 17 00:30:22.299184 kubelet[2047]: E0517 00:30:22.299044 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:22.299184 kubelet[2047]: W0517 00:30:22.299084 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:22.299184 kubelet[2047]: E0517 00:30:22.299120 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:22.300037 kubelet[2047]: E0517 00:30:22.299556 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:22.300037 kubelet[2047]: W0517 00:30:22.299573 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:22.300037 kubelet[2047]: E0517 00:30:22.299595 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:22.300274 kubelet[2047]: E0517 00:30:22.300052 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:22.300274 kubelet[2047]: W0517 00:30:22.300069 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:22.300274 kubelet[2047]: E0517 00:30:22.300087 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:22.300499 kubelet[2047]: E0517 00:30:22.300451 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:22.300499 kubelet[2047]: W0517 00:30:22.300475 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:22.300499 kubelet[2047]: E0517 00:30:22.300493 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:22.305734 kubelet[2047]: E0517 00:30:22.300866 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:22.305734 kubelet[2047]: W0517 00:30:22.300894 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:22.305734 kubelet[2047]: E0517 00:30:22.300911 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:22.305734 kubelet[2047]: E0517 00:30:22.301274 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:22.305734 kubelet[2047]: W0517 00:30:22.301302 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:22.305734 kubelet[2047]: E0517 00:30:22.301318 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:22.305734 kubelet[2047]: E0517 00:30:22.301649 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:22.305734 kubelet[2047]: W0517 00:30:22.301664 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:22.305734 kubelet[2047]: E0517 00:30:22.301734 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:22.305734 kubelet[2047]: E0517 00:30:22.302158 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:22.306395 kubelet[2047]: W0517 00:30:22.302173 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:22.306395 kubelet[2047]: E0517 00:30:22.302191 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:22.306395 kubelet[2047]: E0517 00:30:22.302591 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:22.306395 kubelet[2047]: W0517 00:30:22.302604 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:22.306395 kubelet[2047]: E0517 00:30:22.302620 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:22.306395 kubelet[2047]: E0517 00:30:22.302985 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:22.306395 kubelet[2047]: W0517 00:30:22.303022 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:22.306395 kubelet[2047]: E0517 00:30:22.303038 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:22.306395 kubelet[2047]: E0517 00:30:22.303385 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:22.306395 kubelet[2047]: W0517 00:30:22.303398 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:22.307002 kubelet[2047]: E0517 00:30:22.303413 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:22.307002 kubelet[2047]: E0517 00:30:22.303770 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:22.307002 kubelet[2047]: W0517 00:30:22.303785 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:22.307002 kubelet[2047]: E0517 00:30:22.303804 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:22.307002 kubelet[2047]: E0517 00:30:22.304164 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:22.307002 kubelet[2047]: W0517 00:30:22.304177 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:22.307002 kubelet[2047]: E0517 00:30:22.304195 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:22.307002 kubelet[2047]: E0517 00:30:22.304506 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:22.307002 kubelet[2047]: W0517 00:30:22.304519 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:22.307002 kubelet[2047]: E0517 00:30:22.304536 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:22.307545 kubelet[2047]: E0517 00:30:22.304869 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:22.307545 kubelet[2047]: W0517 00:30:22.304881 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:22.307545 kubelet[2047]: E0517 00:30:22.304896 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:22.322023 kubelet[2047]: E0517 00:30:22.321971 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:22.322023 kubelet[2047]: W0517 00:30:22.322016 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:22.322355 kubelet[2047]: E0517 00:30:22.322051 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:22.322632 kubelet[2047]: E0517 00:30:22.322603 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:22.322756 kubelet[2047]: W0517 00:30:22.322642 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:22.322756 kubelet[2047]: E0517 00:30:22.322665 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:22.323244 kubelet[2047]: E0517 00:30:22.323211 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:22.323244 kubelet[2047]: W0517 00:30:22.323241 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:22.323459 kubelet[2047]: E0517 00:30:22.323265 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:22.323737 kubelet[2047]: E0517 00:30:22.323710 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:22.323845 kubelet[2047]: W0517 00:30:22.323737 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:22.323845 kubelet[2047]: E0517 00:30:22.323758 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:22.324239 kubelet[2047]: E0517 00:30:22.324202 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:22.324239 kubelet[2047]: W0517 00:30:22.324226 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:22.324435 kubelet[2047]: E0517 00:30:22.324249 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:22.324684 kubelet[2047]: E0517 00:30:22.324658 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:22.326785 kubelet[2047]: W0517 00:30:22.324684 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:22.326924 kubelet[2047]: E0517 00:30:22.326797 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:22.327591 kubelet[2047]: E0517 00:30:22.327336 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:22.327591 kubelet[2047]: W0517 00:30:22.327358 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:22.327591 kubelet[2047]: E0517 00:30:22.327381 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:22.332133 kubelet[2047]: E0517 00:30:22.327856 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:22.332133 kubelet[2047]: W0517 00:30:22.327873 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:22.332133 kubelet[2047]: E0517 00:30:22.327911 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:22.353987 kubelet[2047]: E0517 00:30:22.353933 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:22.353987 kubelet[2047]: W0517 00:30:22.353989 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:22.354344 kubelet[2047]: E0517 00:30:22.354030 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:22.356798 kubelet[2047]: E0517 00:30:22.354493 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:22.356798 kubelet[2047]: W0517 00:30:22.354515 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:22.356798 kubelet[2047]: E0517 00:30:22.354541 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:22.356798 kubelet[2047]: E0517 00:30:22.354918 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:22.356798 kubelet[2047]: W0517 00:30:22.354934 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:22.356798 kubelet[2047]: E0517 00:30:22.354954 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:22.356798 kubelet[2047]: E0517 00:30:22.355355 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:22.356798 kubelet[2047]: W0517 00:30:22.355371 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:22.356798 kubelet[2047]: E0517 00:30:22.355389 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:22.358116 kubelet[2047]: E0517 00:30:22.358084 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:22.358252 kubelet[2047]: W0517 00:30:22.358124 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:22.358252 kubelet[2047]: E0517 00:30:22.358147 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:22.369050 kubelet[2047]: E0517 00:30:22.368987 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:22.369050 kubelet[2047]: W0517 00:30:22.369034 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:22.369340 kubelet[2047]: E0517 00:30:22.369071 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:22.369592 kubelet[2047]: E0517 00:30:22.369564 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:22.369592 kubelet[2047]: W0517 00:30:22.369593 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:22.369854 kubelet[2047]: E0517 00:30:22.369619 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:22.370060 kubelet[2047]: E0517 00:30:22.370035 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:22.370151 kubelet[2047]: W0517 00:30:22.370059 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:22.370151 kubelet[2047]: E0517 00:30:22.370081 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:22.370520 kubelet[2047]: E0517 00:30:22.370486 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:22.370520 kubelet[2047]: W0517 00:30:22.370512 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:22.370672 kubelet[2047]: E0517 00:30:22.370536 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:22.371492 kubelet[2047]: E0517 00:30:22.371467 2047 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:30:22.371492 kubelet[2047]: W0517 00:30:22.371491 2047 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:30:22.371656 kubelet[2047]: E0517 00:30:22.371512 2047 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:30:22.974765 env[1216]: time="2025-05-17T00:30:22.974668448Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:30:22.979091 env[1216]: time="2025-05-17T00:30:22.979022309Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c53606cea03e59dcbfa981dc43a55dff05952895f72576b8389fa00be09ab676,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:30:22.981925 env[1216]: time="2025-05-17T00:30:22.981865150Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:30:22.984746 env[1216]: time="2025-05-17T00:30:22.984659208Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:ce76dd87f11d3fd0054c35ad2e0e9f833748d007f77a9bfe859d0ddcb66fcb2c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:30:22.985560 env[1216]: time="2025-05-17T00:30:22.985502386Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0\" returns image reference \"sha256:c53606cea03e59dcbfa981dc43a55dff05952895f72576b8389fa00be09ab676\"" May 17 00:30:22.994016 env[1216]: time="2025-05-17T00:30:22.993954518Z" level=info msg="CreateContainer within sandbox \"104be65566d4a99e3262e874421473765998b3ddba899d8de5de3ad48f4910dc\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 17 00:30:23.022463 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4183279170.mount: Deactivated successfully. May 17 00:30:23.030996 env[1216]: time="2025-05-17T00:30:23.030912181Z" level=info msg="CreateContainer within sandbox \"104be65566d4a99e3262e874421473765998b3ddba899d8de5de3ad48f4910dc\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"64d22eb13e4870cae5bf647613eba15bc7f50d2518c895cc03dff0b9376eb32d\"" May 17 00:30:23.034074 env[1216]: time="2025-05-17T00:30:23.034010681Z" level=info msg="StartContainer for \"64d22eb13e4870cae5bf647613eba15bc7f50d2518c895cc03dff0b9376eb32d\"" May 17 00:30:23.063776 kubelet[2047]: E0517 00:30:23.059771 2047 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-f5rgx" podUID="5b8b07bb-2baf-4857-913a-a85ceb0e478f" May 17 00:30:23.090730 systemd[1]: Started cri-containerd-64d22eb13e4870cae5bf647613eba15bc7f50d2518c895cc03dff0b9376eb32d.scope. May 17 00:30:23.119000 audit[2710]: AVC avc: denied { perfmon } for pid=2710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:23.119000 audit[2710]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f0962011568 items=0 ppid=2566 pid=2710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:23.119000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634643232656231336534383730636165356266363437363133656261 May 17 00:30:23.120000 audit[2710]: AVC avc: denied { bpf } for pid=2710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:23.120000 audit[2710]: AVC avc: denied { bpf } for pid=2710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:23.120000 audit[2710]: AVC avc: denied { bpf } for pid=2710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:23.120000 audit[2710]: AVC avc: denied { perfmon } for pid=2710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:23.120000 audit[2710]: AVC avc: denied { perfmon } for pid=2710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:23.120000 audit[2710]: AVC avc: denied { perfmon } for pid=2710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:23.120000 audit[2710]: AVC avc: denied { perfmon } for pid=2710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:23.120000 audit[2710]: AVC avc: denied { perfmon } for pid=2710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:23.120000 audit[2710]: AVC avc: denied { bpf } for pid=2710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:23.120000 audit[2710]: AVC avc: denied { bpf } for pid=2710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:23.120000 audit: BPF prog-id=133 op=LOAD May 17 00:30:23.120000 audit[2710]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000216bf8 items=0 ppid=2566 pid=2710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:23.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634643232656231336534383730636165356266363437363133656261 May 17 00:30:23.120000 audit[2710]: AVC avc: denied { bpf } for pid=2710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:23.120000 audit[2710]: AVC avc: denied { bpf } for pid=2710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:23.120000 audit[2710]: AVC avc: denied { perfmon } for pid=2710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:23.120000 audit[2710]: AVC avc: denied { perfmon } for pid=2710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:23.120000 audit[2710]: AVC avc: denied { perfmon } for pid=2710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:23.120000 audit[2710]: AVC avc: denied { perfmon } for pid=2710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:23.120000 audit[2710]: AVC avc: denied { perfmon } for pid=2710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:23.120000 audit[2710]: AVC avc: denied { bpf } for pid=2710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:23.120000 audit[2710]: AVC avc: denied { bpf } for pid=2710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:23.120000 audit: BPF prog-id=134 op=LOAD May 17 00:30:23.120000 audit[2710]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000216c48 items=0 ppid=2566 pid=2710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:23.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634643232656231336534383730636165356266363437363133656261 May 17 00:30:23.121000 audit: BPF prog-id=134 op=UNLOAD May 17 00:30:23.121000 audit: BPF prog-id=133 op=UNLOAD May 17 00:30:23.121000 audit[2710]: AVC avc: denied { bpf } for pid=2710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:23.121000 audit[2710]: AVC avc: denied { bpf } for pid=2710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:23.121000 audit[2710]: AVC avc: denied { bpf } for pid=2710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:23.121000 audit[2710]: AVC avc: denied { perfmon } for pid=2710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:23.121000 audit[2710]: AVC avc: denied { perfmon } for pid=2710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:23.121000 audit[2710]: AVC avc: denied { perfmon } for pid=2710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:23.121000 audit[2710]: AVC avc: denied { perfmon } for pid=2710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:23.121000 audit[2710]: AVC avc: denied { perfmon } for pid=2710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:23.121000 audit[2710]: AVC avc: denied { bpf } for pid=2710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:23.121000 audit[2710]: AVC avc: denied { bpf } for pid=2710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:23.121000 audit: BPF prog-id=135 op=LOAD May 17 00:30:23.121000 audit[2710]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000216cd8 items=0 ppid=2566 pid=2710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:23.121000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634643232656231336534383730636165356266363437363133656261 May 17 00:30:23.157736 env[1216]: time="2025-05-17T00:30:23.157619090Z" level=info msg="StartContainer for \"64d22eb13e4870cae5bf647613eba15bc7f50d2518c895cc03dff0b9376eb32d\" returns successfully" May 17 00:30:23.178889 systemd[1]: cri-containerd-64d22eb13e4870cae5bf647613eba15bc7f50d2518c895cc03dff0b9376eb32d.scope: Deactivated successfully. May 17 00:30:23.181000 audit: BPF prog-id=135 op=UNLOAD May 17 00:30:23.218807 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-64d22eb13e4870cae5bf647613eba15bc7f50d2518c895cc03dff0b9376eb32d-rootfs.mount: Deactivated successfully. May 17 00:30:23.256756 kubelet[2047]: I0517 00:30:23.256514 2047 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-7484876447-qxs9n" podStartSLOduration=2.843849637 podStartE2EDuration="5.256485546s" podCreationTimestamp="2025-05-17 00:30:18 +0000 UTC" firstStartedPulling="2025-05-17 00:30:19.539586588 +0000 UTC m=+24.828693466" lastFinishedPulling="2025-05-17 00:30:21.952222492 +0000 UTC m=+27.241329375" observedRunningTime="2025-05-17 00:30:22.235023485 +0000 UTC m=+27.524130376" watchObservedRunningTime="2025-05-17 00:30:23.256485546 +0000 UTC m=+28.545592426" May 17 00:30:23.312000 audit[2751]: NETFILTER_CFG table=filter:99 family=2 entries=21 op=nft_register_rule pid=2751 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:30:23.312000 audit[2751]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffdbd2d43c0 a2=0 a3=7ffdbd2d43ac items=0 ppid=2176 pid=2751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:23.312000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:30:23.320000 audit[2751]: NETFILTER_CFG table=nat:100 family=2 entries=19 op=nft_register_chain pid=2751 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:30:23.320000 audit[2751]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffdbd2d43c0 a2=0 a3=7ffdbd2d43ac items=0 ppid=2176 pid=2751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:23.320000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:30:23.895832 env[1216]: time="2025-05-17T00:30:23.895723878Z" level=info msg="shim disconnected" id=64d22eb13e4870cae5bf647613eba15bc7f50d2518c895cc03dff0b9376eb32d May 17 00:30:23.895832 env[1216]: time="2025-05-17T00:30:23.895794542Z" level=warning msg="cleaning up after shim disconnected" id=64d22eb13e4870cae5bf647613eba15bc7f50d2518c895cc03dff0b9376eb32d namespace=k8s.io May 17 00:30:23.895832 env[1216]: time="2025-05-17T00:30:23.895817487Z" level=info msg="cleaning up dead shim" May 17 00:30:23.910816 env[1216]: time="2025-05-17T00:30:23.910637758Z" level=warning msg="cleanup warnings time=\"2025-05-17T00:30:23Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2756 runtime=io.containerd.runc.v2\n" May 17 00:30:24.236011 env[1216]: time="2025-05-17T00:30:24.235505033Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.0\"" May 17 00:30:25.063588 kubelet[2047]: E0517 00:30:25.063472 2047 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-f5rgx" podUID="5b8b07bb-2baf-4857-913a-a85ceb0e478f" May 17 00:30:27.061893 kubelet[2047]: E0517 00:30:27.061832 2047 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-f5rgx" podUID="5b8b07bb-2baf-4857-913a-a85ceb0e478f" May 17 00:30:27.881894 env[1216]: time="2025-05-17T00:30:27.881826715Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:30:27.886174 env[1216]: time="2025-05-17T00:30:27.885128211Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:15f996c472622f23047ea38b2d72940e8c34d0996b8a2e12a1f255c1d7083185,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:30:27.887771 env[1216]: time="2025-05-17T00:30:27.887716362Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:30:27.890710 env[1216]: time="2025-05-17T00:30:27.890638593Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:3dd06656abdc03fbd51782d5f6fe4d70e6825a1c0c5bce2a165bbd2ff9e0f7df,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:30:27.891597 env[1216]: time="2025-05-17T00:30:27.891539784Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.0\" returns image reference \"sha256:15f996c472622f23047ea38b2d72940e8c34d0996b8a2e12a1f255c1d7083185\"" May 17 00:30:27.901720 env[1216]: time="2025-05-17T00:30:27.901562416Z" level=info msg="CreateContainer within sandbox \"104be65566d4a99e3262e874421473765998b3ddba899d8de5de3ad48f4910dc\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 17 00:30:27.927093 env[1216]: time="2025-05-17T00:30:27.926171646Z" level=info msg="CreateContainer within sandbox \"104be65566d4a99e3262e874421473765998b3ddba899d8de5de3ad48f4910dc\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"a772ca3e01b9ed2b24cf309fee93c6db9b5dcab7a3ab7ffc8884ff9aba792f79\"" May 17 00:30:27.930929 env[1216]: time="2025-05-17T00:30:27.930790303Z" level=info msg="StartContainer for \"a772ca3e01b9ed2b24cf309fee93c6db9b5dcab7a3ab7ffc8884ff9aba792f79\"" May 17 00:30:27.990529 systemd[1]: Started cri-containerd-a772ca3e01b9ed2b24cf309fee93c6db9b5dcab7a3ab7ffc8884ff9aba792f79.scope. May 17 00:30:28.014000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:28.026200 kernel: kauditd_printk_skb: 229 callbacks suppressed May 17 00:30:28.026412 kernel: audit: type=1400 audit(1747441828.014:985): avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:28.014000 audit[2777]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001496b0 a2=3c a3=7f78f65f22f8 items=0 ppid=2566 pid=2777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:28.077102 kernel: audit: type=1300 audit(1747441828.014:985): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001496b0 a2=3c a3=7f78f65f22f8 items=0 ppid=2566 pid=2777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:28.077299 kernel: audit: type=1327 audit(1747441828.014:985): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137373263613365303162396564326232346366333039666565393363 May 17 00:30:28.014000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137373263613365303162396564326232346366333039666565393363 May 17 00:30:28.015000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:28.114535 env[1216]: time="2025-05-17T00:30:28.114455754Z" level=info msg="StartContainer for \"a772ca3e01b9ed2b24cf309fee93c6db9b5dcab7a3ab7ffc8884ff9aba792f79\" returns successfully" May 17 00:30:28.127808 kernel: audit: type=1400 audit(1747441828.015:986): avc: denied { bpf } for pid=2777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:28.127985 kernel: audit: type=1400 audit(1747441828.015:986): avc: denied { bpf } for pid=2777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:28.015000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:28.169268 kernel: audit: type=1400 audit(1747441828.015:986): avc: denied { bpf } for pid=2777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:28.015000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:28.015000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:28.193734 kernel: audit: type=1400 audit(1747441828.015:986): avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:28.015000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:28.215790 kernel: audit: type=1400 audit(1747441828.015:986): avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:28.015000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:28.015000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:28.258931 kernel: audit: type=1400 audit(1747441828.015:986): avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:28.259132 kernel: audit: type=1400 audit(1747441828.015:986): avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:28.015000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:28.015000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:28.015000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:28.015000 audit: BPF prog-id=136 op=LOAD May 17 00:30:28.015000 audit[2777]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001499d8 a2=78 a3=c0000255c8 items=0 ppid=2566 pid=2777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:28.015000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137373263613365303162396564326232346366333039666565393363 May 17 00:30:28.015000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:28.015000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:28.015000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:28.015000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:28.015000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:28.015000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:28.015000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:28.015000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:28.015000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:28.015000 audit: BPF prog-id=137 op=LOAD May 17 00:30:28.015000 audit[2777]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000149770 a2=78 a3=c000025618 items=0 ppid=2566 pid=2777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:28.015000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137373263613365303162396564326232346366333039666565393363 May 17 00:30:28.015000 audit: BPF prog-id=137 op=UNLOAD May 17 00:30:28.015000 audit: BPF prog-id=136 op=UNLOAD May 17 00:30:28.015000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:28.015000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:28.015000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:28.015000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:28.015000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:28.015000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:28.015000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:28.015000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:28.015000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:28.015000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:28.015000 audit: BPF prog-id=138 op=LOAD May 17 00:30:28.015000 audit[2777]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000149c30 a2=78 a3=c0000256a8 items=0 ppid=2566 pid=2777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:28.015000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137373263613365303162396564326232346366333039666565393363 May 17 00:30:29.064409 kubelet[2047]: E0517 00:30:29.063818 2047 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-f5rgx" podUID="5b8b07bb-2baf-4857-913a-a85ceb0e478f" May 17 00:30:29.345004 systemd[1]: cri-containerd-a772ca3e01b9ed2b24cf309fee93c6db9b5dcab7a3ab7ffc8884ff9aba792f79.scope: Deactivated successfully. May 17 00:30:29.348000 audit: BPF prog-id=138 op=UNLOAD May 17 00:30:29.387898 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-a772ca3e01b9ed2b24cf309fee93c6db9b5dcab7a3ab7ffc8884ff9aba792f79-rootfs.mount: Deactivated successfully. May 17 00:30:29.449161 kubelet[2047]: I0517 00:30:29.449106 2047 kubelet_node_status.go:501] "Fast updating node status as it just became ready" May 17 00:30:29.780225 kubelet[2047]: I0517 00:30:29.780033 2047 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/9ee031f2-ed1e-4d3c-b82c-99c5de10f1f4-config-volume\") pod \"coredns-674b8bbfcf-gslzx\" (UID: \"9ee031f2-ed1e-4d3c-b82c-99c5de10f1f4\") " pod="kube-system/coredns-674b8bbfcf-gslzx" May 17 00:30:29.780736 kubelet[2047]: I0517 00:30:29.780666 2047 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rvlkf\" (UniqueName: \"kubernetes.io/projected/9ee031f2-ed1e-4d3c-b82c-99c5de10f1f4-kube-api-access-rvlkf\") pod \"coredns-674b8bbfcf-gslzx\" (UID: \"9ee031f2-ed1e-4d3c-b82c-99c5de10f1f4\") " pod="kube-system/coredns-674b8bbfcf-gslzx" May 17 00:30:29.882294 kubelet[2047]: E0517 00:30:29.882202 2047 configmap.go:193] Couldn't get configMap kube-system/coredns: object "kube-system"/"coredns" not registered May 17 00:30:29.882853 kubelet[2047]: E0517 00:30:29.882821 2047 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/configmap/9ee031f2-ed1e-4d3c-b82c-99c5de10f1f4-config-volume podName:9ee031f2-ed1e-4d3c-b82c-99c5de10f1f4 nodeName:}" failed. No retries permitted until 2025-05-17 00:30:30.382751972 +0000 UTC m=+35.671858862 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "config-volume" (UniqueName: "kubernetes.io/configmap/9ee031f2-ed1e-4d3c-b82c-99c5de10f1f4-config-volume") pod "coredns-674b8bbfcf-gslzx" (UID: "9ee031f2-ed1e-4d3c-b82c-99c5de10f1f4") : object "kube-system"/"coredns" not registered May 17 00:30:29.942016 env[1216]: time="2025-05-17T00:30:29.941948766Z" level=info msg="shim disconnected" id=a772ca3e01b9ed2b24cf309fee93c6db9b5dcab7a3ab7ffc8884ff9aba792f79 May 17 00:30:29.943537 env[1216]: time="2025-05-17T00:30:29.943452600Z" level=warning msg="cleaning up after shim disconnected" id=a772ca3e01b9ed2b24cf309fee93c6db9b5dcab7a3ab7ffc8884ff9aba792f79 namespace=k8s.io May 17 00:30:29.943932 env[1216]: time="2025-05-17T00:30:29.943851392Z" level=info msg="cleaning up dead shim" May 17 00:30:29.969631 systemd[1]: Created slice kubepods-burstable-pod9ee031f2_ed1e_4d3c_b82c_99c5de10f1f4.slice. May 17 00:30:29.976298 env[1216]: time="2025-05-17T00:30:29.976245005Z" level=warning msg="cleanup warnings time=\"2025-05-17T00:30:29Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2820 runtime=io.containerd.runc.v2\n" May 17 00:30:29.983325 kubelet[2047]: I0517 00:30:29.983099 2047 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/d7e6c2c3-1282-4564-8eee-869b9655c267-calico-apiserver-certs\") pod \"calico-apiserver-5544b97fc-9jp6z\" (UID: \"d7e6c2c3-1282-4564-8eee-869b9655c267\") " pod="calico-apiserver/calico-apiserver-5544b97fc-9jp6z" May 17 00:30:29.983325 kubelet[2047]: I0517 00:30:29.983177 2047 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-l96wj\" (UniqueName: \"kubernetes.io/projected/d7e6c2c3-1282-4564-8eee-869b9655c267-kube-api-access-l96wj\") pod \"calico-apiserver-5544b97fc-9jp6z\" (UID: \"d7e6c2c3-1282-4564-8eee-869b9655c267\") " pod="calico-apiserver/calico-apiserver-5544b97fc-9jp6z" May 17 00:30:29.983325 kubelet[2047]: I0517 00:30:29.983238 2047 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/321c0e51-f8c3-46b7-a173-1e567c86d95b-config-volume\") pod \"coredns-674b8bbfcf-ztckd\" (UID: \"321c0e51-f8c3-46b7-a173-1e567c86d95b\") " pod="kube-system/coredns-674b8bbfcf-ztckd" May 17 00:30:29.983325 kubelet[2047]: I0517 00:30:29.983281 2047 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ssl5h\" (UniqueName: \"kubernetes.io/projected/321c0e51-f8c3-46b7-a173-1e567c86d95b-kube-api-access-ssl5h\") pod \"coredns-674b8bbfcf-ztckd\" (UID: \"321c0e51-f8c3-46b7-a173-1e567c86d95b\") " pod="kube-system/coredns-674b8bbfcf-ztckd" May 17 00:30:30.004621 systemd[1]: Created slice kubepods-burstable-pod321c0e51_f8c3_46b7_a173_1e567c86d95b.slice. May 17 00:30:30.018660 systemd[1]: Created slice kubepods-besteffort-pod90286d94_9e77_440b_a3dd_07d53d8a4dc1.slice. May 17 00:30:30.031283 systemd[1]: Created slice kubepods-besteffort-pod906ab3b1_343a_409d_8e38_3de2ad671165.slice. May 17 00:30:30.048360 systemd[1]: Created slice kubepods-besteffort-podd7e6c2c3_1282_4564_8eee_869b9655c267.slice. May 17 00:30:30.060373 systemd[1]: Created slice kubepods-besteffort-poda859c06b_ce28_4cc1_830c_0d905598097c.slice. May 17 00:30:30.074685 systemd[1]: Created slice kubepods-besteffort-pod65f0f637_2986_4c66_955a_c220f11cf598.slice. May 17 00:30:30.084531 kubelet[2047]: I0517 00:30:30.084472 2047 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/90286d94-9e77-440b-a3dd-07d53d8a4dc1-whisker-backend-key-pair\") pod \"whisker-6fb67bf47d-pm895\" (UID: \"90286d94-9e77-440b-a3dd-07d53d8a4dc1\") " pod="calico-system/whisker-6fb67bf47d-pm895" May 17 00:30:30.085272 kubelet[2047]: I0517 00:30:30.084543 2047 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/90286d94-9e77-440b-a3dd-07d53d8a4dc1-whisker-ca-bundle\") pod \"whisker-6fb67bf47d-pm895\" (UID: \"90286d94-9e77-440b-a3dd-07d53d8a4dc1\") " pod="calico-system/whisker-6fb67bf47d-pm895" May 17 00:30:30.085272 kubelet[2047]: I0517 00:30:30.084634 2047 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-key-pair\" (UniqueName: \"kubernetes.io/secret/a859c06b-ce28-4cc1-830c-0d905598097c-goldmane-key-pair\") pod \"goldmane-78d55f7ddc-sx8fp\" (UID: \"a859c06b-ce28-4cc1-830c-0d905598097c\") " pod="calico-system/goldmane-78d55f7ddc-sx8fp" May 17 00:30:30.085272 kubelet[2047]: I0517 00:30:30.084668 2047 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xqc8v\" (UniqueName: \"kubernetes.io/projected/a859c06b-ce28-4cc1-830c-0d905598097c-kube-api-access-xqc8v\") pod \"goldmane-78d55f7ddc-sx8fp\" (UID: \"a859c06b-ce28-4cc1-830c-0d905598097c\") " pod="calico-system/goldmane-78d55f7ddc-sx8fp" May 17 00:30:30.085272 kubelet[2047]: I0517 00:30:30.084762 2047 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config\" (UniqueName: \"kubernetes.io/configmap/a859c06b-ce28-4cc1-830c-0d905598097c-config\") pod \"goldmane-78d55f7ddc-sx8fp\" (UID: \"a859c06b-ce28-4cc1-830c-0d905598097c\") " pod="calico-system/goldmane-78d55f7ddc-sx8fp" May 17 00:30:30.085272 kubelet[2047]: I0517 00:30:30.084798 2047 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/a859c06b-ce28-4cc1-830c-0d905598097c-goldmane-ca-bundle\") pod \"goldmane-78d55f7ddc-sx8fp\" (UID: \"a859c06b-ce28-4cc1-830c-0d905598097c\") " pod="calico-system/goldmane-78d55f7ddc-sx8fp" May 17 00:30:30.085813 kubelet[2047]: I0517 00:30:30.084833 2047 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/65f0f637-2986-4c66-955a-c220f11cf598-tigera-ca-bundle\") pod \"calico-kube-controllers-5c756f7665-l4qrm\" (UID: \"65f0f637-2986-4c66-955a-c220f11cf598\") " pod="calico-system/calico-kube-controllers-5c756f7665-l4qrm" May 17 00:30:30.085813 kubelet[2047]: I0517 00:30:30.084874 2047 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4rwpz\" (UniqueName: \"kubernetes.io/projected/906ab3b1-343a-409d-8e38-3de2ad671165-kube-api-access-4rwpz\") pod \"calico-apiserver-5544b97fc-ncc4j\" (UID: \"906ab3b1-343a-409d-8e38-3de2ad671165\") " pod="calico-apiserver/calico-apiserver-5544b97fc-ncc4j" May 17 00:30:30.085813 kubelet[2047]: I0517 00:30:30.085260 2047 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/906ab3b1-343a-409d-8e38-3de2ad671165-calico-apiserver-certs\") pod \"calico-apiserver-5544b97fc-ncc4j\" (UID: \"906ab3b1-343a-409d-8e38-3de2ad671165\") " pod="calico-apiserver/calico-apiserver-5544b97fc-ncc4j" May 17 00:30:30.085813 kubelet[2047]: I0517 00:30:30.085344 2047 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-86qn2\" (UniqueName: \"kubernetes.io/projected/65f0f637-2986-4c66-955a-c220f11cf598-kube-api-access-86qn2\") pod \"calico-kube-controllers-5c756f7665-l4qrm\" (UID: \"65f0f637-2986-4c66-955a-c220f11cf598\") " pod="calico-system/calico-kube-controllers-5c756f7665-l4qrm" May 17 00:30:30.085813 kubelet[2047]: I0517 00:30:30.085409 2047 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wfvxw\" (UniqueName: \"kubernetes.io/projected/90286d94-9e77-440b-a3dd-07d53d8a4dc1-kube-api-access-wfvxw\") pod \"whisker-6fb67bf47d-pm895\" (UID: \"90286d94-9e77-440b-a3dd-07d53d8a4dc1\") " pod="calico-system/whisker-6fb67bf47d-pm895" May 17 00:30:30.273809 env[1216]: time="2025-05-17T00:30:30.273629974Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.0\"" May 17 00:30:30.314258 env[1216]: time="2025-05-17T00:30:30.314093653Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-ztckd,Uid:321c0e51-f8c3-46b7-a173-1e567c86d95b,Namespace:kube-system,Attempt:0,}" May 17 00:30:30.342017 env[1216]: time="2025-05-17T00:30:30.341953807Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5544b97fc-ncc4j,Uid:906ab3b1-343a-409d-8e38-3de2ad671165,Namespace:calico-apiserver,Attempt:0,}" May 17 00:30:30.352106 env[1216]: time="2025-05-17T00:30:30.352016205Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-6fb67bf47d-pm895,Uid:90286d94-9e77-440b-a3dd-07d53d8a4dc1,Namespace:calico-system,Attempt:0,}" May 17 00:30:30.358125 env[1216]: time="2025-05-17T00:30:30.358070636Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5544b97fc-9jp6z,Uid:d7e6c2c3-1282-4564-8eee-869b9655c267,Namespace:calico-apiserver,Attempt:0,}" May 17 00:30:30.367274 env[1216]: time="2025-05-17T00:30:30.367203184Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-78d55f7ddc-sx8fp,Uid:a859c06b-ce28-4cc1-830c-0d905598097c,Namespace:calico-system,Attempt:0,}" May 17 00:30:30.394121 env[1216]: time="2025-05-17T00:30:30.394056451Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5c756f7665-l4qrm,Uid:65f0f637-2986-4c66-955a-c220f11cf598,Namespace:calico-system,Attempt:0,}" May 17 00:30:30.600839 env[1216]: time="2025-05-17T00:30:30.600779152Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-gslzx,Uid:9ee031f2-ed1e-4d3c-b82c-99c5de10f1f4,Namespace:kube-system,Attempt:0,}" May 17 00:30:30.761601 env[1216]: time="2025-05-17T00:30:30.761500892Z" level=error msg="Failed to destroy network for sandbox \"38b9f7870f314bc8c74101a725e7fab52d045d1b5a1c684e98888a801f12cdcc\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:30:30.762465 env[1216]: time="2025-05-17T00:30:30.762404938Z" level=error msg="encountered an error cleaning up failed sandbox \"38b9f7870f314bc8c74101a725e7fab52d045d1b5a1c684e98888a801f12cdcc\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:30:30.762739 env[1216]: time="2025-05-17T00:30:30.762664166Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-ztckd,Uid:321c0e51-f8c3-46b7-a173-1e567c86d95b,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"38b9f7870f314bc8c74101a725e7fab52d045d1b5a1c684e98888a801f12cdcc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:30:30.763856 kubelet[2047]: E0517 00:30:30.763188 2047 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"38b9f7870f314bc8c74101a725e7fab52d045d1b5a1c684e98888a801f12cdcc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:30:30.763856 kubelet[2047]: E0517 00:30:30.763306 2047 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"38b9f7870f314bc8c74101a725e7fab52d045d1b5a1c684e98888a801f12cdcc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-674b8bbfcf-ztckd" May 17 00:30:30.763856 kubelet[2047]: E0517 00:30:30.763345 2047 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"38b9f7870f314bc8c74101a725e7fab52d045d1b5a1c684e98888a801f12cdcc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-674b8bbfcf-ztckd" May 17 00:30:30.764176 kubelet[2047]: E0517 00:30:30.763424 2047 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-674b8bbfcf-ztckd_kube-system(321c0e51-f8c3-46b7-a173-1e567c86d95b)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-674b8bbfcf-ztckd_kube-system(321c0e51-f8c3-46b7-a173-1e567c86d95b)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"38b9f7870f314bc8c74101a725e7fab52d045d1b5a1c684e98888a801f12cdcc\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-674b8bbfcf-ztckd" podUID="321c0e51-f8c3-46b7-a173-1e567c86d95b" May 17 00:30:30.870377 env[1216]: time="2025-05-17T00:30:30.868744898Z" level=error msg="Failed to destroy network for sandbox \"27c945ac2d9f584fea12b7af3fa670be33c7236b3045500b3920493d6ce27c9a\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:30:30.879318 env[1216]: time="2025-05-17T00:30:30.879225396Z" level=error msg="encountered an error cleaning up failed sandbox \"27c945ac2d9f584fea12b7af3fa670be33c7236b3045500b3920493d6ce27c9a\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:30:30.880124 env[1216]: time="2025-05-17T00:30:30.880036747Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5544b97fc-ncc4j,Uid:906ab3b1-343a-409d-8e38-3de2ad671165,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"27c945ac2d9f584fea12b7af3fa670be33c7236b3045500b3920493d6ce27c9a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:30:30.884109 env[1216]: time="2025-05-17T00:30:30.883988601Z" level=error msg="Failed to destroy network for sandbox \"74fc87334f78fb1a2c484b24de65157ae69a6602f8490b6ab360e61b545e6af6\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:30:30.886199 env[1216]: time="2025-05-17T00:30:30.886118644Z" level=error msg="encountered an error cleaning up failed sandbox \"74fc87334f78fb1a2c484b24de65157ae69a6602f8490b6ab360e61b545e6af6\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:30:30.886467 env[1216]: time="2025-05-17T00:30:30.886410447Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5544b97fc-9jp6z,Uid:d7e6c2c3-1282-4564-8eee-869b9655c267,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"74fc87334f78fb1a2c484b24de65157ae69a6602f8490b6ab360e61b545e6af6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:30:30.887771 kubelet[2047]: E0517 00:30:30.886948 2047 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"74fc87334f78fb1a2c484b24de65157ae69a6602f8490b6ab360e61b545e6af6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:30:30.887771 kubelet[2047]: E0517 00:30:30.887037 2047 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"74fc87334f78fb1a2c484b24de65157ae69a6602f8490b6ab360e61b545e6af6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5544b97fc-9jp6z" May 17 00:30:30.887771 kubelet[2047]: E0517 00:30:30.887079 2047 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"74fc87334f78fb1a2c484b24de65157ae69a6602f8490b6ab360e61b545e6af6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5544b97fc-9jp6z" May 17 00:30:30.888057 kubelet[2047]: E0517 00:30:30.887174 2047 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-5544b97fc-9jp6z_calico-apiserver(d7e6c2c3-1282-4564-8eee-869b9655c267)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-5544b97fc-9jp6z_calico-apiserver(d7e6c2c3-1282-4564-8eee-869b9655c267)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"74fc87334f78fb1a2c484b24de65157ae69a6602f8490b6ab360e61b545e6af6\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5544b97fc-9jp6z" podUID="d7e6c2c3-1282-4564-8eee-869b9655c267" May 17 00:30:30.888057 kubelet[2047]: E0517 00:30:30.887486 2047 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"27c945ac2d9f584fea12b7af3fa670be33c7236b3045500b3920493d6ce27c9a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:30:30.888057 kubelet[2047]: E0517 00:30:30.887542 2047 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"27c945ac2d9f584fea12b7af3fa670be33c7236b3045500b3920493d6ce27c9a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5544b97fc-ncc4j" May 17 00:30:30.888340 kubelet[2047]: E0517 00:30:30.887578 2047 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"27c945ac2d9f584fea12b7af3fa670be33c7236b3045500b3920493d6ce27c9a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5544b97fc-ncc4j" May 17 00:30:30.888340 kubelet[2047]: E0517 00:30:30.887666 2047 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-5544b97fc-ncc4j_calico-apiserver(906ab3b1-343a-409d-8e38-3de2ad671165)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-5544b97fc-ncc4j_calico-apiserver(906ab3b1-343a-409d-8e38-3de2ad671165)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"27c945ac2d9f584fea12b7af3fa670be33c7236b3045500b3920493d6ce27c9a\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5544b97fc-ncc4j" podUID="906ab3b1-343a-409d-8e38-3de2ad671165" May 17 00:30:30.913357 env[1216]: time="2025-05-17T00:30:30.913248594Z" level=error msg="Failed to destroy network for sandbox \"a4d0624842c5c7e1d944a9d2ce00c50c68a145628199d481361fdb7a7f4e9534\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:30:30.920497 env[1216]: time="2025-05-17T00:30:30.919809001Z" level=error msg="encountered an error cleaning up failed sandbox \"a4d0624842c5c7e1d944a9d2ce00c50c68a145628199d481361fdb7a7f4e9534\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:30:30.920967 env[1216]: time="2025-05-17T00:30:30.920792623Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-78d55f7ddc-sx8fp,Uid:a859c06b-ce28-4cc1-830c-0d905598097c,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"a4d0624842c5c7e1d944a9d2ce00c50c68a145628199d481361fdb7a7f4e9534\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:30:30.930034 kubelet[2047]: E0517 00:30:30.929739 2047 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a4d0624842c5c7e1d944a9d2ce00c50c68a145628199d481361fdb7a7f4e9534\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:30:30.930034 kubelet[2047]: E0517 00:30:30.929822 2047 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a4d0624842c5c7e1d944a9d2ce00c50c68a145628199d481361fdb7a7f4e9534\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-78d55f7ddc-sx8fp" May 17 00:30:30.930034 kubelet[2047]: E0517 00:30:30.929871 2047 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a4d0624842c5c7e1d944a9d2ce00c50c68a145628199d481361fdb7a7f4e9534\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-78d55f7ddc-sx8fp" May 17 00:30:30.930365 kubelet[2047]: E0517 00:30:30.929959 2047 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"goldmane-78d55f7ddc-sx8fp_calico-system(a859c06b-ce28-4cc1-830c-0d905598097c)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"goldmane-78d55f7ddc-sx8fp_calico-system(a859c06b-ce28-4cc1-830c-0d905598097c)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"a4d0624842c5c7e1d944a9d2ce00c50c68a145628199d481361fdb7a7f4e9534\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-78d55f7ddc-sx8fp" podUID="a859c06b-ce28-4cc1-830c-0d905598097c" May 17 00:30:30.940344 env[1216]: time="2025-05-17T00:30:30.940262930Z" level=error msg="Failed to destroy network for sandbox \"700404bef465df98287b71107fad94c0a389122ae7534ced3f0eaeed6a6d8246\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:30:30.941369 env[1216]: time="2025-05-17T00:30:30.941299112Z" level=error msg="encountered an error cleaning up failed sandbox \"700404bef465df98287b71107fad94c0a389122ae7534ced3f0eaeed6a6d8246\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:30:30.941656 env[1216]: time="2025-05-17T00:30:30.941588535Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5c756f7665-l4qrm,Uid:65f0f637-2986-4c66-955a-c220f11cf598,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"700404bef465df98287b71107fad94c0a389122ae7534ced3f0eaeed6a6d8246\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:30:30.942535 kubelet[2047]: E0517 00:30:30.942246 2047 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"700404bef465df98287b71107fad94c0a389122ae7534ced3f0eaeed6a6d8246\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:30:30.942535 kubelet[2047]: E0517 00:30:30.942328 2047 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"700404bef465df98287b71107fad94c0a389122ae7534ced3f0eaeed6a6d8246\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-5c756f7665-l4qrm" May 17 00:30:30.942535 kubelet[2047]: E0517 00:30:30.942373 2047 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"700404bef465df98287b71107fad94c0a389122ae7534ced3f0eaeed6a6d8246\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-5c756f7665-l4qrm" May 17 00:30:30.942833 kubelet[2047]: E0517 00:30:30.942457 2047 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-5c756f7665-l4qrm_calico-system(65f0f637-2986-4c66-955a-c220f11cf598)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-5c756f7665-l4qrm_calico-system(65f0f637-2986-4c66-955a-c220f11cf598)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"700404bef465df98287b71107fad94c0a389122ae7534ced3f0eaeed6a6d8246\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5c756f7665-l4qrm" podUID="65f0f637-2986-4c66-955a-c220f11cf598" May 17 00:30:30.959979 env[1216]: time="2025-05-17T00:30:30.959861090Z" level=error msg="Failed to destroy network for sandbox \"f10659a095b6207e25ad3f2ea8706faadc6cd96cea0f4c04f07a756f854db02e\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:30:30.961836 env[1216]: time="2025-05-17T00:30:30.961741399Z" level=error msg="encountered an error cleaning up failed sandbox \"f10659a095b6207e25ad3f2ea8706faadc6cd96cea0f4c04f07a756f854db02e\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:30:30.962159 env[1216]: time="2025-05-17T00:30:30.962097281Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-6fb67bf47d-pm895,Uid:90286d94-9e77-440b-a3dd-07d53d8a4dc1,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"f10659a095b6207e25ad3f2ea8706faadc6cd96cea0f4c04f07a756f854db02e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:30:30.964724 kubelet[2047]: E0517 00:30:30.962627 2047 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f10659a095b6207e25ad3f2ea8706faadc6cd96cea0f4c04f07a756f854db02e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:30:30.965576 kubelet[2047]: E0517 00:30:30.964940 2047 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f10659a095b6207e25ad3f2ea8706faadc6cd96cea0f4c04f07a756f854db02e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-6fb67bf47d-pm895" May 17 00:30:30.965576 kubelet[2047]: E0517 00:30:30.965004 2047 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f10659a095b6207e25ad3f2ea8706faadc6cd96cea0f4c04f07a756f854db02e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-6fb67bf47d-pm895" May 17 00:30:30.965576 kubelet[2047]: E0517 00:30:30.965080 2047 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"whisker-6fb67bf47d-pm895_calico-system(90286d94-9e77-440b-a3dd-07d53d8a4dc1)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"whisker-6fb67bf47d-pm895_calico-system(90286d94-9e77-440b-a3dd-07d53d8a4dc1)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"f10659a095b6207e25ad3f2ea8706faadc6cd96cea0f4c04f07a756f854db02e\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-6fb67bf47d-pm895" podUID="90286d94-9e77-440b-a3dd-07d53d8a4dc1" May 17 00:30:30.990175 env[1216]: time="2025-05-17T00:30:30.990090556Z" level=error msg="Failed to destroy network for sandbox \"4c35600aa5b627fbb3ef3071e9d4c28f2c17eedb7a64fe05b2cf6d7966a6bd7c\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:30:30.990765 env[1216]: time="2025-05-17T00:30:30.990681363Z" level=error msg="encountered an error cleaning up failed sandbox \"4c35600aa5b627fbb3ef3071e9d4c28f2c17eedb7a64fe05b2cf6d7966a6bd7c\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:30:30.990894 env[1216]: time="2025-05-17T00:30:30.990806106Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-gslzx,Uid:9ee031f2-ed1e-4d3c-b82c-99c5de10f1f4,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"4c35600aa5b627fbb3ef3071e9d4c28f2c17eedb7a64fe05b2cf6d7966a6bd7c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:30:30.991112 kubelet[2047]: E0517 00:30:30.991057 2047 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4c35600aa5b627fbb3ef3071e9d4c28f2c17eedb7a64fe05b2cf6d7966a6bd7c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:30:30.991257 kubelet[2047]: E0517 00:30:30.991148 2047 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4c35600aa5b627fbb3ef3071e9d4c28f2c17eedb7a64fe05b2cf6d7966a6bd7c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-674b8bbfcf-gslzx" May 17 00:30:30.991257 kubelet[2047]: E0517 00:30:30.991187 2047 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4c35600aa5b627fbb3ef3071e9d4c28f2c17eedb7a64fe05b2cf6d7966a6bd7c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-674b8bbfcf-gslzx" May 17 00:30:30.991403 kubelet[2047]: E0517 00:30:30.991262 2047 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-674b8bbfcf-gslzx_kube-system(9ee031f2-ed1e-4d3c-b82c-99c5de10f1f4)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-674b8bbfcf-gslzx_kube-system(9ee031f2-ed1e-4d3c-b82c-99c5de10f1f4)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"4c35600aa5b627fbb3ef3071e9d4c28f2c17eedb7a64fe05b2cf6d7966a6bd7c\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-674b8bbfcf-gslzx" podUID="9ee031f2-ed1e-4d3c-b82c-99c5de10f1f4" May 17 00:30:31.072102 systemd[1]: Created slice kubepods-besteffort-pod5b8b07bb_2baf_4857_913a_a85ceb0e478f.slice. May 17 00:30:31.077063 env[1216]: time="2025-05-17T00:30:31.076850879Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-f5rgx,Uid:5b8b07bb-2baf-4857-913a-a85ceb0e478f,Namespace:calico-system,Attempt:0,}" May 17 00:30:31.179512 env[1216]: time="2025-05-17T00:30:31.179297897Z" level=error msg="Failed to destroy network for sandbox \"58932c4b7aa6a5543cee3a7c44937a02226c27c679f070c83059d1da270053cd\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:30:31.184193 env[1216]: time="2025-05-17T00:30:31.184095962Z" level=error msg="encountered an error cleaning up failed sandbox \"58932c4b7aa6a5543cee3a7c44937a02226c27c679f070c83059d1da270053cd\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:30:31.184397 env[1216]: time="2025-05-17T00:30:31.184226311Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-f5rgx,Uid:5b8b07bb-2baf-4857-913a-a85ceb0e478f,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"58932c4b7aa6a5543cee3a7c44937a02226c27c679f070c83059d1da270053cd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:30:31.185906 kubelet[2047]: E0517 00:30:31.184601 2047 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"58932c4b7aa6a5543cee3a7c44937a02226c27c679f070c83059d1da270053cd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:30:31.185906 kubelet[2047]: E0517 00:30:31.184701 2047 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"58932c4b7aa6a5543cee3a7c44937a02226c27c679f070c83059d1da270053cd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-f5rgx" May 17 00:30:31.185906 kubelet[2047]: E0517 00:30:31.184743 2047 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"58932c4b7aa6a5543cee3a7c44937a02226c27c679f070c83059d1da270053cd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-f5rgx" May 17 00:30:31.186571 kubelet[2047]: E0517 00:30:31.184825 2047 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-f5rgx_calico-system(5b8b07bb-2baf-4857-913a-a85ceb0e478f)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-f5rgx_calico-system(5b8b07bb-2baf-4857-913a-a85ceb0e478f)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"58932c4b7aa6a5543cee3a7c44937a02226c27c679f070c83059d1da270053cd\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-f5rgx" podUID="5b8b07bb-2baf-4857-913a-a85ceb0e478f" May 17 00:30:31.278314 kubelet[2047]: I0517 00:30:31.278264 2047 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="700404bef465df98287b71107fad94c0a389122ae7534ced3f0eaeed6a6d8246" May 17 00:30:31.280474 env[1216]: time="2025-05-17T00:30:31.279946942Z" level=info msg="StopPodSandbox for \"700404bef465df98287b71107fad94c0a389122ae7534ced3f0eaeed6a6d8246\"" May 17 00:30:31.322675 kubelet[2047]: I0517 00:30:31.322620 2047 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="27c945ac2d9f584fea12b7af3fa670be33c7236b3045500b3920493d6ce27c9a" May 17 00:30:31.327456 env[1216]: time="2025-05-17T00:30:31.326791094Z" level=info msg="StopPodSandbox for \"27c945ac2d9f584fea12b7af3fa670be33c7236b3045500b3920493d6ce27c9a\"" May 17 00:30:31.331919 kubelet[2047]: I0517 00:30:31.331876 2047 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="58932c4b7aa6a5543cee3a7c44937a02226c27c679f070c83059d1da270053cd" May 17 00:30:31.337299 env[1216]: time="2025-05-17T00:30:31.336120790Z" level=info msg="StopPodSandbox for \"58932c4b7aa6a5543cee3a7c44937a02226c27c679f070c83059d1da270053cd\"" May 17 00:30:31.359263 kubelet[2047]: I0517 00:30:31.358243 2047 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="4c35600aa5b627fbb3ef3071e9d4c28f2c17eedb7a64fe05b2cf6d7966a6bd7c" May 17 00:30:31.359999 env[1216]: time="2025-05-17T00:30:31.359948236Z" level=info msg="StopPodSandbox for \"4c35600aa5b627fbb3ef3071e9d4c28f2c17eedb7a64fe05b2cf6d7966a6bd7c\"" May 17 00:30:31.386221 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-a4d0624842c5c7e1d944a9d2ce00c50c68a145628199d481361fdb7a7f4e9534-shm.mount: Deactivated successfully. May 17 00:30:31.386413 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-f10659a095b6207e25ad3f2ea8706faadc6cd96cea0f4c04f07a756f854db02e-shm.mount: Deactivated successfully. May 17 00:30:31.386546 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-74fc87334f78fb1a2c484b24de65157ae69a6602f8490b6ab360e61b545e6af6-shm.mount: Deactivated successfully. May 17 00:30:31.386725 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-27c945ac2d9f584fea12b7af3fa670be33c7236b3045500b3920493d6ce27c9a-shm.mount: Deactivated successfully. May 17 00:30:31.386862 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-38b9f7870f314bc8c74101a725e7fab52d045d1b5a1c684e98888a801f12cdcc-shm.mount: Deactivated successfully. May 17 00:30:31.413831 kubelet[2047]: I0517 00:30:31.413783 2047 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="74fc87334f78fb1a2c484b24de65157ae69a6602f8490b6ab360e61b545e6af6" May 17 00:30:31.414879 env[1216]: time="2025-05-17T00:30:31.414829475Z" level=info msg="StopPodSandbox for \"74fc87334f78fb1a2c484b24de65157ae69a6602f8490b6ab360e61b545e6af6\"" May 17 00:30:31.416916 kubelet[2047]: I0517 00:30:31.416341 2047 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="f10659a095b6207e25ad3f2ea8706faadc6cd96cea0f4c04f07a756f854db02e" May 17 00:30:31.417253 env[1216]: time="2025-05-17T00:30:31.417212133Z" level=info msg="StopPodSandbox for \"f10659a095b6207e25ad3f2ea8706faadc6cd96cea0f4c04f07a756f854db02e\"" May 17 00:30:31.420650 kubelet[2047]: I0517 00:30:31.419647 2047 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="38b9f7870f314bc8c74101a725e7fab52d045d1b5a1c684e98888a801f12cdcc" May 17 00:30:31.421106 env[1216]: time="2025-05-17T00:30:31.421046729Z" level=info msg="StopPodSandbox for \"38b9f7870f314bc8c74101a725e7fab52d045d1b5a1c684e98888a801f12cdcc\"" May 17 00:30:31.423548 kubelet[2047]: I0517 00:30:31.423396 2047 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="a4d0624842c5c7e1d944a9d2ce00c50c68a145628199d481361fdb7a7f4e9534" May 17 00:30:31.424608 env[1216]: time="2025-05-17T00:30:31.424541459Z" level=info msg="StopPodSandbox for \"a4d0624842c5c7e1d944a9d2ce00c50c68a145628199d481361fdb7a7f4e9534\"" May 17 00:30:31.447763 env[1216]: time="2025-05-17T00:30:31.447507190Z" level=error msg="StopPodSandbox for \"700404bef465df98287b71107fad94c0a389122ae7534ced3f0eaeed6a6d8246\" failed" error="failed to destroy network for sandbox \"700404bef465df98287b71107fad94c0a389122ae7534ced3f0eaeed6a6d8246\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:30:31.453550 kubelet[2047]: E0517 00:30:31.453451 2047 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"700404bef465df98287b71107fad94c0a389122ae7534ced3f0eaeed6a6d8246\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="700404bef465df98287b71107fad94c0a389122ae7534ced3f0eaeed6a6d8246" May 17 00:30:31.453804 kubelet[2047]: E0517 00:30:31.453612 2047 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"700404bef465df98287b71107fad94c0a389122ae7534ced3f0eaeed6a6d8246"} May 17 00:30:31.453804 kubelet[2047]: E0517 00:30:31.453742 2047 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"65f0f637-2986-4c66-955a-c220f11cf598\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"700404bef465df98287b71107fad94c0a389122ae7534ced3f0eaeed6a6d8246\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:30:31.454042 kubelet[2047]: E0517 00:30:31.453802 2047 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"65f0f637-2986-4c66-955a-c220f11cf598\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"700404bef465df98287b71107fad94c0a389122ae7534ced3f0eaeed6a6d8246\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5c756f7665-l4qrm" podUID="65f0f637-2986-4c66-955a-c220f11cf598" May 17 00:30:31.524062 env[1216]: time="2025-05-17T00:30:31.523937669Z" level=error msg="StopPodSandbox for \"58932c4b7aa6a5543cee3a7c44937a02226c27c679f070c83059d1da270053cd\" failed" error="failed to destroy network for sandbox \"58932c4b7aa6a5543cee3a7c44937a02226c27c679f070c83059d1da270053cd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:30:31.533158 kubelet[2047]: E0517 00:30:31.533044 2047 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"58932c4b7aa6a5543cee3a7c44937a02226c27c679f070c83059d1da270053cd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="58932c4b7aa6a5543cee3a7c44937a02226c27c679f070c83059d1da270053cd" May 17 00:30:31.533387 kubelet[2047]: E0517 00:30:31.533191 2047 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"58932c4b7aa6a5543cee3a7c44937a02226c27c679f070c83059d1da270053cd"} May 17 00:30:31.533387 kubelet[2047]: E0517 00:30:31.533282 2047 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"5b8b07bb-2baf-4857-913a-a85ceb0e478f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"58932c4b7aa6a5543cee3a7c44937a02226c27c679f070c83059d1da270053cd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:30:31.533632 kubelet[2047]: E0517 00:30:31.533373 2047 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"5b8b07bb-2baf-4857-913a-a85ceb0e478f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"58932c4b7aa6a5543cee3a7c44937a02226c27c679f070c83059d1da270053cd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-f5rgx" podUID="5b8b07bb-2baf-4857-913a-a85ceb0e478f" May 17 00:30:31.549979 env[1216]: time="2025-05-17T00:30:31.549891254Z" level=error msg="StopPodSandbox for \"27c945ac2d9f584fea12b7af3fa670be33c7236b3045500b3920493d6ce27c9a\" failed" error="failed to destroy network for sandbox \"27c945ac2d9f584fea12b7af3fa670be33c7236b3045500b3920493d6ce27c9a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:30:31.550428 kubelet[2047]: E0517 00:30:31.550331 2047 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"27c945ac2d9f584fea12b7af3fa670be33c7236b3045500b3920493d6ce27c9a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="27c945ac2d9f584fea12b7af3fa670be33c7236b3045500b3920493d6ce27c9a" May 17 00:30:31.550575 kubelet[2047]: E0517 00:30:31.550456 2047 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"27c945ac2d9f584fea12b7af3fa670be33c7236b3045500b3920493d6ce27c9a"} May 17 00:30:31.550575 kubelet[2047]: E0517 00:30:31.550535 2047 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"906ab3b1-343a-409d-8e38-3de2ad671165\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"27c945ac2d9f584fea12b7af3fa670be33c7236b3045500b3920493d6ce27c9a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:30:31.550822 kubelet[2047]: E0517 00:30:31.550593 2047 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"906ab3b1-343a-409d-8e38-3de2ad671165\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"27c945ac2d9f584fea12b7af3fa670be33c7236b3045500b3920493d6ce27c9a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5544b97fc-ncc4j" podUID="906ab3b1-343a-409d-8e38-3de2ad671165" May 17 00:30:31.609478 env[1216]: time="2025-05-17T00:30:31.609374502Z" level=error msg="StopPodSandbox for \"f10659a095b6207e25ad3f2ea8706faadc6cd96cea0f4c04f07a756f854db02e\" failed" error="failed to destroy network for sandbox \"f10659a095b6207e25ad3f2ea8706faadc6cd96cea0f4c04f07a756f854db02e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:30:31.609909 kubelet[2047]: E0517 00:30:31.609826 2047 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f10659a095b6207e25ad3f2ea8706faadc6cd96cea0f4c04f07a756f854db02e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f10659a095b6207e25ad3f2ea8706faadc6cd96cea0f4c04f07a756f854db02e" May 17 00:30:31.610044 kubelet[2047]: E0517 00:30:31.609934 2047 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"f10659a095b6207e25ad3f2ea8706faadc6cd96cea0f4c04f07a756f854db02e"} May 17 00:30:31.610044 kubelet[2047]: E0517 00:30:31.610014 2047 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"90286d94-9e77-440b-a3dd-07d53d8a4dc1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f10659a095b6207e25ad3f2ea8706faadc6cd96cea0f4c04f07a756f854db02e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:30:31.610270 kubelet[2047]: E0517 00:30:31.610074 2047 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"90286d94-9e77-440b-a3dd-07d53d8a4dc1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f10659a095b6207e25ad3f2ea8706faadc6cd96cea0f4c04f07a756f854db02e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-6fb67bf47d-pm895" podUID="90286d94-9e77-440b-a3dd-07d53d8a4dc1" May 17 00:30:31.614963 env[1216]: time="2025-05-17T00:30:31.614805456Z" level=error msg="StopPodSandbox for \"4c35600aa5b627fbb3ef3071e9d4c28f2c17eedb7a64fe05b2cf6d7966a6bd7c\" failed" error="failed to destroy network for sandbox \"4c35600aa5b627fbb3ef3071e9d4c28f2c17eedb7a64fe05b2cf6d7966a6bd7c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:30:31.616755 kubelet[2047]: E0517 00:30:31.616644 2047 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"4c35600aa5b627fbb3ef3071e9d4c28f2c17eedb7a64fe05b2cf6d7966a6bd7c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="4c35600aa5b627fbb3ef3071e9d4c28f2c17eedb7a64fe05b2cf6d7966a6bd7c" May 17 00:30:31.616971 kubelet[2047]: E0517 00:30:31.616793 2047 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"4c35600aa5b627fbb3ef3071e9d4c28f2c17eedb7a64fe05b2cf6d7966a6bd7c"} May 17 00:30:31.616971 kubelet[2047]: E0517 00:30:31.616876 2047 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"9ee031f2-ed1e-4d3c-b82c-99c5de10f1f4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4c35600aa5b627fbb3ef3071e9d4c28f2c17eedb7a64fe05b2cf6d7966a6bd7c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:30:31.616971 kubelet[2047]: E0517 00:30:31.616916 2047 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"9ee031f2-ed1e-4d3c-b82c-99c5de10f1f4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4c35600aa5b627fbb3ef3071e9d4c28f2c17eedb7a64fe05b2cf6d7966a6bd7c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-674b8bbfcf-gslzx" podUID="9ee031f2-ed1e-4d3c-b82c-99c5de10f1f4" May 17 00:30:31.658271 env[1216]: time="2025-05-17T00:30:31.658180033Z" level=error msg="StopPodSandbox for \"74fc87334f78fb1a2c484b24de65157ae69a6602f8490b6ab360e61b545e6af6\" failed" error="failed to destroy network for sandbox \"74fc87334f78fb1a2c484b24de65157ae69a6602f8490b6ab360e61b545e6af6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:30:31.659197 kubelet[2047]: E0517 00:30:31.659108 2047 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"74fc87334f78fb1a2c484b24de65157ae69a6602f8490b6ab360e61b545e6af6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="74fc87334f78fb1a2c484b24de65157ae69a6602f8490b6ab360e61b545e6af6" May 17 00:30:31.659367 kubelet[2047]: E0517 00:30:31.659243 2047 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"74fc87334f78fb1a2c484b24de65157ae69a6602f8490b6ab360e61b545e6af6"} May 17 00:30:31.659367 kubelet[2047]: E0517 00:30:31.659340 2047 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d7e6c2c3-1282-4564-8eee-869b9655c267\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"74fc87334f78fb1a2c484b24de65157ae69a6602f8490b6ab360e61b545e6af6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:30:31.659574 kubelet[2047]: E0517 00:30:31.659401 2047 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d7e6c2c3-1282-4564-8eee-869b9655c267\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"74fc87334f78fb1a2c484b24de65157ae69a6602f8490b6ab360e61b545e6af6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5544b97fc-9jp6z" podUID="d7e6c2c3-1282-4564-8eee-869b9655c267" May 17 00:30:31.688920 env[1216]: time="2025-05-17T00:30:31.688834624Z" level=error msg="StopPodSandbox for \"a4d0624842c5c7e1d944a9d2ce00c50c68a145628199d481361fdb7a7f4e9534\" failed" error="failed to destroy network for sandbox \"a4d0624842c5c7e1d944a9d2ce00c50c68a145628199d481361fdb7a7f4e9534\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:30:31.689358 kubelet[2047]: E0517 00:30:31.689251 2047 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a4d0624842c5c7e1d944a9d2ce00c50c68a145628199d481361fdb7a7f4e9534\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a4d0624842c5c7e1d944a9d2ce00c50c68a145628199d481361fdb7a7f4e9534" May 17 00:30:31.689494 kubelet[2047]: E0517 00:30:31.689392 2047 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"a4d0624842c5c7e1d944a9d2ce00c50c68a145628199d481361fdb7a7f4e9534"} May 17 00:30:31.689565 kubelet[2047]: E0517 00:30:31.689480 2047 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a859c06b-ce28-4cc1-830c-0d905598097c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a4d0624842c5c7e1d944a9d2ce00c50c68a145628199d481361fdb7a7f4e9534\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:30:31.689727 kubelet[2047]: E0517 00:30:31.689550 2047 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a859c06b-ce28-4cc1-830c-0d905598097c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a4d0624842c5c7e1d944a9d2ce00c50c68a145628199d481361fdb7a7f4e9534\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-78d55f7ddc-sx8fp" podUID="a859c06b-ce28-4cc1-830c-0d905598097c" May 17 00:30:31.691259 env[1216]: time="2025-05-17T00:30:31.691192115Z" level=error msg="StopPodSandbox for \"38b9f7870f314bc8c74101a725e7fab52d045d1b5a1c684e98888a801f12cdcc\" failed" error="failed to destroy network for sandbox \"38b9f7870f314bc8c74101a725e7fab52d045d1b5a1c684e98888a801f12cdcc\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:30:31.691718 kubelet[2047]: E0517 00:30:31.691641 2047 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"38b9f7870f314bc8c74101a725e7fab52d045d1b5a1c684e98888a801f12cdcc\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="38b9f7870f314bc8c74101a725e7fab52d045d1b5a1c684e98888a801f12cdcc" May 17 00:30:31.691910 kubelet[2047]: E0517 00:30:31.691771 2047 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"38b9f7870f314bc8c74101a725e7fab52d045d1b5a1c684e98888a801f12cdcc"} May 17 00:30:31.691910 kubelet[2047]: E0517 00:30:31.691854 2047 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"321c0e51-f8c3-46b7-a173-1e567c86d95b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"38b9f7870f314bc8c74101a725e7fab52d045d1b5a1c684e98888a801f12cdcc\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:30:31.692117 kubelet[2047]: E0517 00:30:31.692033 2047 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"321c0e51-f8c3-46b7-a173-1e567c86d95b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"38b9f7870f314bc8c74101a725e7fab52d045d1b5a1c684e98888a801f12cdcc\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-674b8bbfcf-ztckd" podUID="321c0e51-f8c3-46b7-a173-1e567c86d95b" May 17 00:30:38.205235 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2564679495.mount: Deactivated successfully. May 17 00:30:38.242989 env[1216]: time="2025-05-17T00:30:38.242913200Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:30:38.247165 env[1216]: time="2025-05-17T00:30:38.247100007Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d12dae9bc0999225efe30fd5618bcf2195709d54ed2840234f5006aab5f7d721,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:30:38.250079 env[1216]: time="2025-05-17T00:30:38.250026194Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:30:38.253459 env[1216]: time="2025-05-17T00:30:38.253401500Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:7cb61ea47ca0a8e6d0526a42da4f1e399b37ccd13339d0776d272465cb7ee012,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:30:38.254087 env[1216]: time="2025-05-17T00:30:38.254023958Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.0\" returns image reference \"sha256:d12dae9bc0999225efe30fd5618bcf2195709d54ed2840234f5006aab5f7d721\"" May 17 00:30:38.290863 env[1216]: time="2025-05-17T00:30:38.290791595Z" level=info msg="CreateContainer within sandbox \"104be65566d4a99e3262e874421473765998b3ddba899d8de5de3ad48f4910dc\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 17 00:30:38.323502 env[1216]: time="2025-05-17T00:30:38.323415891Z" level=info msg="CreateContainer within sandbox \"104be65566d4a99e3262e874421473765998b3ddba899d8de5de3ad48f4910dc\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"6f4ec2c86f5d221f35ae0a09c858e646760ce80f1738999d3cd1f6354f9583bc\"" May 17 00:30:38.326604 env[1216]: time="2025-05-17T00:30:38.326388603Z" level=info msg="StartContainer for \"6f4ec2c86f5d221f35ae0a09c858e646760ce80f1738999d3cd1f6354f9583bc\"" May 17 00:30:38.367645 systemd[1]: Started cri-containerd-6f4ec2c86f5d221f35ae0a09c858e646760ce80f1738999d3cd1f6354f9583bc.scope. May 17 00:30:38.428681 kernel: kauditd_printk_skb: 34 callbacks suppressed May 17 00:30:38.428936 kernel: audit: type=1400 audit(1747441838.400:992): avc: denied { perfmon } for pid=3195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:38.400000 audit[3195]: AVC avc: denied { perfmon } for pid=3195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:38.400000 audit[3195]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f19d552f2f8 items=0 ppid=2566 pid=3195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:38.462763 kernel: audit: type=1300 audit(1747441838.400:992): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f19d552f2f8 items=0 ppid=2566 pid=3195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:38.400000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666346563326338366635643232316633356165306130396338353865 May 17 00:30:38.492982 kernel: audit: type=1327 audit(1747441838.400:992): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666346563326338366635643232316633356165306130396338353865 May 17 00:30:38.400000 audit[3195]: AVC avc: denied { bpf } for pid=3195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:38.520806 kernel: audit: type=1400 audit(1747441838.400:993): avc: denied { bpf } for pid=3195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:38.400000 audit[3195]: AVC avc: denied { bpf } for pid=3195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:38.565730 kernel: audit: type=1400 audit(1747441838.400:993): avc: denied { bpf } for pid=3195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:38.566017 kernel: audit: type=1400 audit(1747441838.400:993): avc: denied { bpf } for pid=3195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:38.400000 audit[3195]: AVC avc: denied { bpf } for pid=3195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:38.400000 audit[3195]: AVC avc: denied { perfmon } for pid=3195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:38.588303 kernel: audit: type=1400 audit(1747441838.400:993): avc: denied { perfmon } for pid=3195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:38.588421 kernel: audit: type=1400 audit(1747441838.400:993): avc: denied { perfmon } for pid=3195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:38.400000 audit[3195]: AVC avc: denied { perfmon } for pid=3195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:38.400000 audit[3195]: AVC avc: denied { perfmon } for pid=3195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:38.630491 kernel: audit: type=1400 audit(1747441838.400:993): avc: denied { perfmon } for pid=3195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:38.400000 audit[3195]: AVC avc: denied { perfmon } for pid=3195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:38.651731 kernel: audit: type=1400 audit(1747441838.400:993): avc: denied { perfmon } for pid=3195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:38.654051 env[1216]: time="2025-05-17T00:30:38.653983493Z" level=info msg="StartContainer for \"6f4ec2c86f5d221f35ae0a09c858e646760ce80f1738999d3cd1f6354f9583bc\" returns successfully" May 17 00:30:38.400000 audit[3195]: AVC avc: denied { perfmon } for pid=3195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:38.400000 audit[3195]: AVC avc: denied { bpf } for pid=3195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:38.400000 audit[3195]: AVC avc: denied { bpf } for pid=3195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:38.400000 audit: BPF prog-id=139 op=LOAD May 17 00:30:38.400000 audit[3195]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0000242e8 items=0 ppid=2566 pid=3195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:38.400000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666346563326338366635643232316633356165306130396338353865 May 17 00:30:38.461000 audit[3195]: AVC avc: denied { bpf } for pid=3195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:38.461000 audit[3195]: AVC avc: denied { bpf } for pid=3195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:38.461000 audit[3195]: AVC avc: denied { perfmon } for pid=3195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:38.461000 audit[3195]: AVC avc: denied { perfmon } for pid=3195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:38.461000 audit[3195]: AVC avc: denied { perfmon } for pid=3195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:38.461000 audit[3195]: AVC avc: denied { perfmon } for pid=3195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:38.461000 audit[3195]: AVC avc: denied { perfmon } for pid=3195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:38.461000 audit[3195]: AVC avc: denied { bpf } for pid=3195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:38.461000 audit[3195]: AVC avc: denied { bpf } for pid=3195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:38.461000 audit: BPF prog-id=140 op=LOAD May 17 00:30:38.461000 audit[3195]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000024338 items=0 ppid=2566 pid=3195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:38.461000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666346563326338366635643232316633356165306130396338353865 May 17 00:30:38.490000 audit: BPF prog-id=140 op=UNLOAD May 17 00:30:38.490000 audit: BPF prog-id=139 op=UNLOAD May 17 00:30:38.490000 audit[3195]: AVC avc: denied { bpf } for pid=3195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:38.490000 audit[3195]: AVC avc: denied { bpf } for pid=3195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:38.490000 audit[3195]: AVC avc: denied { bpf } for pid=3195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:38.490000 audit[3195]: AVC avc: denied { perfmon } for pid=3195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:38.490000 audit[3195]: AVC avc: denied { perfmon } for pid=3195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:38.490000 audit[3195]: AVC avc: denied { perfmon } for pid=3195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:38.490000 audit[3195]: AVC avc: denied { perfmon } for pid=3195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:38.490000 audit[3195]: AVC avc: denied { perfmon } for pid=3195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:38.490000 audit[3195]: AVC avc: denied { bpf } for pid=3195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:38.490000 audit[3195]: AVC avc: denied { bpf } for pid=3195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:38.490000 audit: BPF prog-id=141 op=LOAD May 17 00:30:38.490000 audit[3195]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0000243c8 items=0 ppid=2566 pid=3195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:38.490000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666346563326338366635643232316633356165306130396338353865 May 17 00:30:38.741919 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 17 00:30:38.742183 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 17 00:30:38.883030 env[1216]: time="2025-05-17T00:30:38.882964499Z" level=info msg="StopPodSandbox for \"f10659a095b6207e25ad3f2ea8706faadc6cd96cea0f4c04f07a756f854db02e\"" May 17 00:30:39.088929 env[1216]: 2025-05-17 00:30:38.995 [INFO][3246] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="f10659a095b6207e25ad3f2ea8706faadc6cd96cea0f4c04f07a756f854db02e" May 17 00:30:39.088929 env[1216]: 2025-05-17 00:30:38.996 [INFO][3246] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="f10659a095b6207e25ad3f2ea8706faadc6cd96cea0f4c04f07a756f854db02e" iface="eth0" netns="/var/run/netns/cni-17ccc6fd-8aa7-0485-9030-f8d9de995547" May 17 00:30:39.088929 env[1216]: 2025-05-17 00:30:38.996 [INFO][3246] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="f10659a095b6207e25ad3f2ea8706faadc6cd96cea0f4c04f07a756f854db02e" iface="eth0" netns="/var/run/netns/cni-17ccc6fd-8aa7-0485-9030-f8d9de995547" May 17 00:30:39.088929 env[1216]: 2025-05-17 00:30:38.996 [INFO][3246] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="f10659a095b6207e25ad3f2ea8706faadc6cd96cea0f4c04f07a756f854db02e" iface="eth0" netns="/var/run/netns/cni-17ccc6fd-8aa7-0485-9030-f8d9de995547" May 17 00:30:39.088929 env[1216]: 2025-05-17 00:30:38.996 [INFO][3246] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="f10659a095b6207e25ad3f2ea8706faadc6cd96cea0f4c04f07a756f854db02e" May 17 00:30:39.088929 env[1216]: 2025-05-17 00:30:38.996 [INFO][3246] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f10659a095b6207e25ad3f2ea8706faadc6cd96cea0f4c04f07a756f854db02e" May 17 00:30:39.088929 env[1216]: 2025-05-17 00:30:39.068 [INFO][3259] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f10659a095b6207e25ad3f2ea8706faadc6cd96cea0f4c04f07a756f854db02e" HandleID="k8s-pod-network.f10659a095b6207e25ad3f2ea8706faadc6cd96cea0f4c04f07a756f854db02e" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-whisker--6fb67bf47d--pm895-eth0" May 17 00:30:39.088929 env[1216]: 2025-05-17 00:30:39.069 [INFO][3259] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:30:39.088929 env[1216]: 2025-05-17 00:30:39.069 [INFO][3259] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:30:39.088929 env[1216]: 2025-05-17 00:30:39.079 [WARNING][3259] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f10659a095b6207e25ad3f2ea8706faadc6cd96cea0f4c04f07a756f854db02e" HandleID="k8s-pod-network.f10659a095b6207e25ad3f2ea8706faadc6cd96cea0f4c04f07a756f854db02e" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-whisker--6fb67bf47d--pm895-eth0" May 17 00:30:39.088929 env[1216]: 2025-05-17 00:30:39.079 [INFO][3259] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f10659a095b6207e25ad3f2ea8706faadc6cd96cea0f4c04f07a756f854db02e" HandleID="k8s-pod-network.f10659a095b6207e25ad3f2ea8706faadc6cd96cea0f4c04f07a756f854db02e" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-whisker--6fb67bf47d--pm895-eth0" May 17 00:30:39.088929 env[1216]: 2025-05-17 00:30:39.082 [INFO][3259] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:30:39.088929 env[1216]: 2025-05-17 00:30:39.086 [INFO][3246] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="f10659a095b6207e25ad3f2ea8706faadc6cd96cea0f4c04f07a756f854db02e" May 17 00:30:39.089844 env[1216]: time="2025-05-17T00:30:39.089132190Z" level=info msg="TearDown network for sandbox \"f10659a095b6207e25ad3f2ea8706faadc6cd96cea0f4c04f07a756f854db02e\" successfully" May 17 00:30:39.089844 env[1216]: time="2025-05-17T00:30:39.089176502Z" level=info msg="StopPodSandbox for \"f10659a095b6207e25ad3f2ea8706faadc6cd96cea0f4c04f07a756f854db02e\" returns successfully" May 17 00:30:39.171460 kubelet[2047]: I0517 00:30:39.171296 2047 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"kube-api-access-wfvxw\" (UniqueName: \"kubernetes.io/projected/90286d94-9e77-440b-a3dd-07d53d8a4dc1-kube-api-access-wfvxw\") pod \"90286d94-9e77-440b-a3dd-07d53d8a4dc1\" (UID: \"90286d94-9e77-440b-a3dd-07d53d8a4dc1\") " May 17 00:30:39.171460 kubelet[2047]: I0517 00:30:39.171421 2047 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/90286d94-9e77-440b-a3dd-07d53d8a4dc1-whisker-ca-bundle\") pod \"90286d94-9e77-440b-a3dd-07d53d8a4dc1\" (UID: \"90286d94-9e77-440b-a3dd-07d53d8a4dc1\") " May 17 00:30:39.172312 kubelet[2047]: I0517 00:30:39.171482 2047 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/90286d94-9e77-440b-a3dd-07d53d8a4dc1-whisker-backend-key-pair\") pod \"90286d94-9e77-440b-a3dd-07d53d8a4dc1\" (UID: \"90286d94-9e77-440b-a3dd-07d53d8a4dc1\") " May 17 00:30:39.175096 kubelet[2047]: I0517 00:30:39.175045 2047 operation_generator.go:781] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/90286d94-9e77-440b-a3dd-07d53d8a4dc1-whisker-ca-bundle" (OuterVolumeSpecName: "whisker-ca-bundle") pod "90286d94-9e77-440b-a3dd-07d53d8a4dc1" (UID: "90286d94-9e77-440b-a3dd-07d53d8a4dc1"). InnerVolumeSpecName "whisker-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGIDValue "" May 17 00:30:39.181364 kubelet[2047]: I0517 00:30:39.179938 2047 operation_generator.go:781] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/90286d94-9e77-440b-a3dd-07d53d8a4dc1-kube-api-access-wfvxw" (OuterVolumeSpecName: "kube-api-access-wfvxw") pod "90286d94-9e77-440b-a3dd-07d53d8a4dc1" (UID: "90286d94-9e77-440b-a3dd-07d53d8a4dc1"). InnerVolumeSpecName "kube-api-access-wfvxw". PluginName "kubernetes.io/projected", VolumeGIDValue "" May 17 00:30:39.181842 kubelet[2047]: I0517 00:30:39.181794 2047 operation_generator.go:781] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/90286d94-9e77-440b-a3dd-07d53d8a4dc1-whisker-backend-key-pair" (OuterVolumeSpecName: "whisker-backend-key-pair") pod "90286d94-9e77-440b-a3dd-07d53d8a4dc1" (UID: "90286d94-9e77-440b-a3dd-07d53d8a4dc1"). InnerVolumeSpecName "whisker-backend-key-pair". PluginName "kubernetes.io/secret", VolumeGIDValue "" May 17 00:30:39.206577 systemd[1]: run-netns-cni\x2d17ccc6fd\x2d8aa7\x2d0485\x2d9030\x2df8d9de995547.mount: Deactivated successfully. May 17 00:30:39.206805 systemd[1]: var-lib-kubelet-pods-90286d94\x2d9e77\x2d440b\x2da3dd\x2d07d53d8a4dc1-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dwfvxw.mount: Deactivated successfully. May 17 00:30:39.206935 systemd[1]: var-lib-kubelet-pods-90286d94\x2d9e77\x2d440b\x2da3dd\x2d07d53d8a4dc1-volumes-kubernetes.io\x7esecret-whisker\x2dbackend\x2dkey\x2dpair.mount: Deactivated successfully. May 17 00:30:39.272427 kubelet[2047]: I0517 00:30:39.272370 2047 reconciler_common.go:299] "Volume detached for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/90286d94-9e77-440b-a3dd-07d53d8a4dc1-whisker-ca-bundle\") on node \"ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7\" DevicePath \"\"" May 17 00:30:39.272813 kubelet[2047]: I0517 00:30:39.272779 2047 reconciler_common.go:299] "Volume detached for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/90286d94-9e77-440b-a3dd-07d53d8a4dc1-whisker-backend-key-pair\") on node \"ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7\" DevicePath \"\"" May 17 00:30:39.273013 kubelet[2047]: I0517 00:30:39.272986 2047 reconciler_common.go:299] "Volume detached for volume \"kube-api-access-wfvxw\" (UniqueName: \"kubernetes.io/projected/90286d94-9e77-440b-a3dd-07d53d8a4dc1-kube-api-access-wfvxw\") on node \"ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7\" DevicePath \"\"" May 17 00:30:39.517772 systemd[1]: Removed slice kubepods-besteffort-pod90286d94_9e77_440b_a3dd_07d53d8a4dc1.slice. May 17 00:30:39.539865 kubelet[2047]: I0517 00:30:39.539791 2047 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-tvs9d" podStartSLOduration=2.200226265 podStartE2EDuration="20.539766968s" podCreationTimestamp="2025-05-17 00:30:19 +0000 UTC" firstStartedPulling="2025-05-17 00:30:19.916293443 +0000 UTC m=+25.205400323" lastFinishedPulling="2025-05-17 00:30:38.255834143 +0000 UTC m=+43.544941026" observedRunningTime="2025-05-17 00:30:39.539353349 +0000 UTC m=+44.828460241" watchObservedRunningTime="2025-05-17 00:30:39.539766968 +0000 UTC m=+44.828873859" May 17 00:30:39.610593 systemd[1]: Created slice kubepods-besteffort-poddc308654_0619_40ae_8a66_6809b61affb7.slice. May 17 00:30:39.634000 audit[1372]: AVC avc: denied { associate } for pid=1372 comm="google_accounts" name="#80" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=0 May 17 00:30:39.634000 audit[1372]: SYSCALL arch=c000003e syscall=83 success=no exit=-13 a0=7fdce5d547d0 a1=1ff a2=1ff a3=0 items=0 ppid=1317 pid=1372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts0 ses=4294967295 comm="google_accounts" exe="/usr/bin/python3.9" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:39.634000 audit: PROCTITLE proctitle=2F7573722F6C69622F707974686F6E2D657865632F707974686F6E332E392F707974686F6E33002F7573722F62696E2F676F6F676C655F6163636F756E74735F6461656D6F6E May 17 00:30:39.639827 google-accounts[1372]: ERROR Exception calling the response handler. [Errno 13] Permission denied: '/var/lib/google'. Traceback (most recent call last): File "/usr/lib/python3.9/site-packages/google_compute_engine/metadata_watcher.py", line 200, in WatchMetadata handler(response) File "/usr/lib/python3.9/site-packages/google_compute_engine/accounts/accounts_daemon.py", line 285, in HandleAccounts self.utils.SetConfiguredUsers(desired_users.keys()) File "/usr/lib/python3.9/site-packages/google_compute_engine/accounts/accounts_utils.py", line 324, in SetConfiguredUsers os.makedirs(self.google_users_dir) File "/usr/lib/python-exec/python3.9/../../../lib/python3.9/os.py", line 225, in makedirs mkdir(name, mode) PermissionError: [Errno 13] Permission denied: '/var/lib/google' May 17 00:30:39.676286 kubelet[2047]: I0517 00:30:39.676155 2047 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/dc308654-0619-40ae-8a66-6809b61affb7-whisker-ca-bundle\") pod \"whisker-797f4cd9d4-bwnvn\" (UID: \"dc308654-0619-40ae-8a66-6809b61affb7\") " pod="calico-system/whisker-797f4cd9d4-bwnvn" May 17 00:30:39.676642 kubelet[2047]: I0517 00:30:39.676612 2047 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-95dhb\" (UniqueName: \"kubernetes.io/projected/dc308654-0619-40ae-8a66-6809b61affb7-kube-api-access-95dhb\") pod \"whisker-797f4cd9d4-bwnvn\" (UID: \"dc308654-0619-40ae-8a66-6809b61affb7\") " pod="calico-system/whisker-797f4cd9d4-bwnvn" May 17 00:30:39.676939 kubelet[2047]: I0517 00:30:39.676913 2047 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/dc308654-0619-40ae-8a66-6809b61affb7-whisker-backend-key-pair\") pod \"whisker-797f4cd9d4-bwnvn\" (UID: \"dc308654-0619-40ae-8a66-6809b61affb7\") " pod="calico-system/whisker-797f4cd9d4-bwnvn" May 17 00:30:39.918492 env[1216]: time="2025-05-17T00:30:39.918425171Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-797f4cd9d4-bwnvn,Uid:dc308654-0619-40ae-8a66-6809b61affb7,Namespace:calico-system,Attempt:0,}" May 17 00:30:40.129873 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:30:40.140851 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali899d403468f: link becomes ready May 17 00:30:40.139200 systemd-networkd[1015]: cali899d403468f: Link UP May 17 00:30:40.139640 systemd-networkd[1015]: cali899d403468f: Gained carrier May 17 00:30:40.166854 env[1216]: 2025-05-17 00:30:39.987 [INFO][3281] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 17 00:30:40.166854 env[1216]: 2025-05-17 00:30:40.002 [INFO][3281] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-whisker--797f4cd9d4--bwnvn-eth0 whisker-797f4cd9d4- calico-system dc308654-0619-40ae-8a66-6809b61affb7 905 0 2025-05-17 00:30:39 +0000 UTC map[app.kubernetes.io/name:whisker k8s-app:whisker pod-template-hash:797f4cd9d4 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:whisker] map[] [] [] []} {k8s ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7 whisker-797f4cd9d4-bwnvn eth0 whisker [] [] [kns.calico-system ksa.calico-system.whisker] cali899d403468f [] [] }} ContainerID="1d5b2994a3545737e7b169172ab636ac1e776ca875fa1b938389aeb018f36cdd" Namespace="calico-system" Pod="whisker-797f4cd9d4-bwnvn" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-whisker--797f4cd9d4--bwnvn-" May 17 00:30:40.166854 env[1216]: 2025-05-17 00:30:40.002 [INFO][3281] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="1d5b2994a3545737e7b169172ab636ac1e776ca875fa1b938389aeb018f36cdd" Namespace="calico-system" Pod="whisker-797f4cd9d4-bwnvn" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-whisker--797f4cd9d4--bwnvn-eth0" May 17 00:30:40.166854 env[1216]: 2025-05-17 00:30:40.049 [INFO][3293] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="1d5b2994a3545737e7b169172ab636ac1e776ca875fa1b938389aeb018f36cdd" HandleID="k8s-pod-network.1d5b2994a3545737e7b169172ab636ac1e776ca875fa1b938389aeb018f36cdd" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-whisker--797f4cd9d4--bwnvn-eth0" May 17 00:30:40.166854 env[1216]: 2025-05-17 00:30:40.049 [INFO][3293] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="1d5b2994a3545737e7b169172ab636ac1e776ca875fa1b938389aeb018f36cdd" HandleID="k8s-pod-network.1d5b2994a3545737e7b169172ab636ac1e776ca875fa1b938389aeb018f36cdd" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-whisker--797f4cd9d4--bwnvn-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003324d0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7", "pod":"whisker-797f4cd9d4-bwnvn", "timestamp":"2025-05-17 00:30:40.049168084 +0000 UTC"}, Hostname:"ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:30:40.166854 env[1216]: 2025-05-17 00:30:40.049 [INFO][3293] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:30:40.166854 env[1216]: 2025-05-17 00:30:40.050 [INFO][3293] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:30:40.166854 env[1216]: 2025-05-17 00:30:40.050 [INFO][3293] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7' May 17 00:30:40.166854 env[1216]: 2025-05-17 00:30:40.061 [INFO][3293] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.1d5b2994a3545737e7b169172ab636ac1e776ca875fa1b938389aeb018f36cdd" host="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:30:40.166854 env[1216]: 2025-05-17 00:30:40.069 [INFO][3293] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:30:40.166854 env[1216]: 2025-05-17 00:30:40.078 [INFO][3293] ipam/ipam.go 511: Trying affinity for 192.168.71.192/26 host="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:30:40.166854 env[1216]: 2025-05-17 00:30:40.082 [INFO][3293] ipam/ipam.go 158: Attempting to load block cidr=192.168.71.192/26 host="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:30:40.166854 env[1216]: 2025-05-17 00:30:40.086 [INFO][3293] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.71.192/26 host="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:30:40.166854 env[1216]: 2025-05-17 00:30:40.086 [INFO][3293] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.71.192/26 handle="k8s-pod-network.1d5b2994a3545737e7b169172ab636ac1e776ca875fa1b938389aeb018f36cdd" host="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:30:40.166854 env[1216]: 2025-05-17 00:30:40.088 [INFO][3293] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.1d5b2994a3545737e7b169172ab636ac1e776ca875fa1b938389aeb018f36cdd May 17 00:30:40.166854 env[1216]: 2025-05-17 00:30:40.095 [INFO][3293] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.71.192/26 handle="k8s-pod-network.1d5b2994a3545737e7b169172ab636ac1e776ca875fa1b938389aeb018f36cdd" host="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:30:40.166854 env[1216]: 2025-05-17 00:30:40.104 [INFO][3293] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.71.193/26] block=192.168.71.192/26 handle="k8s-pod-network.1d5b2994a3545737e7b169172ab636ac1e776ca875fa1b938389aeb018f36cdd" host="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:30:40.166854 env[1216]: 2025-05-17 00:30:40.104 [INFO][3293] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.71.193/26] handle="k8s-pod-network.1d5b2994a3545737e7b169172ab636ac1e776ca875fa1b938389aeb018f36cdd" host="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:30:40.166854 env[1216]: 2025-05-17 00:30:40.104 [INFO][3293] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:30:40.166854 env[1216]: 2025-05-17 00:30:40.104 [INFO][3293] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.71.193/26] IPv6=[] ContainerID="1d5b2994a3545737e7b169172ab636ac1e776ca875fa1b938389aeb018f36cdd" HandleID="k8s-pod-network.1d5b2994a3545737e7b169172ab636ac1e776ca875fa1b938389aeb018f36cdd" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-whisker--797f4cd9d4--bwnvn-eth0" May 17 00:30:40.168303 env[1216]: 2025-05-17 00:30:40.108 [INFO][3281] cni-plugin/k8s.go 418: Populated endpoint ContainerID="1d5b2994a3545737e7b169172ab636ac1e776ca875fa1b938389aeb018f36cdd" Namespace="calico-system" Pod="whisker-797f4cd9d4-bwnvn" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-whisker--797f4cd9d4--bwnvn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-whisker--797f4cd9d4--bwnvn-eth0", GenerateName:"whisker-797f4cd9d4-", Namespace:"calico-system", SelfLink:"", UID:"dc308654-0619-40ae-8a66-6809b61affb7", ResourceVersion:"905", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 30, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"797f4cd9d4", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7", ContainerID:"", Pod:"whisker-797f4cd9d4-bwnvn", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.71.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"cali899d403468f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:30:40.168303 env[1216]: 2025-05-17 00:30:40.108 [INFO][3281] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.71.193/32] ContainerID="1d5b2994a3545737e7b169172ab636ac1e776ca875fa1b938389aeb018f36cdd" Namespace="calico-system" Pod="whisker-797f4cd9d4-bwnvn" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-whisker--797f4cd9d4--bwnvn-eth0" May 17 00:30:40.168303 env[1216]: 2025-05-17 00:30:40.108 [INFO][3281] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali899d403468f ContainerID="1d5b2994a3545737e7b169172ab636ac1e776ca875fa1b938389aeb018f36cdd" Namespace="calico-system" Pod="whisker-797f4cd9d4-bwnvn" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-whisker--797f4cd9d4--bwnvn-eth0" May 17 00:30:40.168303 env[1216]: 2025-05-17 00:30:40.145 [INFO][3281] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="1d5b2994a3545737e7b169172ab636ac1e776ca875fa1b938389aeb018f36cdd" Namespace="calico-system" Pod="whisker-797f4cd9d4-bwnvn" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-whisker--797f4cd9d4--bwnvn-eth0" May 17 00:30:40.168303 env[1216]: 2025-05-17 00:30:40.145 [INFO][3281] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="1d5b2994a3545737e7b169172ab636ac1e776ca875fa1b938389aeb018f36cdd" Namespace="calico-system" Pod="whisker-797f4cd9d4-bwnvn" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-whisker--797f4cd9d4--bwnvn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-whisker--797f4cd9d4--bwnvn-eth0", GenerateName:"whisker-797f4cd9d4-", Namespace:"calico-system", SelfLink:"", UID:"dc308654-0619-40ae-8a66-6809b61affb7", ResourceVersion:"905", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 30, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"797f4cd9d4", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7", ContainerID:"1d5b2994a3545737e7b169172ab636ac1e776ca875fa1b938389aeb018f36cdd", Pod:"whisker-797f4cd9d4-bwnvn", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.71.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"cali899d403468f", MAC:"16:56:84:16:0e:10", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:30:40.168303 env[1216]: 2025-05-17 00:30:40.162 [INFO][3281] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="1d5b2994a3545737e7b169172ab636ac1e776ca875fa1b938389aeb018f36cdd" Namespace="calico-system" Pod="whisker-797f4cd9d4-bwnvn" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-whisker--797f4cd9d4--bwnvn-eth0" May 17 00:30:40.190034 env[1216]: time="2025-05-17T00:30:40.187806834Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:30:40.190034 env[1216]: time="2025-05-17T00:30:40.187965564Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:30:40.190034 env[1216]: time="2025-05-17T00:30:40.188040374Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:30:40.190645 env[1216]: time="2025-05-17T00:30:40.190545454Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1d5b2994a3545737e7b169172ab636ac1e776ca875fa1b938389aeb018f36cdd pid=3315 runtime=io.containerd.runc.v2 May 17 00:30:40.234929 systemd[1]: run-containerd-runc-k8s.io-1d5b2994a3545737e7b169172ab636ac1e776ca875fa1b938389aeb018f36cdd-runc.w7qZJk.mount: Deactivated successfully. May 17 00:30:40.247070 systemd[1]: Started cri-containerd-1d5b2994a3545737e7b169172ab636ac1e776ca875fa1b938389aeb018f36cdd.scope. May 17 00:30:40.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:40.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:40.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:40.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:40.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:40.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:40.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:40.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:40.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:40.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:40.266000 audit: BPF prog-id=142 op=LOAD May 17 00:30:40.267000 audit[3325]: AVC avc: denied { bpf } for pid=3325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:40.267000 audit[3325]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=3315 pid=3325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:40.267000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164356232393934613335343537333765376231363931373261623633 May 17 00:30:40.267000 audit[3325]: AVC avc: denied { perfmon } for pid=3325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:40.267000 audit[3325]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=3315 pid=3325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:40.267000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164356232393934613335343537333765376231363931373261623633 May 17 00:30:40.267000 audit[3325]: AVC avc: denied { bpf } for pid=3325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:40.267000 audit[3325]: AVC avc: denied { bpf } for pid=3325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:40.267000 audit[3325]: AVC avc: denied { bpf } for pid=3325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:40.267000 audit[3325]: AVC avc: denied { perfmon } for pid=3325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:40.267000 audit[3325]: AVC avc: denied { perfmon } for pid=3325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:40.267000 audit[3325]: AVC avc: denied { perfmon } for pid=3325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:40.267000 audit[3325]: AVC avc: denied { perfmon } for pid=3325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:40.267000 audit[3325]: AVC avc: denied { perfmon } for pid=3325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:40.267000 audit[3325]: AVC avc: denied { bpf } for pid=3325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:40.267000 audit[3325]: AVC avc: denied { bpf } for pid=3325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:40.267000 audit: BPF prog-id=143 op=LOAD May 17 00:30:40.267000 audit[3325]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0003e81c0 items=0 ppid=3315 pid=3325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:40.267000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164356232393934613335343537333765376231363931373261623633 May 17 00:30:40.267000 audit[3325]: AVC avc: denied { bpf } for pid=3325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:40.267000 audit[3325]: AVC avc: denied { bpf } for pid=3325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:40.267000 audit[3325]: AVC avc: denied { perfmon } for pid=3325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:40.267000 audit[3325]: AVC avc: denied { perfmon } for pid=3325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:40.267000 audit[3325]: AVC avc: denied { perfmon } for pid=3325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:40.267000 audit[3325]: AVC avc: denied { perfmon } for pid=3325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:40.267000 audit[3325]: AVC avc: denied { perfmon } for pid=3325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:40.267000 audit[3325]: AVC avc: denied { bpf } for pid=3325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:40.267000 audit[3325]: AVC avc: denied { bpf } for pid=3325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:40.267000 audit: BPF prog-id=144 op=LOAD May 17 00:30:40.267000 audit[3325]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0003e8208 items=0 ppid=3315 pid=3325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:40.267000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164356232393934613335343537333765376231363931373261623633 May 17 00:30:40.267000 audit: BPF prog-id=144 op=UNLOAD May 17 00:30:40.267000 audit: BPF prog-id=143 op=UNLOAD May 17 00:30:40.267000 audit[3325]: AVC avc: denied { bpf } for pid=3325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:40.267000 audit[3325]: AVC avc: denied { bpf } for pid=3325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:40.267000 audit[3325]: AVC avc: denied { bpf } for pid=3325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:40.267000 audit[3325]: AVC avc: denied { perfmon } for pid=3325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:40.267000 audit[3325]: AVC avc: denied { perfmon } for pid=3325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:40.267000 audit[3325]: AVC avc: denied { perfmon } for pid=3325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:40.267000 audit[3325]: AVC avc: denied { perfmon } for pid=3325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:40.267000 audit[3325]: AVC avc: denied { perfmon } for pid=3325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:40.267000 audit[3325]: AVC avc: denied { bpf } for pid=3325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:40.267000 audit[3325]: AVC avc: denied { bpf } for pid=3325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:40.267000 audit: BPF prog-id=145 op=LOAD May 17 00:30:40.267000 audit[3325]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0003e8618 items=0 ppid=3315 pid=3325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:40.267000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164356232393934613335343537333765376231363931373261623633 May 17 00:30:40.321061 env[1216]: time="2025-05-17T00:30:40.320989452Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-797f4cd9d4-bwnvn,Uid:dc308654-0619-40ae-8a66-6809b61affb7,Namespace:calico-system,Attempt:0,} returns sandbox id \"1d5b2994a3545737e7b169172ab636ac1e776ca875fa1b938389aeb018f36cdd\"" May 17 00:30:40.324041 env[1216]: time="2025-05-17T00:30:40.323988164Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\"" May 17 00:30:40.408000 audit[3393]: AVC avc: denied { write } for pid=3393 comm="tee" name="fd" dev="proc" ino=24131 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:30:40.408000 audit[3393]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc7693579d a2=241 a3=1b6 items=1 ppid=3353 pid=3393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:40.408000 audit: CWD cwd="/etc/service/enabled/cni/log" May 17 00:30:40.408000 audit: PATH item=0 name="/dev/fd/63" inode=25072 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:30:40.408000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:30:40.428000 audit[3413]: AVC avc: denied { write } for pid=3413 comm="tee" name="fd" dev="proc" ino=24137 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:30:40.428000 audit[3413]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcfd0a979b a2=241 a3=1b6 items=1 ppid=3364 pid=3413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:40.428000 audit: CWD cwd="/etc/service/enabled/felix/log" May 17 00:30:40.428000 audit: PATH item=0 name="/dev/fd/63" inode=25094 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:30:40.428000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:30:40.448591 env[1216]: time="2025-05-17T00:30:40.448411125Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:30:40.452119 env[1216]: time="2025-05-17T00:30:40.450771564Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:30:40.452316 kubelet[2047]: E0517 00:30:40.451114 2047 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:30:40.452316 kubelet[2047]: E0517 00:30:40.451221 2047 kuberuntime_image.go:42] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:30:40.453064 kubelet[2047]: E0517 00:30:40.451432 2047 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.0,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:e1697e16bd03489ca69cfcf2cef8e19e,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-95dhb,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-797f4cd9d4-bwnvn_calico-system(dc308654-0619-40ae-8a66-6809b61affb7): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:30:40.454127 env[1216]: time="2025-05-17T00:30:40.454078843Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\"" May 17 00:30:40.459000 audit[3408]: AVC avc: denied { write } for pid=3408 comm="tee" name="fd" dev="proc" ino=24145 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:30:40.459000 audit[3408]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffeeb36279b a2=241 a3=1b6 items=1 ppid=3360 pid=3408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:40.459000 audit: CWD cwd="/etc/service/enabled/confd/log" May 17 00:30:40.459000 audit: PATH item=0 name="/dev/fd/63" inode=25091 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:30:40.459000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:30:40.475000 audit[3415]: AVC avc: denied { write } for pid=3415 comm="tee" name="fd" dev="proc" ino=25101 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:30:40.475000 audit[3415]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd4974379b a2=241 a3=1b6 items=1 ppid=3369 pid=3415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:40.475000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 17 00:30:40.475000 audit: PATH item=0 name="/dev/fd/63" inode=24141 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:30:40.475000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:30:40.528000 audit[3434]: AVC avc: denied { write } for pid=3434 comm="tee" name="fd" dev="proc" ino=25114 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:30:40.528000 audit[3434]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffefb56578b a2=241 a3=1b6 items=1 ppid=3374 pid=3434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:40.528000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 17 00:30:40.528000 audit: PATH item=0 name="/dev/fd/63" inode=25107 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:30:40.528000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:30:40.530000 audit[3431]: AVC avc: denied { write } for pid=3431 comm="tee" name="fd" dev="proc" ino=24149 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:30:40.530000 audit[3431]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe5e52e78c a2=241 a3=1b6 items=1 ppid=3366 pid=3431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:40.530000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 17 00:30:40.530000 audit: PATH item=0 name="/dev/fd/63" inode=25104 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:30:40.530000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:30:40.537000 audit[3438]: AVC avc: denied { write } for pid=3438 comm="tee" name="fd" dev="proc" ino=24153 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:30:40.537000 audit[3438]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe64c4579c a2=241 a3=1b6 items=1 ppid=3373 pid=3438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:40.537000 audit: CWD cwd="/etc/service/enabled/bird/log" May 17 00:30:40.537000 audit: PATH item=0 name="/dev/fd/63" inode=25111 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:30:40.537000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:30:40.575368 env[1216]: time="2025-05-17T00:30:40.575274683Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:30:40.577379 env[1216]: time="2025-05-17T00:30:40.577307686Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:30:40.578519 kubelet[2047]: E0517 00:30:40.577874 2047 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:30:40.578519 kubelet[2047]: E0517 00:30:40.577949 2047 kuberuntime_image.go:42] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:30:40.578790 kubelet[2047]: E0517 00:30:40.578122 2047 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-95dhb,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-797f4cd9d4-bwnvn_calico-system(dc308654-0619-40ae-8a66-6809b61affb7): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:30:40.579796 kubelet[2047]: E0517 00:30:40.579669 2047 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-797f4cd9d4-bwnvn" podUID="dc308654-0619-40ae-8a66-6809b61affb7" May 17 00:30:41.005000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.005000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.005000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.005000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.005000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.005000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.005000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.005000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.005000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.005000 audit: BPF prog-id=146 op=LOAD May 17 00:30:41.005000 audit[3471]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd1086e990 a2=98 a3=3 items=0 ppid=3365 pid=3471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:41.005000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:30:41.005000 audit: BPF prog-id=146 op=UNLOAD May 17 00:30:41.006000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.006000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.006000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.006000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.006000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.006000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.006000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.006000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.006000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.006000 audit: BPF prog-id=147 op=LOAD May 17 00:30:41.006000 audit[3471]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd1086e780 a2=94 a3=54428f items=0 ppid=3365 pid=3471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:41.006000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:30:41.006000 audit: BPF prog-id=147 op=UNLOAD May 17 00:30:41.006000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.006000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.006000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.006000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.006000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.006000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.006000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.006000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.006000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.006000 audit: BPF prog-id=148 op=LOAD May 17 00:30:41.006000 audit[3471]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd1086e7b0 a2=94 a3=2 items=0 ppid=3365 pid=3471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:41.006000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:30:41.006000 audit: BPF prog-id=148 op=UNLOAD May 17 00:30:41.064680 kubelet[2047]: I0517 00:30:41.064350 2047 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="90286d94-9e77-440b-a3dd-07d53d8a4dc1" path="/var/lib/kubelet/pods/90286d94-9e77-440b-a3dd-07d53d8a4dc1/volumes" May 17 00:30:41.157000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.157000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.157000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.157000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.157000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.157000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.157000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.157000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.157000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.157000 audit: BPF prog-id=149 op=LOAD May 17 00:30:41.157000 audit[3471]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd1086e670 a2=94 a3=1 items=0 ppid=3365 pid=3471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:41.157000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:30:41.158000 audit: BPF prog-id=149 op=UNLOAD May 17 00:30:41.158000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.158000 audit[3471]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd1086e740 a2=50 a3=7ffd1086e820 items=0 ppid=3365 pid=3471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:41.158000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:30:41.171000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.171000 audit[3471]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd1086e680 a2=28 a3=0 items=0 ppid=3365 pid=3471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:41.171000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:30:41.171000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.171000 audit[3471]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd1086e6b0 a2=28 a3=0 items=0 ppid=3365 pid=3471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:41.171000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:30:41.171000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.171000 audit[3471]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd1086e5c0 a2=28 a3=0 items=0 ppid=3365 pid=3471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:41.171000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:30:41.171000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.171000 audit[3471]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd1086e6d0 a2=28 a3=0 items=0 ppid=3365 pid=3471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:41.171000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:30:41.171000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.171000 audit[3471]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd1086e6b0 a2=28 a3=0 items=0 ppid=3365 pid=3471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:41.171000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:30:41.171000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.171000 audit[3471]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd1086e6a0 a2=28 a3=0 items=0 ppid=3365 pid=3471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:41.171000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:30:41.171000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.171000 audit[3471]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd1086e6d0 a2=28 a3=0 items=0 ppid=3365 pid=3471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:41.171000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:30:41.171000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.171000 audit[3471]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd1086e6b0 a2=28 a3=0 items=0 ppid=3365 pid=3471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:41.171000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:30:41.171000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.171000 audit[3471]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd1086e6d0 a2=28 a3=0 items=0 ppid=3365 pid=3471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:41.171000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:30:41.171000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.171000 audit[3471]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd1086e6a0 a2=28 a3=0 items=0 ppid=3365 pid=3471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:41.171000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:30:41.171000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.171000 audit[3471]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd1086e710 a2=28 a3=0 items=0 ppid=3365 pid=3471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:41.171000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:30:41.172000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.172000 audit[3471]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd1086e4c0 a2=50 a3=1 items=0 ppid=3365 pid=3471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:41.172000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:30:41.172000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.172000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.172000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.172000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.172000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.172000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.172000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.172000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.172000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.172000 audit: BPF prog-id=150 op=LOAD May 17 00:30:41.172000 audit[3471]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd1086e4c0 a2=94 a3=5 items=0 ppid=3365 pid=3471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:41.172000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:30:41.172000 audit: BPF prog-id=150 op=UNLOAD May 17 00:30:41.172000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.172000 audit[3471]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd1086e570 a2=50 a3=1 items=0 ppid=3365 pid=3471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:41.172000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:30:41.172000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.172000 audit[3471]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffd1086e690 a2=4 a3=38 items=0 ppid=3365 pid=3471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:41.172000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:30:41.172000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.172000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.172000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.172000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.172000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.172000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.172000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.172000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.172000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.172000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.172000 audit[3471]: AVC avc: denied { confidentiality } for pid=3471 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:30:41.172000 audit[3471]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd1086e6e0 a2=94 a3=6 items=0 ppid=3365 pid=3471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:41.172000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:30:41.172000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.172000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.172000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.172000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.172000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.172000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.172000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.172000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.172000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.172000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.172000 audit[3471]: AVC avc: denied { confidentiality } for pid=3471 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:30:41.172000 audit[3471]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd1086de90 a2=94 a3=88 items=0 ppid=3365 pid=3471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:41.172000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:30:41.173000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.173000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.173000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.173000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.173000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.173000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.173000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.173000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.173000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.173000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.173000 audit[3471]: AVC avc: denied { confidentiality } for pid=3471 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:30:41.173000 audit[3471]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd1086de90 a2=94 a3=88 items=0 ppid=3365 pid=3471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:41.173000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:30:41.187000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.187000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.187000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.187000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.187000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.187000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.187000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.187000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.187000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.187000 audit: BPF prog-id=151 op=LOAD May 17 00:30:41.187000 audit[3474]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffee05dd010 a2=98 a3=1999999999999999 items=0 ppid=3365 pid=3474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:41.187000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 00:30:41.188000 audit: BPF prog-id=151 op=UNLOAD May 17 00:30:41.188000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.188000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.188000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.188000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.188000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.188000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.188000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.188000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.188000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.188000 audit: BPF prog-id=152 op=LOAD May 17 00:30:41.188000 audit[3474]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffee05dcef0 a2=94 a3=ffff items=0 ppid=3365 pid=3474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:41.188000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 00:30:41.188000 audit: BPF prog-id=152 op=UNLOAD May 17 00:30:41.188000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.188000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.188000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.188000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.188000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.188000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.188000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.188000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.188000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.188000 audit: BPF prog-id=153 op=LOAD May 17 00:30:41.188000 audit[3474]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffee05dcf30 a2=94 a3=7ffee05dd110 items=0 ppid=3365 pid=3474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:41.188000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 00:30:41.188000 audit: BPF prog-id=153 op=UNLOAD May 17 00:30:41.300137 systemd-networkd[1015]: vxlan.calico: Link UP May 17 00:30:41.300150 systemd-networkd[1015]: vxlan.calico: Gained carrier May 17 00:30:41.351000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.351000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.351000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.351000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.351000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.351000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.351000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.351000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.351000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.351000 audit: BPF prog-id=154 op=LOAD May 17 00:30:41.351000 audit[3500]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc59788380 a2=98 a3=0 items=0 ppid=3365 pid=3500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:41.351000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:30:41.351000 audit: BPF prog-id=154 op=UNLOAD May 17 00:30:41.352000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.352000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.352000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.352000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.352000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.352000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.352000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.352000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.352000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.352000 audit: BPF prog-id=155 op=LOAD May 17 00:30:41.352000 audit[3500]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc59788190 a2=94 a3=54428f items=0 ppid=3365 pid=3500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:41.352000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:30:41.352000 audit: BPF prog-id=155 op=UNLOAD May 17 00:30:41.352000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.352000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.352000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.352000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.352000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.352000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.352000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.352000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.352000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.352000 audit: BPF prog-id=156 op=LOAD May 17 00:30:41.352000 audit[3500]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc597881c0 a2=94 a3=2 items=0 ppid=3365 pid=3500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:41.352000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:30:41.352000 audit: BPF prog-id=156 op=UNLOAD May 17 00:30:41.352000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.352000 audit[3500]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc59788090 a2=28 a3=0 items=0 ppid=3365 pid=3500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:41.352000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:30:41.352000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.352000 audit[3500]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc597880c0 a2=28 a3=0 items=0 ppid=3365 pid=3500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:41.352000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:30:41.352000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.352000 audit[3500]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc59787fd0 a2=28 a3=0 items=0 ppid=3365 pid=3500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:41.352000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:30:41.352000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.352000 audit[3500]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc597880e0 a2=28 a3=0 items=0 ppid=3365 pid=3500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:41.352000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:30:41.352000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.352000 audit[3500]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc597880c0 a2=28 a3=0 items=0 ppid=3365 pid=3500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:41.352000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:30:41.352000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.352000 audit[3500]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc597880b0 a2=28 a3=0 items=0 ppid=3365 pid=3500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:41.352000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:30:41.352000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.352000 audit[3500]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc597880e0 a2=28 a3=0 items=0 ppid=3365 pid=3500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:41.352000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:30:41.352000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.352000 audit[3500]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc597880c0 a2=28 a3=0 items=0 ppid=3365 pid=3500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:41.352000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:30:41.352000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.352000 audit[3500]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc597880e0 a2=28 a3=0 items=0 ppid=3365 pid=3500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:41.352000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:30:41.352000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.352000 audit[3500]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc597880b0 a2=28 a3=0 items=0 ppid=3365 pid=3500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:41.352000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:30:41.352000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.352000 audit[3500]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc59788120 a2=28 a3=0 items=0 ppid=3365 pid=3500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:41.352000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:30:41.352000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.352000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.352000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.352000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.352000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.352000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.352000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.352000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.352000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.352000 audit: BPF prog-id=157 op=LOAD May 17 00:30:41.352000 audit[3500]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc59787f90 a2=94 a3=0 items=0 ppid=3365 pid=3500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:41.352000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:30:41.352000 audit: BPF prog-id=157 op=UNLOAD May 17 00:30:41.354000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.354000 audit[3500]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffc59787f80 a2=50 a3=2800 items=0 ppid=3365 pid=3500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:41.354000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:30:41.354000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.354000 audit[3500]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffc59787f80 a2=50 a3=2800 items=0 ppid=3365 pid=3500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:41.354000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:30:41.354000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.354000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.354000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.354000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.354000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.354000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.354000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.354000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.354000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.354000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.354000 audit: BPF prog-id=158 op=LOAD May 17 00:30:41.354000 audit[3500]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc597877a0 a2=94 a3=2 items=0 ppid=3365 pid=3500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:41.354000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:30:41.354000 audit: BPF prog-id=158 op=UNLOAD May 17 00:30:41.354000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.354000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.354000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.354000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.354000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.354000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.354000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.354000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.354000 audit: BPF prog-id=159 op=LOAD May 17 00:30:41.354000 audit[3500]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc597878a0 a2=94 a3=30 items=0 ppid=3365 pid=3500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:41.354000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:30:41.374000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.374000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.374000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.374000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.374000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.374000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.374000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.374000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.374000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.374000 audit: BPF prog-id=160 op=LOAD May 17 00:30:41.374000 audit[3503]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd402450b0 a2=98 a3=0 items=0 ppid=3365 pid=3503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:41.374000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:30:41.378000 audit: BPF prog-id=160 op=UNLOAD May 17 00:30:41.384000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.384000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.384000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.384000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.384000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.384000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.384000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.384000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.384000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.384000 audit: BPF prog-id=161 op=LOAD May 17 00:30:41.384000 audit[3503]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd40244ea0 a2=94 a3=54428f items=0 ppid=3365 pid=3503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:41.384000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:30:41.384000 audit: BPF prog-id=161 op=UNLOAD May 17 00:30:41.384000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.384000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.384000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.384000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.384000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.384000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.384000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.384000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.384000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.384000 audit: BPF prog-id=162 op=LOAD May 17 00:30:41.384000 audit[3503]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd40244ed0 a2=94 a3=2 items=0 ppid=3365 pid=3503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:41.384000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:30:41.384000 audit: BPF prog-id=162 op=UNLOAD May 17 00:30:41.525525 kubelet[2047]: E0517 00:30:41.525415 2047 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-797f4cd9d4-bwnvn" podUID="dc308654-0619-40ae-8a66-6809b61affb7" May 17 00:30:41.547000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.547000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.547000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.547000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.547000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.547000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.547000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.547000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.547000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.547000 audit: BPF prog-id=163 op=LOAD May 17 00:30:41.547000 audit[3503]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd40244d90 a2=94 a3=1 items=0 ppid=3365 pid=3503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:41.547000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:30:41.550000 audit: BPF prog-id=163 op=UNLOAD May 17 00:30:41.550000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.550000 audit[3503]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd40244e60 a2=50 a3=7ffd40244f40 items=0 ppid=3365 pid=3503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:41.550000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:30:41.580000 audit[3509]: NETFILTER_CFG table=filter:101 family=2 entries=20 op=nft_register_rule pid=3509 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:30:41.580000 audit[3509]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffcb98210a0 a2=0 a3=7ffcb982108c items=0 ppid=2176 pid=3509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:41.580000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:30:41.582000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.582000 audit[3503]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd40244da0 a2=28 a3=0 items=0 ppid=3365 pid=3503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:41.582000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:30:41.583000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.583000 audit[3503]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd40244dd0 a2=28 a3=0 items=0 ppid=3365 pid=3503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:41.583000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:30:41.583000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.583000 audit[3503]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd40244ce0 a2=28 a3=0 items=0 ppid=3365 pid=3503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:41.583000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:30:41.583000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.583000 audit[3503]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd40244df0 a2=28 a3=0 items=0 ppid=3365 pid=3503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:41.583000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:30:41.583000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.583000 audit[3503]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd40244dd0 a2=28 a3=0 items=0 ppid=3365 pid=3503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:41.583000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:30:41.583000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.583000 audit[3503]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd40244dc0 a2=28 a3=0 items=0 ppid=3365 pid=3503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:41.583000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:30:41.583000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.583000 audit[3503]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd40244df0 a2=28 a3=0 items=0 ppid=3365 pid=3503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:41.583000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:30:41.583000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.583000 audit[3503]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd40244dd0 a2=28 a3=0 items=0 ppid=3365 pid=3503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:41.583000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:30:41.583000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.583000 audit[3503]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd40244df0 a2=28 a3=0 items=0 ppid=3365 pid=3503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:41.583000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:30:41.583000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.583000 audit[3503]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd40244dc0 a2=28 a3=0 items=0 ppid=3365 pid=3503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:41.583000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:30:41.583000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.583000 audit[3503]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd40244e30 a2=28 a3=0 items=0 ppid=3365 pid=3503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:41.583000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:30:41.583000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.583000 audit[3503]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd40244be0 a2=50 a3=1 items=0 ppid=3365 pid=3503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:41.583000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:30:41.583000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.583000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.583000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.583000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.583000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.583000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.583000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.583000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.583000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.583000 audit: BPF prog-id=164 op=LOAD May 17 00:30:41.583000 audit[3503]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd40244be0 a2=94 a3=5 items=0 ppid=3365 pid=3503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:41.583000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:30:41.583000 audit: BPF prog-id=164 op=UNLOAD May 17 00:30:41.583000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.583000 audit[3503]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd40244c90 a2=50 a3=1 items=0 ppid=3365 pid=3503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:41.583000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:30:41.583000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.583000 audit[3503]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffd40244db0 a2=4 a3=38 items=0 ppid=3365 pid=3503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:41.583000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:30:41.583000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.583000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.583000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.583000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.583000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.583000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.583000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.583000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.583000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.583000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.583000 audit[3503]: AVC avc: denied { confidentiality } for pid=3503 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:30:41.583000 audit[3503]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd40244e00 a2=94 a3=6 items=0 ppid=3365 pid=3503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:41.583000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:30:41.584000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.584000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.584000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.584000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.584000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.584000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.584000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.584000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.584000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.584000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.584000 audit[3503]: AVC avc: denied { confidentiality } for pid=3503 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:30:41.584000 audit[3503]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd402445b0 a2=94 a3=88 items=0 ppid=3365 pid=3503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:41.584000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:30:41.584000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.584000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.584000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.584000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.584000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.584000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.584000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.584000 audit[3503]: AVC avc: denied { confidentiality } for pid=3503 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:30:41.584000 audit[3503]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd402445b0 a2=94 a3=88 items=0 ppid=3365 pid=3503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:41.584000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:30:41.585000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.585000 audit[3503]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd40245fe0 a2=10 a3=f8f00800 items=0 ppid=3365 pid=3503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:41.585000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:30:41.585000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.585000 audit[3503]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd40245e80 a2=10 a3=3 items=0 ppid=3365 pid=3503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:41.585000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:30:41.585000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.585000 audit[3503]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd40245e20 a2=10 a3=3 items=0 ppid=3365 pid=3503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:41.585000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:30:41.585000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:41.585000 audit[3503]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd40245e20 a2=10 a3=7 items=0 ppid=3365 pid=3503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:41.585000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:30:41.587000 audit[3509]: NETFILTER_CFG table=nat:102 family=2 entries=14 op=nft_register_rule pid=3509 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:30:41.587000 audit[3509]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffcb98210a0 a2=0 a3=0 items=0 ppid=2176 pid=3509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:41.587000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:30:41.597000 audit: BPF prog-id=159 op=UNLOAD May 17 00:30:41.726000 audit[3531]: NETFILTER_CFG table=nat:103 family=2 entries=15 op=nft_register_chain pid=3531 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:30:41.726000 audit[3531]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffd5f65f2f0 a2=0 a3=7ffd5f65f2dc items=0 ppid=3365 pid=3531 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:41.726000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:30:41.731000 audit[3534]: NETFILTER_CFG table=mangle:104 family=2 entries=16 op=nft_register_chain pid=3534 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:30:41.731000 audit[3534]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffe40160c70 a2=0 a3=7ffe40160c5c items=0 ppid=3365 pid=3534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:41.731000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:30:41.752000 audit[3533]: NETFILTER_CFG table=raw:105 family=2 entries=21 op=nft_register_chain pid=3533 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:30:41.752000 audit[3533]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7fffb8024c50 a2=0 a3=7fffb8024c3c items=0 ppid=3365 pid=3533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:41.752000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:30:41.754000 audit[3532]: NETFILTER_CFG table=filter:106 family=2 entries=94 op=nft_register_chain pid=3532 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:30:41.754000 audit[3532]: SYSCALL arch=c000003e syscall=46 success=yes exit=53116 a0=3 a1=7ffea8b4f350 a2=0 a3=7ffea8b4f33c items=0 ppid=3365 pid=3532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:41.754000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:30:41.985010 systemd-networkd[1015]: cali899d403468f: Gained IPv6LL May 17 00:30:42.881080 systemd-networkd[1015]: vxlan.calico: Gained IPv6LL May 17 00:30:43.061333 env[1216]: time="2025-05-17T00:30:43.061269263Z" level=info msg="StopPodSandbox for \"38b9f7870f314bc8c74101a725e7fab52d045d1b5a1c684e98888a801f12cdcc\"" May 17 00:30:43.065681 env[1216]: time="2025-05-17T00:30:43.065617519Z" level=info msg="StopPodSandbox for \"27c945ac2d9f584fea12b7af3fa670be33c7236b3045500b3920493d6ce27c9a\"" May 17 00:30:43.260412 env[1216]: 2025-05-17 00:30:43.160 [INFO][3570] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="27c945ac2d9f584fea12b7af3fa670be33c7236b3045500b3920493d6ce27c9a" May 17 00:30:43.260412 env[1216]: 2025-05-17 00:30:43.160 [INFO][3570] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="27c945ac2d9f584fea12b7af3fa670be33c7236b3045500b3920493d6ce27c9a" iface="eth0" netns="/var/run/netns/cni-0b139e3b-419a-7e0d-a7c5-94c7b057a23b" May 17 00:30:43.260412 env[1216]: 2025-05-17 00:30:43.160 [INFO][3570] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="27c945ac2d9f584fea12b7af3fa670be33c7236b3045500b3920493d6ce27c9a" iface="eth0" netns="/var/run/netns/cni-0b139e3b-419a-7e0d-a7c5-94c7b057a23b" May 17 00:30:43.260412 env[1216]: 2025-05-17 00:30:43.161 [INFO][3570] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="27c945ac2d9f584fea12b7af3fa670be33c7236b3045500b3920493d6ce27c9a" iface="eth0" netns="/var/run/netns/cni-0b139e3b-419a-7e0d-a7c5-94c7b057a23b" May 17 00:30:43.260412 env[1216]: 2025-05-17 00:30:43.161 [INFO][3570] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="27c945ac2d9f584fea12b7af3fa670be33c7236b3045500b3920493d6ce27c9a" May 17 00:30:43.260412 env[1216]: 2025-05-17 00:30:43.161 [INFO][3570] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="27c945ac2d9f584fea12b7af3fa670be33c7236b3045500b3920493d6ce27c9a" May 17 00:30:43.260412 env[1216]: 2025-05-17 00:30:43.234 [INFO][3583] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="27c945ac2d9f584fea12b7af3fa670be33c7236b3045500b3920493d6ce27c9a" HandleID="k8s-pod-network.27c945ac2d9f584fea12b7af3fa670be33c7236b3045500b3920493d6ce27c9a" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-calico--apiserver--5544b97fc--ncc4j-eth0" May 17 00:30:43.260412 env[1216]: 2025-05-17 00:30:43.235 [INFO][3583] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:30:43.260412 env[1216]: 2025-05-17 00:30:43.236 [INFO][3583] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:30:43.260412 env[1216]: 2025-05-17 00:30:43.248 [WARNING][3583] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="27c945ac2d9f584fea12b7af3fa670be33c7236b3045500b3920493d6ce27c9a" HandleID="k8s-pod-network.27c945ac2d9f584fea12b7af3fa670be33c7236b3045500b3920493d6ce27c9a" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-calico--apiserver--5544b97fc--ncc4j-eth0" May 17 00:30:43.260412 env[1216]: 2025-05-17 00:30:43.248 [INFO][3583] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="27c945ac2d9f584fea12b7af3fa670be33c7236b3045500b3920493d6ce27c9a" HandleID="k8s-pod-network.27c945ac2d9f584fea12b7af3fa670be33c7236b3045500b3920493d6ce27c9a" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-calico--apiserver--5544b97fc--ncc4j-eth0" May 17 00:30:43.260412 env[1216]: 2025-05-17 00:30:43.250 [INFO][3583] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:30:43.260412 env[1216]: 2025-05-17 00:30:43.257 [INFO][3570] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="27c945ac2d9f584fea12b7af3fa670be33c7236b3045500b3920493d6ce27c9a" May 17 00:30:43.261764 env[1216]: time="2025-05-17T00:30:43.261668983Z" level=info msg="TearDown network for sandbox \"27c945ac2d9f584fea12b7af3fa670be33c7236b3045500b3920493d6ce27c9a\" successfully" May 17 00:30:43.262709 env[1216]: time="2025-05-17T00:30:43.262641394Z" level=info msg="StopPodSandbox for \"27c945ac2d9f584fea12b7af3fa670be33c7236b3045500b3920493d6ce27c9a\" returns successfully" May 17 00:30:43.268898 systemd[1]: run-netns-cni\x2d0b139e3b\x2d419a\x2d7e0d\x2da7c5\x2d94c7b057a23b.mount: Deactivated successfully. May 17 00:30:43.270669 env[1216]: time="2025-05-17T00:30:43.270600119Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5544b97fc-ncc4j,Uid:906ab3b1-343a-409d-8e38-3de2ad671165,Namespace:calico-apiserver,Attempt:1,}" May 17 00:30:43.280044 env[1216]: 2025-05-17 00:30:43.169 [INFO][3569] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="38b9f7870f314bc8c74101a725e7fab52d045d1b5a1c684e98888a801f12cdcc" May 17 00:30:43.280044 env[1216]: 2025-05-17 00:30:43.169 [INFO][3569] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="38b9f7870f314bc8c74101a725e7fab52d045d1b5a1c684e98888a801f12cdcc" iface="eth0" netns="/var/run/netns/cni-dd50e1e9-6b5e-3fad-ee1f-4a359bd3cf0c" May 17 00:30:43.280044 env[1216]: 2025-05-17 00:30:43.169 [INFO][3569] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="38b9f7870f314bc8c74101a725e7fab52d045d1b5a1c684e98888a801f12cdcc" iface="eth0" netns="/var/run/netns/cni-dd50e1e9-6b5e-3fad-ee1f-4a359bd3cf0c" May 17 00:30:43.280044 env[1216]: 2025-05-17 00:30:43.170 [INFO][3569] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="38b9f7870f314bc8c74101a725e7fab52d045d1b5a1c684e98888a801f12cdcc" iface="eth0" netns="/var/run/netns/cni-dd50e1e9-6b5e-3fad-ee1f-4a359bd3cf0c" May 17 00:30:43.280044 env[1216]: 2025-05-17 00:30:43.170 [INFO][3569] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="38b9f7870f314bc8c74101a725e7fab52d045d1b5a1c684e98888a801f12cdcc" May 17 00:30:43.280044 env[1216]: 2025-05-17 00:30:43.170 [INFO][3569] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="38b9f7870f314bc8c74101a725e7fab52d045d1b5a1c684e98888a801f12cdcc" May 17 00:30:43.280044 env[1216]: 2025-05-17 00:30:43.241 [INFO][3585] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="38b9f7870f314bc8c74101a725e7fab52d045d1b5a1c684e98888a801f12cdcc" HandleID="k8s-pod-network.38b9f7870f314bc8c74101a725e7fab52d045d1b5a1c684e98888a801f12cdcc" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-coredns--674b8bbfcf--ztckd-eth0" May 17 00:30:43.280044 env[1216]: 2025-05-17 00:30:43.241 [INFO][3585] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:30:43.280044 env[1216]: 2025-05-17 00:30:43.250 [INFO][3585] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:30:43.280044 env[1216]: 2025-05-17 00:30:43.272 [WARNING][3585] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="38b9f7870f314bc8c74101a725e7fab52d045d1b5a1c684e98888a801f12cdcc" HandleID="k8s-pod-network.38b9f7870f314bc8c74101a725e7fab52d045d1b5a1c684e98888a801f12cdcc" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-coredns--674b8bbfcf--ztckd-eth0" May 17 00:30:43.280044 env[1216]: 2025-05-17 00:30:43.272 [INFO][3585] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="38b9f7870f314bc8c74101a725e7fab52d045d1b5a1c684e98888a801f12cdcc" HandleID="k8s-pod-network.38b9f7870f314bc8c74101a725e7fab52d045d1b5a1c684e98888a801f12cdcc" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-coredns--674b8bbfcf--ztckd-eth0" May 17 00:30:43.280044 env[1216]: 2025-05-17 00:30:43.274 [INFO][3585] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:30:43.280044 env[1216]: 2025-05-17 00:30:43.277 [INFO][3569] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="38b9f7870f314bc8c74101a725e7fab52d045d1b5a1c684e98888a801f12cdcc" May 17 00:30:43.287049 env[1216]: time="2025-05-17T00:30:43.286990088Z" level=info msg="TearDown network for sandbox \"38b9f7870f314bc8c74101a725e7fab52d045d1b5a1c684e98888a801f12cdcc\" successfully" May 17 00:30:43.287268 env[1216]: time="2025-05-17T00:30:43.287220858Z" level=info msg="StopPodSandbox for \"38b9f7870f314bc8c74101a725e7fab52d045d1b5a1c684e98888a801f12cdcc\" returns successfully" May 17 00:30:43.288361 env[1216]: time="2025-05-17T00:30:43.288315676Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-ztckd,Uid:321c0e51-f8c3-46b7-a173-1e567c86d95b,Namespace:kube-system,Attempt:1,}" May 17 00:30:43.295990 systemd[1]: run-netns-cni\x2ddd50e1e9\x2d6b5e\x2d3fad\x2dee1f\x2d4a359bd3cf0c.mount: Deactivated successfully. May 17 00:30:43.685013 systemd-networkd[1015]: caliafb2f81cc2f: Link UP May 17 00:30:43.697848 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:30:43.705796 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliafb2f81cc2f: link becomes ready May 17 00:30:43.707832 systemd-networkd[1015]: caliafb2f81cc2f: Gained carrier May 17 00:30:43.732060 env[1216]: 2025-05-17 00:30:43.439 [INFO][3597] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-calico--apiserver--5544b97fc--ncc4j-eth0 calico-apiserver-5544b97fc- calico-apiserver 906ab3b1-343a-409d-8e38-3de2ad671165 930 0 2025-05-17 00:30:14 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:5544b97fc projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7 calico-apiserver-5544b97fc-ncc4j eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] caliafb2f81cc2f [] [] }} ContainerID="e221be0eb2170ad0e7adcd5456b93abdc3c2e57af527fbbff7e64d532d423e11" Namespace="calico-apiserver" Pod="calico-apiserver-5544b97fc-ncc4j" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-calico--apiserver--5544b97fc--ncc4j-" May 17 00:30:43.732060 env[1216]: 2025-05-17 00:30:43.440 [INFO][3597] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="e221be0eb2170ad0e7adcd5456b93abdc3c2e57af527fbbff7e64d532d423e11" Namespace="calico-apiserver" Pod="calico-apiserver-5544b97fc-ncc4j" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-calico--apiserver--5544b97fc--ncc4j-eth0" May 17 00:30:43.732060 env[1216]: 2025-05-17 00:30:43.553 [INFO][3619] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e221be0eb2170ad0e7adcd5456b93abdc3c2e57af527fbbff7e64d532d423e11" HandleID="k8s-pod-network.e221be0eb2170ad0e7adcd5456b93abdc3c2e57af527fbbff7e64d532d423e11" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-calico--apiserver--5544b97fc--ncc4j-eth0" May 17 00:30:43.732060 env[1216]: 2025-05-17 00:30:43.556 [INFO][3619] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="e221be0eb2170ad0e7adcd5456b93abdc3c2e57af527fbbff7e64d532d423e11" HandleID="k8s-pod-network.e221be0eb2170ad0e7adcd5456b93abdc3c2e57af527fbbff7e64d532d423e11" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-calico--apiserver--5544b97fc--ncc4j-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00004f990), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7", "pod":"calico-apiserver-5544b97fc-ncc4j", "timestamp":"2025-05-17 00:30:43.553491708 +0000 UTC"}, Hostname:"ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:30:43.732060 env[1216]: 2025-05-17 00:30:43.556 [INFO][3619] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:30:43.732060 env[1216]: 2025-05-17 00:30:43.556 [INFO][3619] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:30:43.732060 env[1216]: 2025-05-17 00:30:43.556 [INFO][3619] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7' May 17 00:30:43.732060 env[1216]: 2025-05-17 00:30:43.571 [INFO][3619] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.e221be0eb2170ad0e7adcd5456b93abdc3c2e57af527fbbff7e64d532d423e11" host="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:30:43.732060 env[1216]: 2025-05-17 00:30:43.601 [INFO][3619] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:30:43.732060 env[1216]: 2025-05-17 00:30:43.612 [INFO][3619] ipam/ipam.go 511: Trying affinity for 192.168.71.192/26 host="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:30:43.732060 env[1216]: 2025-05-17 00:30:43.616 [INFO][3619] ipam/ipam.go 158: Attempting to load block cidr=192.168.71.192/26 host="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:30:43.732060 env[1216]: 2025-05-17 00:30:43.620 [INFO][3619] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.71.192/26 host="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:30:43.732060 env[1216]: 2025-05-17 00:30:43.620 [INFO][3619] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.71.192/26 handle="k8s-pod-network.e221be0eb2170ad0e7adcd5456b93abdc3c2e57af527fbbff7e64d532d423e11" host="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:30:43.732060 env[1216]: 2025-05-17 00:30:43.623 [INFO][3619] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.e221be0eb2170ad0e7adcd5456b93abdc3c2e57af527fbbff7e64d532d423e11 May 17 00:30:43.732060 env[1216]: 2025-05-17 00:30:43.635 [INFO][3619] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.71.192/26 handle="k8s-pod-network.e221be0eb2170ad0e7adcd5456b93abdc3c2e57af527fbbff7e64d532d423e11" host="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:30:43.732060 env[1216]: 2025-05-17 00:30:43.648 [INFO][3619] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.71.194/26] block=192.168.71.192/26 handle="k8s-pod-network.e221be0eb2170ad0e7adcd5456b93abdc3c2e57af527fbbff7e64d532d423e11" host="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:30:43.732060 env[1216]: 2025-05-17 00:30:43.648 [INFO][3619] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.71.194/26] handle="k8s-pod-network.e221be0eb2170ad0e7adcd5456b93abdc3c2e57af527fbbff7e64d532d423e11" host="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:30:43.732060 env[1216]: 2025-05-17 00:30:43.648 [INFO][3619] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:30:43.732060 env[1216]: 2025-05-17 00:30:43.648 [INFO][3619] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.71.194/26] IPv6=[] ContainerID="e221be0eb2170ad0e7adcd5456b93abdc3c2e57af527fbbff7e64d532d423e11" HandleID="k8s-pod-network.e221be0eb2170ad0e7adcd5456b93abdc3c2e57af527fbbff7e64d532d423e11" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-calico--apiserver--5544b97fc--ncc4j-eth0" May 17 00:30:43.733889 env[1216]: 2025-05-17 00:30:43.651 [INFO][3597] cni-plugin/k8s.go 418: Populated endpoint ContainerID="e221be0eb2170ad0e7adcd5456b93abdc3c2e57af527fbbff7e64d532d423e11" Namespace="calico-apiserver" Pod="calico-apiserver-5544b97fc-ncc4j" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-calico--apiserver--5544b97fc--ncc4j-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-calico--apiserver--5544b97fc--ncc4j-eth0", GenerateName:"calico-apiserver-5544b97fc-", Namespace:"calico-apiserver", SelfLink:"", UID:"906ab3b1-343a-409d-8e38-3de2ad671165", ResourceVersion:"930", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 30, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5544b97fc", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7", ContainerID:"", Pod:"calico-apiserver-5544b97fc-ncc4j", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.71.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"caliafb2f81cc2f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:30:43.733889 env[1216]: 2025-05-17 00:30:43.651 [INFO][3597] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.71.194/32] ContainerID="e221be0eb2170ad0e7adcd5456b93abdc3c2e57af527fbbff7e64d532d423e11" Namespace="calico-apiserver" Pod="calico-apiserver-5544b97fc-ncc4j" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-calico--apiserver--5544b97fc--ncc4j-eth0" May 17 00:30:43.733889 env[1216]: 2025-05-17 00:30:43.651 [INFO][3597] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to caliafb2f81cc2f ContainerID="e221be0eb2170ad0e7adcd5456b93abdc3c2e57af527fbbff7e64d532d423e11" Namespace="calico-apiserver" Pod="calico-apiserver-5544b97fc-ncc4j" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-calico--apiserver--5544b97fc--ncc4j-eth0" May 17 00:30:43.733889 env[1216]: 2025-05-17 00:30:43.711 [INFO][3597] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="e221be0eb2170ad0e7adcd5456b93abdc3c2e57af527fbbff7e64d532d423e11" Namespace="calico-apiserver" Pod="calico-apiserver-5544b97fc-ncc4j" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-calico--apiserver--5544b97fc--ncc4j-eth0" May 17 00:30:43.733889 env[1216]: 2025-05-17 00:30:43.711 [INFO][3597] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="e221be0eb2170ad0e7adcd5456b93abdc3c2e57af527fbbff7e64d532d423e11" Namespace="calico-apiserver" Pod="calico-apiserver-5544b97fc-ncc4j" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-calico--apiserver--5544b97fc--ncc4j-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-calico--apiserver--5544b97fc--ncc4j-eth0", GenerateName:"calico-apiserver-5544b97fc-", Namespace:"calico-apiserver", SelfLink:"", UID:"906ab3b1-343a-409d-8e38-3de2ad671165", ResourceVersion:"930", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 30, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5544b97fc", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7", ContainerID:"e221be0eb2170ad0e7adcd5456b93abdc3c2e57af527fbbff7e64d532d423e11", Pod:"calico-apiserver-5544b97fc-ncc4j", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.71.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"caliafb2f81cc2f", MAC:"ae:a4:98:5c:94:ec", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:30:43.733889 env[1216]: 2025-05-17 00:30:43.729 [INFO][3597] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="e221be0eb2170ad0e7adcd5456b93abdc3c2e57af527fbbff7e64d532d423e11" Namespace="calico-apiserver" Pod="calico-apiserver-5544b97fc-ncc4j" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-calico--apiserver--5544b97fc--ncc4j-eth0" May 17 00:30:43.763454 env[1216]: time="2025-05-17T00:30:43.763336884Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:30:43.763941 env[1216]: time="2025-05-17T00:30:43.763685119Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:30:43.764224 env[1216]: time="2025-05-17T00:30:43.764167920Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:30:43.764626 env[1216]: time="2025-05-17T00:30:43.764575388Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e221be0eb2170ad0e7adcd5456b93abdc3c2e57af527fbbff7e64d532d423e11 pid=3649 runtime=io.containerd.runc.v2 May 17 00:30:43.790938 systemd-networkd[1015]: cali52f6af829ff: Link UP May 17 00:30:43.800923 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali52f6af829ff: link becomes ready May 17 00:30:43.803018 systemd-networkd[1015]: cali52f6af829ff: Gained carrier May 17 00:30:43.838185 systemd[1]: Started cri-containerd-e221be0eb2170ad0e7adcd5456b93abdc3c2e57af527fbbff7e64d532d423e11.scope. May 17 00:30:43.846998 env[1216]: 2025-05-17 00:30:43.445 [INFO][3602] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-coredns--674b8bbfcf--ztckd-eth0 coredns-674b8bbfcf- kube-system 321c0e51-f8c3-46b7-a173-1e567c86d95b 931 0 2025-05-17 00:30:01 +0000 UTC map[k8s-app:kube-dns pod-template-hash:674b8bbfcf projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7 coredns-674b8bbfcf-ztckd eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali52f6af829ff [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] [] }} ContainerID="84e000f218be6cc33abd8ab22b06b7caffae02444617fab89910e58586aceee2" Namespace="kube-system" Pod="coredns-674b8bbfcf-ztckd" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-coredns--674b8bbfcf--ztckd-" May 17 00:30:43.846998 env[1216]: 2025-05-17 00:30:43.445 [INFO][3602] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="84e000f218be6cc33abd8ab22b06b7caffae02444617fab89910e58586aceee2" Namespace="kube-system" Pod="coredns-674b8bbfcf-ztckd" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-coredns--674b8bbfcf--ztckd-eth0" May 17 00:30:43.846998 env[1216]: 2025-05-17 00:30:43.631 [INFO][3624] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="84e000f218be6cc33abd8ab22b06b7caffae02444617fab89910e58586aceee2" HandleID="k8s-pod-network.84e000f218be6cc33abd8ab22b06b7caffae02444617fab89910e58586aceee2" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-coredns--674b8bbfcf--ztckd-eth0" May 17 00:30:43.846998 env[1216]: 2025-05-17 00:30:43.631 [INFO][3624] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="84e000f218be6cc33abd8ab22b06b7caffae02444617fab89910e58586aceee2" HandleID="k8s-pod-network.84e000f218be6cc33abd8ab22b06b7caffae02444617fab89910e58586aceee2" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-coredns--674b8bbfcf--ztckd-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000332470), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7", "pod":"coredns-674b8bbfcf-ztckd", "timestamp":"2025-05-17 00:30:43.631386734 +0000 UTC"}, Hostname:"ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:30:43.846998 env[1216]: 2025-05-17 00:30:43.631 [INFO][3624] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:30:43.846998 env[1216]: 2025-05-17 00:30:43.648 [INFO][3624] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:30:43.846998 env[1216]: 2025-05-17 00:30:43.649 [INFO][3624] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7' May 17 00:30:43.846998 env[1216]: 2025-05-17 00:30:43.697 [INFO][3624] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.84e000f218be6cc33abd8ab22b06b7caffae02444617fab89910e58586aceee2" host="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:30:43.846998 env[1216]: 2025-05-17 00:30:43.727 [INFO][3624] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:30:43.846998 env[1216]: 2025-05-17 00:30:43.743 [INFO][3624] ipam/ipam.go 511: Trying affinity for 192.168.71.192/26 host="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:30:43.846998 env[1216]: 2025-05-17 00:30:43.747 [INFO][3624] ipam/ipam.go 158: Attempting to load block cidr=192.168.71.192/26 host="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:30:43.846998 env[1216]: 2025-05-17 00:30:43.751 [INFO][3624] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.71.192/26 host="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:30:43.846998 env[1216]: 2025-05-17 00:30:43.751 [INFO][3624] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.71.192/26 handle="k8s-pod-network.84e000f218be6cc33abd8ab22b06b7caffae02444617fab89910e58586aceee2" host="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:30:43.846998 env[1216]: 2025-05-17 00:30:43.754 [INFO][3624] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.84e000f218be6cc33abd8ab22b06b7caffae02444617fab89910e58586aceee2 May 17 00:30:43.846998 env[1216]: 2025-05-17 00:30:43.766 [INFO][3624] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.71.192/26 handle="k8s-pod-network.84e000f218be6cc33abd8ab22b06b7caffae02444617fab89910e58586aceee2" host="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:30:43.846998 env[1216]: 2025-05-17 00:30:43.781 [INFO][3624] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.71.195/26] block=192.168.71.192/26 handle="k8s-pod-network.84e000f218be6cc33abd8ab22b06b7caffae02444617fab89910e58586aceee2" host="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:30:43.846998 env[1216]: 2025-05-17 00:30:43.781 [INFO][3624] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.71.195/26] handle="k8s-pod-network.84e000f218be6cc33abd8ab22b06b7caffae02444617fab89910e58586aceee2" host="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:30:43.846998 env[1216]: 2025-05-17 00:30:43.781 [INFO][3624] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:30:43.846998 env[1216]: 2025-05-17 00:30:43.781 [INFO][3624] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.71.195/26] IPv6=[] ContainerID="84e000f218be6cc33abd8ab22b06b7caffae02444617fab89910e58586aceee2" HandleID="k8s-pod-network.84e000f218be6cc33abd8ab22b06b7caffae02444617fab89910e58586aceee2" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-coredns--674b8bbfcf--ztckd-eth0" May 17 00:30:43.848598 env[1216]: 2025-05-17 00:30:43.784 [INFO][3602] cni-plugin/k8s.go 418: Populated endpoint ContainerID="84e000f218be6cc33abd8ab22b06b7caffae02444617fab89910e58586aceee2" Namespace="kube-system" Pod="coredns-674b8bbfcf-ztckd" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-coredns--674b8bbfcf--ztckd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-coredns--674b8bbfcf--ztckd-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"321c0e51-f8c3-46b7-a173-1e567c86d95b", ResourceVersion:"931", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 30, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7", ContainerID:"", Pod:"coredns-674b8bbfcf-ztckd", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.71.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali52f6af829ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:30:43.848598 env[1216]: 2025-05-17 00:30:43.785 [INFO][3602] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.71.195/32] ContainerID="84e000f218be6cc33abd8ab22b06b7caffae02444617fab89910e58586aceee2" Namespace="kube-system" Pod="coredns-674b8bbfcf-ztckd" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-coredns--674b8bbfcf--ztckd-eth0" May 17 00:30:43.848598 env[1216]: 2025-05-17 00:30:43.785 [INFO][3602] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali52f6af829ff ContainerID="84e000f218be6cc33abd8ab22b06b7caffae02444617fab89910e58586aceee2" Namespace="kube-system" Pod="coredns-674b8bbfcf-ztckd" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-coredns--674b8bbfcf--ztckd-eth0" May 17 00:30:43.848598 env[1216]: 2025-05-17 00:30:43.809 [INFO][3602] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="84e000f218be6cc33abd8ab22b06b7caffae02444617fab89910e58586aceee2" Namespace="kube-system" Pod="coredns-674b8bbfcf-ztckd" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-coredns--674b8bbfcf--ztckd-eth0" May 17 00:30:43.848598 env[1216]: 2025-05-17 00:30:43.809 [INFO][3602] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="84e000f218be6cc33abd8ab22b06b7caffae02444617fab89910e58586aceee2" Namespace="kube-system" Pod="coredns-674b8bbfcf-ztckd" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-coredns--674b8bbfcf--ztckd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-coredns--674b8bbfcf--ztckd-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"321c0e51-f8c3-46b7-a173-1e567c86d95b", ResourceVersion:"931", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 30, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7", ContainerID:"84e000f218be6cc33abd8ab22b06b7caffae02444617fab89910e58586aceee2", Pod:"coredns-674b8bbfcf-ztckd", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.71.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali52f6af829ff", MAC:"e6:8a:b4:e9:f7:46", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:30:43.848598 env[1216]: 2025-05-17 00:30:43.843 [INFO][3602] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="84e000f218be6cc33abd8ab22b06b7caffae02444617fab89910e58586aceee2" Namespace="kube-system" Pod="coredns-674b8bbfcf-ztckd" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-coredns--674b8bbfcf--ztckd-eth0" May 17 00:30:43.928504 kernel: kauditd_printk_skb: 624 callbacks suppressed May 17 00:30:43.928737 kernel: audit: type=1400 audit(1747441843.901:1121): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:43.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:43.932122 env[1216]: time="2025-05-17T00:30:43.931955701Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:30:43.932343 env[1216]: time="2025-05-17T00:30:43.932184925Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:30:43.932343 env[1216]: time="2025-05-17T00:30:43.932273421Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:30:43.932867 env[1216]: time="2025-05-17T00:30:43.932755027Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/84e000f218be6cc33abd8ab22b06b7caffae02444617fab89910e58586aceee2 pid=3692 runtime=io.containerd.runc.v2 May 17 00:30:43.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:43.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:43.971431 systemd[1]: Started cri-containerd-84e000f218be6cc33abd8ab22b06b7caffae02444617fab89910e58586aceee2.scope. May 17 00:30:43.983132 kernel: audit: type=1400 audit(1747441843.901:1122): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:43.983267 kernel: audit: type=1400 audit(1747441843.901:1123): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:43.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.028728 kernel: audit: type=1400 audit(1747441843.901:1124): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.028904 kernel: audit: type=1400 audit(1747441843.901:1125): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:43.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:43.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.055784 kernel: audit: type=1400 audit(1747441843.901:1126): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.062466 env[1216]: time="2025-05-17T00:30:44.062378317Z" level=info msg="StopPodSandbox for \"74fc87334f78fb1a2c484b24de65157ae69a6602f8490b6ab360e61b545e6af6\"" May 17 00:30:43.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.088800 kernel: audit: type=1400 audit(1747441843.901:1127): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.129601 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 17 00:30:44.129808 kernel: audit: audit_lost=19 audit_rate_limit=0 audit_backlog_limit=64 May 17 00:30:44.129866 kernel: audit: type=1400 audit(1747441843.901:1128): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:43.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:43.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:43.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:43.934000 audit: BPF prog-id=165 op=LOAD May 17 00:30:43.935000 audit[3658]: AVC avc: denied { bpf } for pid=3658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:43.935000 audit[3658]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3649 pid=3658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:43.935000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532323162653065623231373061643065376164636435343536623933 May 17 00:30:43.935000 audit[3658]: AVC avc: denied { perfmon } for pid=3658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:43.935000 audit[3658]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3649 pid=3658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:43.935000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532323162653065623231373061643065376164636435343536623933 May 17 00:30:43.935000 audit[3658]: AVC avc: denied { bpf } for pid=3658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:43.935000 audit[3658]: AVC avc: denied { bpf } for pid=3658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:43.935000 audit[3658]: AVC avc: denied { bpf } for pid=3658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:43.935000 audit[3658]: AVC avc: denied { perfmon } for pid=3658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:43.935000 audit[3658]: AVC avc: denied { perfmon } for pid=3658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:43.935000 audit[3658]: AVC avc: denied { perfmon } for pid=3658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:43.935000 audit[3658]: AVC avc: denied { perfmon } for pid=3658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:43.935000 audit[3658]: AVC avc: denied { perfmon } for pid=3658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:43.935000 audit[3658]: AVC avc: denied { bpf } for pid=3658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:43.935000 audit[3658]: AVC avc: denied { bpf } for pid=3658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:43.935000 audit: BPF prog-id=166 op=LOAD May 17 00:30:43.935000 audit[3658]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000219400 items=0 ppid=3649 pid=3658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:43.935000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532323162653065623231373061643065376164636435343536623933 May 17 00:30:43.935000 audit[3658]: AVC avc: denied { bpf } for pid=3658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:43.935000 audit[3658]: AVC avc: denied { bpf } for pid=3658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:43.935000 audit[3658]: AVC avc: denied { perfmon } for pid=3658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:43.935000 audit[3658]: AVC avc: denied { perfmon } for pid=3658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:43.935000 audit[3658]: AVC avc: denied { perfmon } for pid=3658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:43.935000 audit[3658]: AVC avc: denied { perfmon } for pid=3658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:43.935000 audit[3658]: AVC avc: denied { perfmon } for pid=3658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:43.935000 audit[3658]: AVC avc: denied { bpf } for pid=3658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:43.935000 audit[3658]: AVC avc: denied { bpf } for pid=3658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:43.935000 audit: BPF prog-id=167 op=LOAD May 17 00:30:43.935000 audit[3658]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000219448 items=0 ppid=3649 pid=3658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:43.935000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532323162653065623231373061643065376164636435343536623933 May 17 00:30:43.935000 audit: BPF prog-id=167 op=UNLOAD May 17 00:30:43.935000 audit: BPF prog-id=166 op=UNLOAD May 17 00:30:43.936000 audit[3658]: AVC avc: denied { bpf } for pid=3658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:43.936000 audit[3658]: AVC avc: denied { bpf } for pid=3658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:43.936000 audit[3658]: AVC avc: denied { bpf } for pid=3658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:43.936000 audit[3658]: AVC avc: denied { perfmon } for pid=3658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:43.936000 audit[3658]: AVC avc: denied { perfmon } for pid=3658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:43.936000 audit[3658]: AVC avc: denied { perfmon } for pid=3658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:43.936000 audit[3658]: AVC avc: denied { perfmon } for pid=3658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:43.936000 audit[3658]: AVC avc: denied { perfmon } for pid=3658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:43.936000 audit[3658]: AVC avc: denied { bpf } for pid=3658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:43.936000 audit[3658]: AVC avc: denied { bpf } for pid=3658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:43.936000 audit: BPF prog-id=168 op=LOAD May 17 00:30:43.936000 audit[3658]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000219858 items=0 ppid=3649 pid=3658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:43.936000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532323162653065623231373061643065376164636435343536623933 May 17 00:30:43.963000 audit[3700]: NETFILTER_CFG table=filter:107 family=2 entries=50 op=nft_register_chain pid=3700 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:30:43.963000 audit[3700]: SYSCALL arch=c000003e syscall=46 success=yes exit=28208 a0=3 a1=7ffdf615d1e0 a2=0 a3=7ffdf615d1cc items=0 ppid=3365 pid=3700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:43.963000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:30:44.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.210000 audit[3738]: NETFILTER_CFG table=filter:108 family=2 entries=46 op=nft_register_chain pid=3738 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:30:44.210000 audit[3738]: SYSCALL arch=c000003e syscall=46 success=yes exit=23740 a0=3 a1=7fff407780c0 a2=0 a3=7fff407780ac items=0 ppid=3365 pid=3738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:44.210000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:30:44.215010 env[1216]: time="2025-05-17T00:30:44.214959244Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-ztckd,Uid:321c0e51-f8c3-46b7-a173-1e567c86d95b,Namespace:kube-system,Attempt:1,} returns sandbox id \"84e000f218be6cc33abd8ab22b06b7caffae02444617fab89910e58586aceee2\"" May 17 00:30:44.224435 env[1216]: time="2025-05-17T00:30:44.224267574Z" level=info msg="CreateContainer within sandbox \"84e000f218be6cc33abd8ab22b06b7caffae02444617fab89910e58586aceee2\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 17 00:30:44.274851 env[1216]: time="2025-05-17T00:30:44.274771845Z" level=info msg="CreateContainer within sandbox \"84e000f218be6cc33abd8ab22b06b7caffae02444617fab89910e58586aceee2\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"6963ed45ff8a0c5fca8df964c4d3961d166c282ba15853c1918c4538fd6da299\"" May 17 00:30:44.276307 env[1216]: time="2025-05-17T00:30:44.276263425Z" level=info msg="StartContainer for \"6963ed45ff8a0c5fca8df964c4d3961d166c282ba15853c1918c4538fd6da299\"" May 17 00:30:44.286311 env[1216]: time="2025-05-17T00:30:44.286251592Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5544b97fc-ncc4j,Uid:906ab3b1-343a-409d-8e38-3de2ad671165,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"e221be0eb2170ad0e7adcd5456b93abdc3c2e57af527fbbff7e64d532d423e11\"" May 17 00:30:44.292056 env[1216]: time="2025-05-17T00:30:44.291996440Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\"" May 17 00:30:44.371478 systemd[1]: run-containerd-runc-k8s.io-6963ed45ff8a0c5fca8df964c4d3961d166c282ba15853c1918c4538fd6da299-runc.qXoBIk.mount: Deactivated successfully. May 17 00:30:44.379304 systemd[1]: Started cri-containerd-6963ed45ff8a0c5fca8df964c4d3961d166c282ba15853c1918c4538fd6da299.scope. May 17 00:30:44.406255 env[1216]: 2025-05-17 00:30:44.238 [INFO][3734] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="74fc87334f78fb1a2c484b24de65157ae69a6602f8490b6ab360e61b545e6af6" May 17 00:30:44.406255 env[1216]: 2025-05-17 00:30:44.238 [INFO][3734] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="74fc87334f78fb1a2c484b24de65157ae69a6602f8490b6ab360e61b545e6af6" iface="eth0" netns="/var/run/netns/cni-f2fc986a-4e3f-1fca-146a-c45aa51dc4a6" May 17 00:30:44.406255 env[1216]: 2025-05-17 00:30:44.239 [INFO][3734] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="74fc87334f78fb1a2c484b24de65157ae69a6602f8490b6ab360e61b545e6af6" iface="eth0" netns="/var/run/netns/cni-f2fc986a-4e3f-1fca-146a-c45aa51dc4a6" May 17 00:30:44.406255 env[1216]: 2025-05-17 00:30:44.242 [INFO][3734] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="74fc87334f78fb1a2c484b24de65157ae69a6602f8490b6ab360e61b545e6af6" iface="eth0" netns="/var/run/netns/cni-f2fc986a-4e3f-1fca-146a-c45aa51dc4a6" May 17 00:30:44.406255 env[1216]: 2025-05-17 00:30:44.242 [INFO][3734] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="74fc87334f78fb1a2c484b24de65157ae69a6602f8490b6ab360e61b545e6af6" May 17 00:30:44.406255 env[1216]: 2025-05-17 00:30:44.242 [INFO][3734] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="74fc87334f78fb1a2c484b24de65157ae69a6602f8490b6ab360e61b545e6af6" May 17 00:30:44.406255 env[1216]: 2025-05-17 00:30:44.358 [INFO][3752] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="74fc87334f78fb1a2c484b24de65157ae69a6602f8490b6ab360e61b545e6af6" HandleID="k8s-pod-network.74fc87334f78fb1a2c484b24de65157ae69a6602f8490b6ab360e61b545e6af6" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-calico--apiserver--5544b97fc--9jp6z-eth0" May 17 00:30:44.406255 env[1216]: 2025-05-17 00:30:44.362 [INFO][3752] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:30:44.406255 env[1216]: 2025-05-17 00:30:44.362 [INFO][3752] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:30:44.406255 env[1216]: 2025-05-17 00:30:44.396 [WARNING][3752] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="74fc87334f78fb1a2c484b24de65157ae69a6602f8490b6ab360e61b545e6af6" HandleID="k8s-pod-network.74fc87334f78fb1a2c484b24de65157ae69a6602f8490b6ab360e61b545e6af6" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-calico--apiserver--5544b97fc--9jp6z-eth0" May 17 00:30:44.406255 env[1216]: 2025-05-17 00:30:44.396 [INFO][3752] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="74fc87334f78fb1a2c484b24de65157ae69a6602f8490b6ab360e61b545e6af6" HandleID="k8s-pod-network.74fc87334f78fb1a2c484b24de65157ae69a6602f8490b6ab360e61b545e6af6" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-calico--apiserver--5544b97fc--9jp6z-eth0" May 17 00:30:44.406255 env[1216]: 2025-05-17 00:30:44.400 [INFO][3752] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:30:44.406255 env[1216]: 2025-05-17 00:30:44.403 [INFO][3734] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="74fc87334f78fb1a2c484b24de65157ae69a6602f8490b6ab360e61b545e6af6" May 17 00:30:44.408952 env[1216]: time="2025-05-17T00:30:44.408894446Z" level=info msg="TearDown network for sandbox \"74fc87334f78fb1a2c484b24de65157ae69a6602f8490b6ab360e61b545e6af6\" successfully" May 17 00:30:44.409277 env[1216]: time="2025-05-17T00:30:44.409133790Z" level=info msg="StopPodSandbox for \"74fc87334f78fb1a2c484b24de65157ae69a6602f8490b6ab360e61b545e6af6\" returns successfully" May 17 00:30:44.410571 env[1216]: time="2025-05-17T00:30:44.410526266Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5544b97fc-9jp6z,Uid:d7e6c2c3-1282-4564-8eee-869b9655c267,Namespace:calico-apiserver,Attempt:1,}" May 17 00:30:44.414607 systemd[1]: run-netns-cni\x2df2fc986a\x2d4e3f\x2d1fca\x2d146a\x2dc45aa51dc4a6.mount: Deactivated successfully. May 17 00:30:44.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.427000 audit: BPF prog-id=173 op=LOAD May 17 00:30:44.430000 audit[3765]: AVC avc: denied { bpf } for pid=3765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.430000 audit[3765]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=3692 pid=3765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:44.430000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639363365643435666638613063356663613864663936346334643339 May 17 00:30:44.431000 audit[3765]: AVC avc: denied { perfmon } for pid=3765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.431000 audit[3765]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=3692 pid=3765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:44.431000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639363365643435666638613063356663613864663936346334643339 May 17 00:30:44.432000 audit[3765]: AVC avc: denied { bpf } for pid=3765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.432000 audit[3765]: AVC avc: denied { bpf } for pid=3765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.432000 audit[3765]: AVC avc: denied { bpf } for pid=3765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.432000 audit[3765]: AVC avc: denied { perfmon } for pid=3765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.432000 audit[3765]: AVC avc: denied { perfmon } for pid=3765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.432000 audit[3765]: AVC avc: denied { perfmon } for pid=3765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.432000 audit[3765]: AVC avc: denied { perfmon } for pid=3765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.432000 audit[3765]: AVC avc: denied { perfmon } for pid=3765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.432000 audit[3765]: AVC avc: denied { bpf } for pid=3765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.432000 audit[3765]: AVC avc: denied { bpf } for pid=3765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.432000 audit: BPF prog-id=174 op=LOAD May 17 00:30:44.432000 audit[3765]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c00029d3d0 items=0 ppid=3692 pid=3765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:44.432000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639363365643435666638613063356663613864663936346334643339 May 17 00:30:44.433000 audit[3765]: AVC avc: denied { bpf } for pid=3765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.433000 audit[3765]: AVC avc: denied { bpf } for pid=3765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.433000 audit[3765]: AVC avc: denied { perfmon } for pid=3765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.433000 audit[3765]: AVC avc: denied { perfmon } for pid=3765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.433000 audit[3765]: AVC avc: denied { perfmon } for pid=3765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.433000 audit[3765]: AVC avc: denied { perfmon } for pid=3765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.433000 audit[3765]: AVC avc: denied { perfmon } for pid=3765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.433000 audit[3765]: AVC avc: denied { bpf } for pid=3765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.433000 audit[3765]: AVC avc: denied { bpf } for pid=3765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.433000 audit: BPF prog-id=175 op=LOAD May 17 00:30:44.433000 audit[3765]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c00029d418 items=0 ppid=3692 pid=3765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:44.433000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639363365643435666638613063356663613864663936346334643339 May 17 00:30:44.433000 audit: BPF prog-id=175 op=UNLOAD May 17 00:30:44.433000 audit: BPF prog-id=174 op=UNLOAD May 17 00:30:44.433000 audit[3765]: AVC avc: denied { bpf } for pid=3765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.433000 audit[3765]: AVC avc: denied { bpf } for pid=3765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.433000 audit[3765]: AVC avc: denied { bpf } for pid=3765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.433000 audit[3765]: AVC avc: denied { perfmon } for pid=3765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.433000 audit[3765]: AVC avc: denied { perfmon } for pid=3765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.433000 audit[3765]: AVC avc: denied { perfmon } for pid=3765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.433000 audit[3765]: AVC avc: denied { perfmon } for pid=3765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.433000 audit[3765]: AVC avc: denied { perfmon } for pid=3765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.433000 audit[3765]: AVC avc: denied { bpf } for pid=3765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.433000 audit[3765]: AVC avc: denied { bpf } for pid=3765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.433000 audit: BPF prog-id=176 op=LOAD May 17 00:30:44.433000 audit[3765]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c00029d828 items=0 ppid=3692 pid=3765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:44.433000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639363365643435666638613063356663613864663936346334643339 May 17 00:30:44.472887 env[1216]: time="2025-05-17T00:30:44.472827458Z" level=info msg="StartContainer for \"6963ed45ff8a0c5fca8df964c4d3961d166c282ba15853c1918c4538fd6da299\" returns successfully" May 17 00:30:44.497000 audit[3777]: AVC avc: denied { getattr } for pid=3777 comm="coredns" path="cgroup:[4026532766]" dev="nsfs" ino=4026532766 scontext=system_u:system_r:svirt_lxc_net_t:s0:c118,c391 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 May 17 00:30:44.497000 audit[3777]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c00014cc00 a2=c0000cb968 a3=0 items=0 ppid=3692 pid=3777 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c118,c391 key=(null) May 17 00:30:44.497000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 May 17 00:30:44.612000 audit[3808]: NETFILTER_CFG table=filter:109 family=2 entries=20 op=nft_register_rule pid=3808 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:30:44.612000 audit[3808]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7fff2e3e66b0 a2=0 a3=7fff2e3e669c items=0 ppid=2176 pid=3808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:44.612000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:30:44.615000 audit[3808]: NETFILTER_CFG table=nat:110 family=2 entries=14 op=nft_register_rule pid=3808 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:30:44.615000 audit[3808]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7fff2e3e66b0 a2=0 a3=0 items=0 ppid=2176 pid=3808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:44.615000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:30:44.733900 systemd-networkd[1015]: calia62815005d1: Link UP May 17 00:30:44.750864 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:30:44.751040 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia62815005d1: link becomes ready May 17 00:30:44.763515 systemd-networkd[1015]: calia62815005d1: Gained carrier May 17 00:30:44.786957 kubelet[2047]: I0517 00:30:44.786847 2047 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-674b8bbfcf-ztckd" podStartSLOduration=43.786816131 podStartE2EDuration="43.786816131s" podCreationTimestamp="2025-05-17 00:30:01 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:30:44.568969392 +0000 UTC m=+49.858076281" watchObservedRunningTime="2025-05-17 00:30:44.786816131 +0000 UTC m=+50.075923020" May 17 00:30:44.793847 env[1216]: 2025-05-17 00:30:44.570 [INFO][3789] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-calico--apiserver--5544b97fc--9jp6z-eth0 calico-apiserver-5544b97fc- calico-apiserver d7e6c2c3-1282-4564-8eee-869b9655c267 944 0 2025-05-17 00:30:14 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:5544b97fc projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7 calico-apiserver-5544b97fc-9jp6z eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calia62815005d1 [] [] }} ContainerID="20326f008f438671742e2d4a580ffa5bc448cc6baea0fcc3b42b7cadcbb2d3c8" Namespace="calico-apiserver" Pod="calico-apiserver-5544b97fc-9jp6z" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-calico--apiserver--5544b97fc--9jp6z-" May 17 00:30:44.793847 env[1216]: 2025-05-17 00:30:44.575 [INFO][3789] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="20326f008f438671742e2d4a580ffa5bc448cc6baea0fcc3b42b7cadcbb2d3c8" Namespace="calico-apiserver" Pod="calico-apiserver-5544b97fc-9jp6z" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-calico--apiserver--5544b97fc--9jp6z-eth0" May 17 00:30:44.793847 env[1216]: 2025-05-17 00:30:44.645 [INFO][3810] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="20326f008f438671742e2d4a580ffa5bc448cc6baea0fcc3b42b7cadcbb2d3c8" HandleID="k8s-pod-network.20326f008f438671742e2d4a580ffa5bc448cc6baea0fcc3b42b7cadcbb2d3c8" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-calico--apiserver--5544b97fc--9jp6z-eth0" May 17 00:30:44.793847 env[1216]: 2025-05-17 00:30:44.646 [INFO][3810] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="20326f008f438671742e2d4a580ffa5bc448cc6baea0fcc3b42b7cadcbb2d3c8" HandleID="k8s-pod-network.20326f008f438671742e2d4a580ffa5bc448cc6baea0fcc3b42b7cadcbb2d3c8" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-calico--apiserver--5544b97fc--9jp6z-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d1020), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7", "pod":"calico-apiserver-5544b97fc-9jp6z", "timestamp":"2025-05-17 00:30:44.645862161 +0000 UTC"}, Hostname:"ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:30:44.793847 env[1216]: 2025-05-17 00:30:44.646 [INFO][3810] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:30:44.793847 env[1216]: 2025-05-17 00:30:44.646 [INFO][3810] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:30:44.793847 env[1216]: 2025-05-17 00:30:44.646 [INFO][3810] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7' May 17 00:30:44.793847 env[1216]: 2025-05-17 00:30:44.658 [INFO][3810] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.20326f008f438671742e2d4a580ffa5bc448cc6baea0fcc3b42b7cadcbb2d3c8" host="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:30:44.793847 env[1216]: 2025-05-17 00:30:44.668 [INFO][3810] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:30:44.793847 env[1216]: 2025-05-17 00:30:44.677 [INFO][3810] ipam/ipam.go 511: Trying affinity for 192.168.71.192/26 host="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:30:44.793847 env[1216]: 2025-05-17 00:30:44.684 [INFO][3810] ipam/ipam.go 158: Attempting to load block cidr=192.168.71.192/26 host="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:30:44.793847 env[1216]: 2025-05-17 00:30:44.687 [INFO][3810] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.71.192/26 host="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:30:44.793847 env[1216]: 2025-05-17 00:30:44.687 [INFO][3810] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.71.192/26 handle="k8s-pod-network.20326f008f438671742e2d4a580ffa5bc448cc6baea0fcc3b42b7cadcbb2d3c8" host="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:30:44.793847 env[1216]: 2025-05-17 00:30:44.690 [INFO][3810] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.20326f008f438671742e2d4a580ffa5bc448cc6baea0fcc3b42b7cadcbb2d3c8 May 17 00:30:44.793847 env[1216]: 2025-05-17 00:30:44.702 [INFO][3810] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.71.192/26 handle="k8s-pod-network.20326f008f438671742e2d4a580ffa5bc448cc6baea0fcc3b42b7cadcbb2d3c8" host="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:30:44.793847 env[1216]: 2025-05-17 00:30:44.712 [INFO][3810] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.71.196/26] block=192.168.71.192/26 handle="k8s-pod-network.20326f008f438671742e2d4a580ffa5bc448cc6baea0fcc3b42b7cadcbb2d3c8" host="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:30:44.793847 env[1216]: 2025-05-17 00:30:44.712 [INFO][3810] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.71.196/26] handle="k8s-pod-network.20326f008f438671742e2d4a580ffa5bc448cc6baea0fcc3b42b7cadcbb2d3c8" host="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:30:44.793847 env[1216]: 2025-05-17 00:30:44.712 [INFO][3810] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:30:44.793847 env[1216]: 2025-05-17 00:30:44.712 [INFO][3810] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.71.196/26] IPv6=[] ContainerID="20326f008f438671742e2d4a580ffa5bc448cc6baea0fcc3b42b7cadcbb2d3c8" HandleID="k8s-pod-network.20326f008f438671742e2d4a580ffa5bc448cc6baea0fcc3b42b7cadcbb2d3c8" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-calico--apiserver--5544b97fc--9jp6z-eth0" May 17 00:30:44.795579 env[1216]: 2025-05-17 00:30:44.715 [INFO][3789] cni-plugin/k8s.go 418: Populated endpoint ContainerID="20326f008f438671742e2d4a580ffa5bc448cc6baea0fcc3b42b7cadcbb2d3c8" Namespace="calico-apiserver" Pod="calico-apiserver-5544b97fc-9jp6z" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-calico--apiserver--5544b97fc--9jp6z-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-calico--apiserver--5544b97fc--9jp6z-eth0", GenerateName:"calico-apiserver-5544b97fc-", Namespace:"calico-apiserver", SelfLink:"", UID:"d7e6c2c3-1282-4564-8eee-869b9655c267", ResourceVersion:"944", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 30, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5544b97fc", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7", ContainerID:"", Pod:"calico-apiserver-5544b97fc-9jp6z", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.71.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calia62815005d1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:30:44.795579 env[1216]: 2025-05-17 00:30:44.716 [INFO][3789] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.71.196/32] ContainerID="20326f008f438671742e2d4a580ffa5bc448cc6baea0fcc3b42b7cadcbb2d3c8" Namespace="calico-apiserver" Pod="calico-apiserver-5544b97fc-9jp6z" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-calico--apiserver--5544b97fc--9jp6z-eth0" May 17 00:30:44.795579 env[1216]: 2025-05-17 00:30:44.716 [INFO][3789] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calia62815005d1 ContainerID="20326f008f438671742e2d4a580ffa5bc448cc6baea0fcc3b42b7cadcbb2d3c8" Namespace="calico-apiserver" Pod="calico-apiserver-5544b97fc-9jp6z" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-calico--apiserver--5544b97fc--9jp6z-eth0" May 17 00:30:44.795579 env[1216]: 2025-05-17 00:30:44.765 [INFO][3789] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="20326f008f438671742e2d4a580ffa5bc448cc6baea0fcc3b42b7cadcbb2d3c8" Namespace="calico-apiserver" Pod="calico-apiserver-5544b97fc-9jp6z" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-calico--apiserver--5544b97fc--9jp6z-eth0" May 17 00:30:44.795579 env[1216]: 2025-05-17 00:30:44.766 [INFO][3789] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="20326f008f438671742e2d4a580ffa5bc448cc6baea0fcc3b42b7cadcbb2d3c8" Namespace="calico-apiserver" Pod="calico-apiserver-5544b97fc-9jp6z" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-calico--apiserver--5544b97fc--9jp6z-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-calico--apiserver--5544b97fc--9jp6z-eth0", GenerateName:"calico-apiserver-5544b97fc-", Namespace:"calico-apiserver", SelfLink:"", UID:"d7e6c2c3-1282-4564-8eee-869b9655c267", ResourceVersion:"944", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 30, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5544b97fc", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7", ContainerID:"20326f008f438671742e2d4a580ffa5bc448cc6baea0fcc3b42b7cadcbb2d3c8", Pod:"calico-apiserver-5544b97fc-9jp6z", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.71.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calia62815005d1", MAC:"16:48:80:97:8e:b4", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:30:44.795579 env[1216]: 2025-05-17 00:30:44.785 [INFO][3789] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="20326f008f438671742e2d4a580ffa5bc448cc6baea0fcc3b42b7cadcbb2d3c8" Namespace="calico-apiserver" Pod="calico-apiserver-5544b97fc-9jp6z" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-calico--apiserver--5544b97fc--9jp6z-eth0" May 17 00:30:44.817521 env[1216]: time="2025-05-17T00:30:44.817400866Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:30:44.817926 env[1216]: time="2025-05-17T00:30:44.817843507Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:30:44.818179 env[1216]: time="2025-05-17T00:30:44.818124267Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:30:44.818720 env[1216]: time="2025-05-17T00:30:44.818641481Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/20326f008f438671742e2d4a580ffa5bc448cc6baea0fcc3b42b7cadcbb2d3c8 pid=3834 runtime=io.containerd.runc.v2 May 17 00:30:44.852066 systemd[1]: Started cri-containerd-20326f008f438671742e2d4a580ffa5bc448cc6baea0fcc3b42b7cadcbb2d3c8.scope. May 17 00:30:44.894000 audit[3856]: NETFILTER_CFG table=filter:111 family=2 entries=51 op=nft_register_chain pid=3856 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:30:44.894000 audit[3856]: SYSCALL arch=c000003e syscall=46 success=yes exit=27116 a0=3 a1=7ffd7b8cac70 a2=0 a3=7ffd7b8cac5c items=0 ppid=3365 pid=3856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:44.894000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:30:44.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.922000 audit: BPF prog-id=177 op=LOAD May 17 00:30:44.924000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.924000 audit[3844]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3834 pid=3844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:44.924000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230333236663030386634333836373137343265326434613538306666 May 17 00:30:44.925000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.925000 audit[3844]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3834 pid=3844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:44.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230333236663030386634333836373137343265326434613538306666 May 17 00:30:44.926000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.926000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.926000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.926000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.926000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.926000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.926000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.926000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.926000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.926000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.926000 audit: BPF prog-id=178 op=LOAD May 17 00:30:44.926000 audit[3844]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00025fce0 items=0 ppid=3834 pid=3844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:44.926000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230333236663030386634333836373137343265326434613538306666 May 17 00:30:44.928000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.928000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.928000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.928000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.928000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.928000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.928000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.928000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.928000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.928000 audit: BPF prog-id=179 op=LOAD May 17 00:30:44.928000 audit[3844]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00025fd28 items=0 ppid=3834 pid=3844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:44.928000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230333236663030386634333836373137343265326434613538306666 May 17 00:30:44.930000 audit: BPF prog-id=179 op=UNLOAD May 17 00:30:44.930000 audit: BPF prog-id=178 op=UNLOAD May 17 00:30:44.931000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.931000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.931000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.931000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.931000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.931000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.931000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.931000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.931000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.931000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:44.931000 audit: BPF prog-id=180 op=LOAD May 17 00:30:44.931000 audit[3844]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003e2138 items=0 ppid=3834 pid=3844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:44.931000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230333236663030386634333836373137343265326434613538306666 May 17 00:30:44.993074 systemd-networkd[1015]: caliafb2f81cc2f: Gained IPv6LL May 17 00:30:45.002061 env[1216]: time="2025-05-17T00:30:45.002000740Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5544b97fc-9jp6z,Uid:d7e6c2c3-1282-4564-8eee-869b9655c267,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"20326f008f438671742e2d4a580ffa5bc448cc6baea0fcc3b42b7cadcbb2d3c8\"" May 17 00:30:45.071778 env[1216]: time="2025-05-17T00:30:45.067771075Z" level=info msg="StopPodSandbox for \"700404bef465df98287b71107fad94c0a389122ae7534ced3f0eaeed6a6d8246\"" May 17 00:30:45.071778 env[1216]: time="2025-05-17T00:30:45.068720647Z" level=info msg="StopPodSandbox for \"4c35600aa5b627fbb3ef3071e9d4c28f2c17eedb7a64fe05b2cf6d7966a6bd7c\"" May 17 00:30:45.187912 systemd-networkd[1015]: cali52f6af829ff: Gained IPv6LL May 17 00:30:45.458349 env[1216]: 2025-05-17 00:30:45.294 [INFO][3894] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="4c35600aa5b627fbb3ef3071e9d4c28f2c17eedb7a64fe05b2cf6d7966a6bd7c" May 17 00:30:45.458349 env[1216]: 2025-05-17 00:30:45.294 [INFO][3894] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="4c35600aa5b627fbb3ef3071e9d4c28f2c17eedb7a64fe05b2cf6d7966a6bd7c" iface="eth0" netns="/var/run/netns/cni-d5c86fdf-7580-b0b5-c1b2-2779993599cf" May 17 00:30:45.458349 env[1216]: 2025-05-17 00:30:45.298 [INFO][3894] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="4c35600aa5b627fbb3ef3071e9d4c28f2c17eedb7a64fe05b2cf6d7966a6bd7c" iface="eth0" netns="/var/run/netns/cni-d5c86fdf-7580-b0b5-c1b2-2779993599cf" May 17 00:30:45.458349 env[1216]: 2025-05-17 00:30:45.299 [INFO][3894] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="4c35600aa5b627fbb3ef3071e9d4c28f2c17eedb7a64fe05b2cf6d7966a6bd7c" iface="eth0" netns="/var/run/netns/cni-d5c86fdf-7580-b0b5-c1b2-2779993599cf" May 17 00:30:45.458349 env[1216]: 2025-05-17 00:30:45.299 [INFO][3894] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="4c35600aa5b627fbb3ef3071e9d4c28f2c17eedb7a64fe05b2cf6d7966a6bd7c" May 17 00:30:45.458349 env[1216]: 2025-05-17 00:30:45.299 [INFO][3894] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4c35600aa5b627fbb3ef3071e9d4c28f2c17eedb7a64fe05b2cf6d7966a6bd7c" May 17 00:30:45.458349 env[1216]: 2025-05-17 00:30:45.421 [INFO][3903] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4c35600aa5b627fbb3ef3071e9d4c28f2c17eedb7a64fe05b2cf6d7966a6bd7c" HandleID="k8s-pod-network.4c35600aa5b627fbb3ef3071e9d4c28f2c17eedb7a64fe05b2cf6d7966a6bd7c" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-coredns--674b8bbfcf--gslzx-eth0" May 17 00:30:45.458349 env[1216]: 2025-05-17 00:30:45.422 [INFO][3903] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:30:45.458349 env[1216]: 2025-05-17 00:30:45.422 [INFO][3903] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:30:45.458349 env[1216]: 2025-05-17 00:30:45.444 [WARNING][3903] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4c35600aa5b627fbb3ef3071e9d4c28f2c17eedb7a64fe05b2cf6d7966a6bd7c" HandleID="k8s-pod-network.4c35600aa5b627fbb3ef3071e9d4c28f2c17eedb7a64fe05b2cf6d7966a6bd7c" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-coredns--674b8bbfcf--gslzx-eth0" May 17 00:30:45.458349 env[1216]: 2025-05-17 00:30:45.444 [INFO][3903] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4c35600aa5b627fbb3ef3071e9d4c28f2c17eedb7a64fe05b2cf6d7966a6bd7c" HandleID="k8s-pod-network.4c35600aa5b627fbb3ef3071e9d4c28f2c17eedb7a64fe05b2cf6d7966a6bd7c" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-coredns--674b8bbfcf--gslzx-eth0" May 17 00:30:45.458349 env[1216]: 2025-05-17 00:30:45.453 [INFO][3903] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:30:45.458349 env[1216]: 2025-05-17 00:30:45.455 [INFO][3894] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="4c35600aa5b627fbb3ef3071e9d4c28f2c17eedb7a64fe05b2cf6d7966a6bd7c" May 17 00:30:45.465458 systemd[1]: run-netns-cni\x2dd5c86fdf\x2d7580\x2db0b5\x2dc1b2\x2d2779993599cf.mount: Deactivated successfully. May 17 00:30:45.468524 env[1216]: time="2025-05-17T00:30:45.468461011Z" level=info msg="TearDown network for sandbox \"4c35600aa5b627fbb3ef3071e9d4c28f2c17eedb7a64fe05b2cf6d7966a6bd7c\" successfully" May 17 00:30:45.468786 env[1216]: time="2025-05-17T00:30:45.468705044Z" level=info msg="StopPodSandbox for \"4c35600aa5b627fbb3ef3071e9d4c28f2c17eedb7a64fe05b2cf6d7966a6bd7c\" returns successfully" May 17 00:30:45.470290 env[1216]: time="2025-05-17T00:30:45.470241835Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-gslzx,Uid:9ee031f2-ed1e-4d3c-b82c-99c5de10f1f4,Namespace:kube-system,Attempt:1,}" May 17 00:30:45.553995 env[1216]: 2025-05-17 00:30:45.333 [INFO][3887] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="700404bef465df98287b71107fad94c0a389122ae7534ced3f0eaeed6a6d8246" May 17 00:30:45.553995 env[1216]: 2025-05-17 00:30:45.333 [INFO][3887] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="700404bef465df98287b71107fad94c0a389122ae7534ced3f0eaeed6a6d8246" iface="eth0" netns="/var/run/netns/cni-8d47292b-bea4-47b2-42b4-6e5c6716093a" May 17 00:30:45.553995 env[1216]: 2025-05-17 00:30:45.334 [INFO][3887] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="700404bef465df98287b71107fad94c0a389122ae7534ced3f0eaeed6a6d8246" iface="eth0" netns="/var/run/netns/cni-8d47292b-bea4-47b2-42b4-6e5c6716093a" May 17 00:30:45.553995 env[1216]: 2025-05-17 00:30:45.334 [INFO][3887] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="700404bef465df98287b71107fad94c0a389122ae7534ced3f0eaeed6a6d8246" iface="eth0" netns="/var/run/netns/cni-8d47292b-bea4-47b2-42b4-6e5c6716093a" May 17 00:30:45.553995 env[1216]: 2025-05-17 00:30:45.334 [INFO][3887] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="700404bef465df98287b71107fad94c0a389122ae7534ced3f0eaeed6a6d8246" May 17 00:30:45.553995 env[1216]: 2025-05-17 00:30:45.334 [INFO][3887] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="700404bef465df98287b71107fad94c0a389122ae7534ced3f0eaeed6a6d8246" May 17 00:30:45.553995 env[1216]: 2025-05-17 00:30:45.498 [INFO][3909] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="700404bef465df98287b71107fad94c0a389122ae7534ced3f0eaeed6a6d8246" HandleID="k8s-pod-network.700404bef465df98287b71107fad94c0a389122ae7534ced3f0eaeed6a6d8246" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-calico--kube--controllers--5c756f7665--l4qrm-eth0" May 17 00:30:45.553995 env[1216]: 2025-05-17 00:30:45.499 [INFO][3909] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:30:45.553995 env[1216]: 2025-05-17 00:30:45.499 [INFO][3909] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:30:45.553995 env[1216]: 2025-05-17 00:30:45.535 [WARNING][3909] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="700404bef465df98287b71107fad94c0a389122ae7534ced3f0eaeed6a6d8246" HandleID="k8s-pod-network.700404bef465df98287b71107fad94c0a389122ae7534ced3f0eaeed6a6d8246" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-calico--kube--controllers--5c756f7665--l4qrm-eth0" May 17 00:30:45.553995 env[1216]: 2025-05-17 00:30:45.535 [INFO][3909] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="700404bef465df98287b71107fad94c0a389122ae7534ced3f0eaeed6a6d8246" HandleID="k8s-pod-network.700404bef465df98287b71107fad94c0a389122ae7534ced3f0eaeed6a6d8246" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-calico--kube--controllers--5c756f7665--l4qrm-eth0" May 17 00:30:45.553995 env[1216]: 2025-05-17 00:30:45.541 [INFO][3909] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:30:45.553995 env[1216]: 2025-05-17 00:30:45.544 [INFO][3887] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="700404bef465df98287b71107fad94c0a389122ae7534ced3f0eaeed6a6d8246" May 17 00:30:45.560297 systemd[1]: run-netns-cni\x2d8d47292b\x2dbea4\x2d47b2\x2d42b4\x2d6e5c6716093a.mount: Deactivated successfully. May 17 00:30:45.564923 env[1216]: time="2025-05-17T00:30:45.564861046Z" level=info msg="TearDown network for sandbox \"700404bef465df98287b71107fad94c0a389122ae7534ced3f0eaeed6a6d8246\" successfully" May 17 00:30:45.565189 env[1216]: time="2025-05-17T00:30:45.565147953Z" level=info msg="StopPodSandbox for \"700404bef465df98287b71107fad94c0a389122ae7534ced3f0eaeed6a6d8246\" returns successfully" May 17 00:30:45.572632 env[1216]: time="2025-05-17T00:30:45.572570027Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5c756f7665-l4qrm,Uid:65f0f637-2986-4c66-955a-c220f11cf598,Namespace:calico-system,Attempt:1,}" May 17 00:30:45.752000 audit[3944]: NETFILTER_CFG table=filter:112 family=2 entries=17 op=nft_register_rule pid=3944 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:30:45.752000 audit[3944]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffd55c63c40 a2=0 a3=7ffd55c63c2c items=0 ppid=2176 pid=3944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:45.752000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:30:45.764000 audit[3944]: NETFILTER_CFG table=nat:113 family=2 entries=35 op=nft_register_chain pid=3944 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:30:45.764000 audit[3944]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffd55c63c40 a2=0 a3=7ffd55c63c2c items=0 ppid=2176 pid=3944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:45.764000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:30:45.954480 systemd-networkd[1015]: cali5282290c704: Link UP May 17 00:30:45.957510 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:30:45.965730 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5282290c704: link becomes ready May 17 00:30:45.967857 systemd-networkd[1015]: cali5282290c704: Gained carrier May 17 00:30:46.013051 env[1216]: 2025-05-17 00:30:45.679 [INFO][3916] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-coredns--674b8bbfcf--gslzx-eth0 coredns-674b8bbfcf- kube-system 9ee031f2-ed1e-4d3c-b82c-99c5de10f1f4 959 0 2025-05-17 00:30:01 +0000 UTC map[k8s-app:kube-dns pod-template-hash:674b8bbfcf projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7 coredns-674b8bbfcf-gslzx eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali5282290c704 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] [] }} ContainerID="a3f33694f994aedb7e80cf1f44e989c089e7803da96ab962627949944d739a90" Namespace="kube-system" Pod="coredns-674b8bbfcf-gslzx" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-coredns--674b8bbfcf--gslzx-" May 17 00:30:46.013051 env[1216]: 2025-05-17 00:30:45.680 [INFO][3916] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="a3f33694f994aedb7e80cf1f44e989c089e7803da96ab962627949944d739a90" Namespace="kube-system" Pod="coredns-674b8bbfcf-gslzx" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-coredns--674b8bbfcf--gslzx-eth0" May 17 00:30:46.013051 env[1216]: 2025-05-17 00:30:45.826 [INFO][3939] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a3f33694f994aedb7e80cf1f44e989c089e7803da96ab962627949944d739a90" HandleID="k8s-pod-network.a3f33694f994aedb7e80cf1f44e989c089e7803da96ab962627949944d739a90" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-coredns--674b8bbfcf--gslzx-eth0" May 17 00:30:46.013051 env[1216]: 2025-05-17 00:30:45.828 [INFO][3939] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="a3f33694f994aedb7e80cf1f44e989c089e7803da96ab962627949944d739a90" HandleID="k8s-pod-network.a3f33694f994aedb7e80cf1f44e989c089e7803da96ab962627949944d739a90" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-coredns--674b8bbfcf--gslzx-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000235700), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7", "pod":"coredns-674b8bbfcf-gslzx", "timestamp":"2025-05-17 00:30:45.826752592 +0000 UTC"}, Hostname:"ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:30:46.013051 env[1216]: 2025-05-17 00:30:45.828 [INFO][3939] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:30:46.013051 env[1216]: 2025-05-17 00:30:45.828 [INFO][3939] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:30:46.013051 env[1216]: 2025-05-17 00:30:45.828 [INFO][3939] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7' May 17 00:30:46.013051 env[1216]: 2025-05-17 00:30:45.865 [INFO][3939] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.a3f33694f994aedb7e80cf1f44e989c089e7803da96ab962627949944d739a90" host="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:30:46.013051 env[1216]: 2025-05-17 00:30:45.891 [INFO][3939] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:30:46.013051 env[1216]: 2025-05-17 00:30:45.904 [INFO][3939] ipam/ipam.go 511: Trying affinity for 192.168.71.192/26 host="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:30:46.013051 env[1216]: 2025-05-17 00:30:45.907 [INFO][3939] ipam/ipam.go 158: Attempting to load block cidr=192.168.71.192/26 host="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:30:46.013051 env[1216]: 2025-05-17 00:30:45.911 [INFO][3939] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.71.192/26 host="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:30:46.013051 env[1216]: 2025-05-17 00:30:45.912 [INFO][3939] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.71.192/26 handle="k8s-pod-network.a3f33694f994aedb7e80cf1f44e989c089e7803da96ab962627949944d739a90" host="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:30:46.013051 env[1216]: 2025-05-17 00:30:45.919 [INFO][3939] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.a3f33694f994aedb7e80cf1f44e989c089e7803da96ab962627949944d739a90 May 17 00:30:46.013051 env[1216]: 2025-05-17 00:30:45.929 [INFO][3939] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.71.192/26 handle="k8s-pod-network.a3f33694f994aedb7e80cf1f44e989c089e7803da96ab962627949944d739a90" host="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:30:46.013051 env[1216]: 2025-05-17 00:30:45.941 [INFO][3939] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.71.197/26] block=192.168.71.192/26 handle="k8s-pod-network.a3f33694f994aedb7e80cf1f44e989c089e7803da96ab962627949944d739a90" host="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:30:46.013051 env[1216]: 2025-05-17 00:30:45.941 [INFO][3939] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.71.197/26] handle="k8s-pod-network.a3f33694f994aedb7e80cf1f44e989c089e7803da96ab962627949944d739a90" host="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:30:46.013051 env[1216]: 2025-05-17 00:30:45.941 [INFO][3939] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:30:46.013051 env[1216]: 2025-05-17 00:30:45.941 [INFO][3939] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.71.197/26] IPv6=[] ContainerID="a3f33694f994aedb7e80cf1f44e989c089e7803da96ab962627949944d739a90" HandleID="k8s-pod-network.a3f33694f994aedb7e80cf1f44e989c089e7803da96ab962627949944d739a90" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-coredns--674b8bbfcf--gslzx-eth0" May 17 00:30:46.014611 env[1216]: 2025-05-17 00:30:45.945 [INFO][3916] cni-plugin/k8s.go 418: Populated endpoint ContainerID="a3f33694f994aedb7e80cf1f44e989c089e7803da96ab962627949944d739a90" Namespace="kube-system" Pod="coredns-674b8bbfcf-gslzx" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-coredns--674b8bbfcf--gslzx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-coredns--674b8bbfcf--gslzx-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"9ee031f2-ed1e-4d3c-b82c-99c5de10f1f4", ResourceVersion:"959", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 30, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7", ContainerID:"", Pod:"coredns-674b8bbfcf-gslzx", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.71.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali5282290c704", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:30:46.014611 env[1216]: 2025-05-17 00:30:45.945 [INFO][3916] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.71.197/32] ContainerID="a3f33694f994aedb7e80cf1f44e989c089e7803da96ab962627949944d739a90" Namespace="kube-system" Pod="coredns-674b8bbfcf-gslzx" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-coredns--674b8bbfcf--gslzx-eth0" May 17 00:30:46.014611 env[1216]: 2025-05-17 00:30:45.945 [INFO][3916] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5282290c704 ContainerID="a3f33694f994aedb7e80cf1f44e989c089e7803da96ab962627949944d739a90" Namespace="kube-system" Pod="coredns-674b8bbfcf-gslzx" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-coredns--674b8bbfcf--gslzx-eth0" May 17 00:30:46.014611 env[1216]: 2025-05-17 00:30:45.974 [INFO][3916] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="a3f33694f994aedb7e80cf1f44e989c089e7803da96ab962627949944d739a90" Namespace="kube-system" Pod="coredns-674b8bbfcf-gslzx" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-coredns--674b8bbfcf--gslzx-eth0" May 17 00:30:46.014611 env[1216]: 2025-05-17 00:30:45.975 [INFO][3916] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="a3f33694f994aedb7e80cf1f44e989c089e7803da96ab962627949944d739a90" Namespace="kube-system" Pod="coredns-674b8bbfcf-gslzx" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-coredns--674b8bbfcf--gslzx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-coredns--674b8bbfcf--gslzx-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"9ee031f2-ed1e-4d3c-b82c-99c5de10f1f4", ResourceVersion:"959", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 30, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7", ContainerID:"a3f33694f994aedb7e80cf1f44e989c089e7803da96ab962627949944d739a90", Pod:"coredns-674b8bbfcf-gslzx", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.71.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali5282290c704", MAC:"ba:9b:48:2c:ce:17", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:30:46.014611 env[1216]: 2025-05-17 00:30:46.007 [INFO][3916] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="a3f33694f994aedb7e80cf1f44e989c089e7803da96ab962627949944d739a90" Namespace="kube-system" Pod="coredns-674b8bbfcf-gslzx" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-coredns--674b8bbfcf--gslzx-eth0" May 17 00:30:46.018723 systemd-networkd[1015]: calia62815005d1: Gained IPv6LL May 17 00:30:46.062767 env[1216]: time="2025-05-17T00:30:46.062313861Z" level=info msg="StopPodSandbox for \"58932c4b7aa6a5543cee3a7c44937a02226c27c679f070c83059d1da270053cd\"" May 17 00:30:46.112751 systemd-networkd[1015]: cali266118db8a4: Link UP May 17 00:30:46.123456 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali266118db8a4: link becomes ready May 17 00:30:46.124021 systemd-networkd[1015]: cali266118db8a4: Gained carrier May 17 00:30:46.138386 env[1216]: time="2025-05-17T00:30:46.138254910Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:30:46.138386 env[1216]: time="2025-05-17T00:30:46.138320859Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:30:46.138386 env[1216]: time="2025-05-17T00:30:46.138346959Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:30:46.147727 env[1216]: time="2025-05-17T00:30:46.144182453Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a3f33694f994aedb7e80cf1f44e989c089e7803da96ab962627949944d739a90 pid=3977 runtime=io.containerd.runc.v2 May 17 00:30:46.174020 env[1216]: 2025-05-17 00:30:45.794 [INFO][3928] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-calico--kube--controllers--5c756f7665--l4qrm-eth0 calico-kube-controllers-5c756f7665- calico-system 65f0f637-2986-4c66-955a-c220f11cf598 961 0 2025-05-17 00:30:19 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:5c756f7665 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7 calico-kube-controllers-5c756f7665-l4qrm eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali266118db8a4 [] [] }} ContainerID="dfbed74dbb0dc557778b737aba341652f126ff206150e92d503686c7e264110d" Namespace="calico-system" Pod="calico-kube-controllers-5c756f7665-l4qrm" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-calico--kube--controllers--5c756f7665--l4qrm-" May 17 00:30:46.174020 env[1216]: 2025-05-17 00:30:45.794 [INFO][3928] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="dfbed74dbb0dc557778b737aba341652f126ff206150e92d503686c7e264110d" Namespace="calico-system" Pod="calico-kube-controllers-5c756f7665-l4qrm" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-calico--kube--controllers--5c756f7665--l4qrm-eth0" May 17 00:30:46.174020 env[1216]: 2025-05-17 00:30:45.898 [INFO][3947] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="dfbed74dbb0dc557778b737aba341652f126ff206150e92d503686c7e264110d" HandleID="k8s-pod-network.dfbed74dbb0dc557778b737aba341652f126ff206150e92d503686c7e264110d" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-calico--kube--controllers--5c756f7665--l4qrm-eth0" May 17 00:30:46.174020 env[1216]: 2025-05-17 00:30:45.900 [INFO][3947] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="dfbed74dbb0dc557778b737aba341652f126ff206150e92d503686c7e264110d" HandleID="k8s-pod-network.dfbed74dbb0dc557778b737aba341652f126ff206150e92d503686c7e264110d" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-calico--kube--controllers--5c756f7665--l4qrm-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002adc50), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7", "pod":"calico-kube-controllers-5c756f7665-l4qrm", "timestamp":"2025-05-17 00:30:45.898893723 +0000 UTC"}, Hostname:"ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:30:46.174020 env[1216]: 2025-05-17 00:30:45.901 [INFO][3947] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:30:46.174020 env[1216]: 2025-05-17 00:30:45.941 [INFO][3947] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:30:46.174020 env[1216]: 2025-05-17 00:30:45.941 [INFO][3947] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7' May 17 00:30:46.174020 env[1216]: 2025-05-17 00:30:45.998 [INFO][3947] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.dfbed74dbb0dc557778b737aba341652f126ff206150e92d503686c7e264110d" host="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:30:46.174020 env[1216]: 2025-05-17 00:30:46.022 [INFO][3947] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:30:46.174020 env[1216]: 2025-05-17 00:30:46.034 [INFO][3947] ipam/ipam.go 511: Trying affinity for 192.168.71.192/26 host="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:30:46.174020 env[1216]: 2025-05-17 00:30:46.037 [INFO][3947] ipam/ipam.go 158: Attempting to load block cidr=192.168.71.192/26 host="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:30:46.174020 env[1216]: 2025-05-17 00:30:46.042 [INFO][3947] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.71.192/26 host="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:30:46.174020 env[1216]: 2025-05-17 00:30:46.043 [INFO][3947] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.71.192/26 handle="k8s-pod-network.dfbed74dbb0dc557778b737aba341652f126ff206150e92d503686c7e264110d" host="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:30:46.174020 env[1216]: 2025-05-17 00:30:46.049 [INFO][3947] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.dfbed74dbb0dc557778b737aba341652f126ff206150e92d503686c7e264110d May 17 00:30:46.174020 env[1216]: 2025-05-17 00:30:46.058 [INFO][3947] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.71.192/26 handle="k8s-pod-network.dfbed74dbb0dc557778b737aba341652f126ff206150e92d503686c7e264110d" host="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:30:46.174020 env[1216]: 2025-05-17 00:30:46.091 [INFO][3947] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.71.198/26] block=192.168.71.192/26 handle="k8s-pod-network.dfbed74dbb0dc557778b737aba341652f126ff206150e92d503686c7e264110d" host="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:30:46.174020 env[1216]: 2025-05-17 00:30:46.091 [INFO][3947] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.71.198/26] handle="k8s-pod-network.dfbed74dbb0dc557778b737aba341652f126ff206150e92d503686c7e264110d" host="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:30:46.174020 env[1216]: 2025-05-17 00:30:46.091 [INFO][3947] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:30:46.174020 env[1216]: 2025-05-17 00:30:46.091 [INFO][3947] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.71.198/26] IPv6=[] ContainerID="dfbed74dbb0dc557778b737aba341652f126ff206150e92d503686c7e264110d" HandleID="k8s-pod-network.dfbed74dbb0dc557778b737aba341652f126ff206150e92d503686c7e264110d" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-calico--kube--controllers--5c756f7665--l4qrm-eth0" May 17 00:30:46.178489 env[1216]: 2025-05-17 00:30:46.095 [INFO][3928] cni-plugin/k8s.go 418: Populated endpoint ContainerID="dfbed74dbb0dc557778b737aba341652f126ff206150e92d503686c7e264110d" Namespace="calico-system" Pod="calico-kube-controllers-5c756f7665-l4qrm" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-calico--kube--controllers--5c756f7665--l4qrm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-calico--kube--controllers--5c756f7665--l4qrm-eth0", GenerateName:"calico-kube-controllers-5c756f7665-", Namespace:"calico-system", SelfLink:"", UID:"65f0f637-2986-4c66-955a-c220f11cf598", ResourceVersion:"961", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 30, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5c756f7665", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7", ContainerID:"", Pod:"calico-kube-controllers-5c756f7665-l4qrm", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.71.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali266118db8a4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:30:46.178489 env[1216]: 2025-05-17 00:30:46.095 [INFO][3928] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.71.198/32] ContainerID="dfbed74dbb0dc557778b737aba341652f126ff206150e92d503686c7e264110d" Namespace="calico-system" Pod="calico-kube-controllers-5c756f7665-l4qrm" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-calico--kube--controllers--5c756f7665--l4qrm-eth0" May 17 00:30:46.178489 env[1216]: 2025-05-17 00:30:46.095 [INFO][3928] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali266118db8a4 ContainerID="dfbed74dbb0dc557778b737aba341652f126ff206150e92d503686c7e264110d" Namespace="calico-system" Pod="calico-kube-controllers-5c756f7665-l4qrm" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-calico--kube--controllers--5c756f7665--l4qrm-eth0" May 17 00:30:46.178489 env[1216]: 2025-05-17 00:30:46.126 [INFO][3928] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="dfbed74dbb0dc557778b737aba341652f126ff206150e92d503686c7e264110d" Namespace="calico-system" Pod="calico-kube-controllers-5c756f7665-l4qrm" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-calico--kube--controllers--5c756f7665--l4qrm-eth0" May 17 00:30:46.178489 env[1216]: 2025-05-17 00:30:46.141 [INFO][3928] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="dfbed74dbb0dc557778b737aba341652f126ff206150e92d503686c7e264110d" Namespace="calico-system" Pod="calico-kube-controllers-5c756f7665-l4qrm" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-calico--kube--controllers--5c756f7665--l4qrm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-calico--kube--controllers--5c756f7665--l4qrm-eth0", GenerateName:"calico-kube-controllers-5c756f7665-", Namespace:"calico-system", SelfLink:"", UID:"65f0f637-2986-4c66-955a-c220f11cf598", ResourceVersion:"961", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 30, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5c756f7665", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7", ContainerID:"dfbed74dbb0dc557778b737aba341652f126ff206150e92d503686c7e264110d", Pod:"calico-kube-controllers-5c756f7665-l4qrm", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.71.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali266118db8a4", MAC:"42:88:57:1f:86:5b", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:30:46.178489 env[1216]: 2025-05-17 00:30:46.170 [INFO][3928] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="dfbed74dbb0dc557778b737aba341652f126ff206150e92d503686c7e264110d" Namespace="calico-system" Pod="calico-kube-controllers-5c756f7665-l4qrm" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-calico--kube--controllers--5c756f7665--l4qrm-eth0" May 17 00:30:46.238013 systemd[1]: Started cri-containerd-a3f33694f994aedb7e80cf1f44e989c089e7803da96ab962627949944d739a90.scope. May 17 00:30:46.257959 env[1216]: time="2025-05-17T00:30:46.257111225Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:30:46.257959 env[1216]: time="2025-05-17T00:30:46.257174739Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:30:46.257959 env[1216]: time="2025-05-17T00:30:46.257198654Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:30:46.257959 env[1216]: time="2025-05-17T00:30:46.257451113Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/dfbed74dbb0dc557778b737aba341652f126ff206150e92d503686c7e264110d pid=4016 runtime=io.containerd.runc.v2 May 17 00:30:46.319000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.319000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.319000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.319000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.319000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.319000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.319000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.319000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.319000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.319000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.319000 audit: BPF prog-id=181 op=LOAD May 17 00:30:46.320000 audit[3998]: AVC avc: denied { bpf } for pid=3998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.320000 audit[3998]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3977 pid=3998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:46.320000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133663333363934663939346165646237653830636631663434653938 May 17 00:30:46.320000 audit[3998]: AVC avc: denied { perfmon } for pid=3998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.320000 audit[3998]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3977 pid=3998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:46.320000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133663333363934663939346165646237653830636631663434653938 May 17 00:30:46.320000 audit[3998]: AVC avc: denied { bpf } for pid=3998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.320000 audit[3998]: AVC avc: denied { bpf } for pid=3998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.320000 audit[3998]: AVC avc: denied { bpf } for pid=3998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.320000 audit[3998]: AVC avc: denied { perfmon } for pid=3998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.320000 audit[3998]: AVC avc: denied { perfmon } for pid=3998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.320000 audit[3998]: AVC avc: denied { perfmon } for pid=3998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.320000 audit[3998]: AVC avc: denied { perfmon } for pid=3998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.320000 audit[3998]: AVC avc: denied { perfmon } for pid=3998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.320000 audit[3998]: AVC avc: denied { bpf } for pid=3998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.320000 audit[3998]: AVC avc: denied { bpf } for pid=3998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.320000 audit: BPF prog-id=182 op=LOAD May 17 00:30:46.320000 audit[3998]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00029c560 items=0 ppid=3977 pid=3998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:46.320000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133663333363934663939346165646237653830636631663434653938 May 17 00:30:46.321000 audit[3998]: AVC avc: denied { bpf } for pid=3998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.321000 audit[3998]: AVC avc: denied { bpf } for pid=3998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.321000 audit[3998]: AVC avc: denied { perfmon } for pid=3998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.321000 audit[3998]: AVC avc: denied { perfmon } for pid=3998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.321000 audit[3998]: AVC avc: denied { perfmon } for pid=3998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.321000 audit[3998]: AVC avc: denied { perfmon } for pid=3998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.321000 audit[3998]: AVC avc: denied { perfmon } for pid=3998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.321000 audit[3998]: AVC avc: denied { bpf } for pid=3998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.321000 audit[3998]: AVC avc: denied { bpf } for pid=3998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.321000 audit: BPF prog-id=183 op=LOAD May 17 00:30:46.321000 audit[3998]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00029c5a8 items=0 ppid=3977 pid=3998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:46.321000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133663333363934663939346165646237653830636631663434653938 May 17 00:30:46.321000 audit: BPF prog-id=183 op=UNLOAD May 17 00:30:46.321000 audit: BPF prog-id=182 op=UNLOAD May 17 00:30:46.321000 audit[3998]: AVC avc: denied { bpf } for pid=3998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.321000 audit[3998]: AVC avc: denied { bpf } for pid=3998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.321000 audit[3998]: AVC avc: denied { bpf } for pid=3998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.321000 audit[3998]: AVC avc: denied { perfmon } for pid=3998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.321000 audit[3998]: AVC avc: denied { perfmon } for pid=3998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.321000 audit[3998]: AVC avc: denied { perfmon } for pid=3998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.321000 audit[3998]: AVC avc: denied { perfmon } for pid=3998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.321000 audit[3998]: AVC avc: denied { perfmon } for pid=3998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.321000 audit[3998]: AVC avc: denied { bpf } for pid=3998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.321000 audit[3998]: AVC avc: denied { bpf } for pid=3998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.321000 audit: BPF prog-id=184 op=LOAD May 17 00:30:46.321000 audit[3998]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00029c9b8 items=0 ppid=3977 pid=3998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:46.321000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133663333363934663939346165646237653830636631663434653938 May 17 00:30:46.348000 audit[4037]: NETFILTER_CFG table=filter:114 family=2 entries=46 op=nft_register_chain pid=4037 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:30:46.348000 audit[4037]: SYSCALL arch=c000003e syscall=46 success=yes exit=23180 a0=3 a1=7ffe5603e9f0 a2=0 a3=7ffe5603e9dc items=0 ppid=3365 pid=4037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:46.348000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:30:46.423163 systemd[1]: Started cri-containerd-dfbed74dbb0dc557778b737aba341652f126ff206150e92d503686c7e264110d.scope. May 17 00:30:46.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.471000 audit: BPF prog-id=185 op=LOAD May 17 00:30:46.473000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.473000 audit[4036]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4016 pid=4036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:46.473000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466626564373464626230646335353737373862373337616261333431 May 17 00:30:46.474000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.474000 audit[4036]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4016 pid=4036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:46.474000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466626564373464626230646335353737373862373337616261333431 May 17 00:30:46.475000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.475000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.475000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.475000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.475000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.475000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.475000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.475000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.475000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.475000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.475000 audit: BPF prog-id=186 op=LOAD May 17 00:30:46.475000 audit[4036]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000025390 items=0 ppid=4016 pid=4036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:46.475000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466626564373464626230646335353737373862373337616261333431 May 17 00:30:46.477000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.477000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.477000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.477000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.477000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.477000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.477000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.477000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.477000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.477000 audit: BPF prog-id=187 op=LOAD May 17 00:30:46.477000 audit[4036]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0000253d8 items=0 ppid=4016 pid=4036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:46.477000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466626564373464626230646335353737373862373337616261333431 May 17 00:30:46.480000 audit: BPF prog-id=187 op=UNLOAD May 17 00:30:46.481000 audit: BPF prog-id=186 op=UNLOAD May 17 00:30:46.481000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.481000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.481000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.481000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.481000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.481000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.481000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.481000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.481000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.481000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.481000 audit: BPF prog-id=188 op=LOAD May 17 00:30:46.481000 audit[4036]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0000257e8 items=0 ppid=4016 pid=4036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:46.481000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466626564373464626230646335353737373862373337616261333431 May 17 00:30:46.493884 env[1216]: time="2025-05-17T00:30:46.493778386Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-gslzx,Uid:9ee031f2-ed1e-4d3c-b82c-99c5de10f1f4,Namespace:kube-system,Attempt:1,} returns sandbox id \"a3f33694f994aedb7e80cf1f44e989c089e7803da96ab962627949944d739a90\"" May 17 00:30:46.507378 env[1216]: time="2025-05-17T00:30:46.507305912Z" level=info msg="CreateContainer within sandbox \"a3f33694f994aedb7e80cf1f44e989c089e7803da96ab962627949944d739a90\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 17 00:30:46.548572 env[1216]: time="2025-05-17T00:30:46.548507264Z" level=info msg="CreateContainer within sandbox \"a3f33694f994aedb7e80cf1f44e989c089e7803da96ab962627949944d739a90\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"d014d1c5d4db8b9970c48f57cff04e94c0048692530beca59480faed7f450a61\"" May 17 00:30:46.550236 env[1216]: time="2025-05-17T00:30:46.550190878Z" level=info msg="StartContainer for \"d014d1c5d4db8b9970c48f57cff04e94c0048692530beca59480faed7f450a61\"" May 17 00:30:46.610000 audit[4074]: NETFILTER_CFG table=filter:115 family=2 entries=44 op=nft_register_chain pid=4074 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:30:46.610000 audit[4074]: SYSCALL arch=c000003e syscall=46 success=yes exit=21920 a0=3 a1=7fff40a03f90 a2=0 a3=7fff40a03f7c items=0 ppid=3365 pid=4074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:46.610000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:30:46.638557 env[1216]: time="2025-05-17T00:30:46.638492805Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5c756f7665-l4qrm,Uid:65f0f637-2986-4c66-955a-c220f11cf598,Namespace:calico-system,Attempt:1,} returns sandbox id \"dfbed74dbb0dc557778b737aba341652f126ff206150e92d503686c7e264110d\"" May 17 00:30:46.662985 env[1216]: 2025-05-17 00:30:46.484 [INFO][3990] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="58932c4b7aa6a5543cee3a7c44937a02226c27c679f070c83059d1da270053cd" May 17 00:30:46.662985 env[1216]: 2025-05-17 00:30:46.485 [INFO][3990] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="58932c4b7aa6a5543cee3a7c44937a02226c27c679f070c83059d1da270053cd" iface="eth0" netns="/var/run/netns/cni-56777ba8-efc0-658d-3afa-622d226ef20f" May 17 00:30:46.662985 env[1216]: 2025-05-17 00:30:46.488 [INFO][3990] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="58932c4b7aa6a5543cee3a7c44937a02226c27c679f070c83059d1da270053cd" iface="eth0" netns="/var/run/netns/cni-56777ba8-efc0-658d-3afa-622d226ef20f" May 17 00:30:46.662985 env[1216]: 2025-05-17 00:30:46.489 [INFO][3990] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="58932c4b7aa6a5543cee3a7c44937a02226c27c679f070c83059d1da270053cd" iface="eth0" netns="/var/run/netns/cni-56777ba8-efc0-658d-3afa-622d226ef20f" May 17 00:30:46.662985 env[1216]: 2025-05-17 00:30:46.489 [INFO][3990] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="58932c4b7aa6a5543cee3a7c44937a02226c27c679f070c83059d1da270053cd" May 17 00:30:46.662985 env[1216]: 2025-05-17 00:30:46.489 [INFO][3990] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="58932c4b7aa6a5543cee3a7c44937a02226c27c679f070c83059d1da270053cd" May 17 00:30:46.662985 env[1216]: 2025-05-17 00:30:46.637 [INFO][4068] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="58932c4b7aa6a5543cee3a7c44937a02226c27c679f070c83059d1da270053cd" HandleID="k8s-pod-network.58932c4b7aa6a5543cee3a7c44937a02226c27c679f070c83059d1da270053cd" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-csi--node--driver--f5rgx-eth0" May 17 00:30:46.662985 env[1216]: 2025-05-17 00:30:46.641 [INFO][4068] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:30:46.662985 env[1216]: 2025-05-17 00:30:46.641 [INFO][4068] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:30:46.662985 env[1216]: 2025-05-17 00:30:46.655 [WARNING][4068] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="58932c4b7aa6a5543cee3a7c44937a02226c27c679f070c83059d1da270053cd" HandleID="k8s-pod-network.58932c4b7aa6a5543cee3a7c44937a02226c27c679f070c83059d1da270053cd" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-csi--node--driver--f5rgx-eth0" May 17 00:30:46.662985 env[1216]: 2025-05-17 00:30:46.655 [INFO][4068] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="58932c4b7aa6a5543cee3a7c44937a02226c27c679f070c83059d1da270053cd" HandleID="k8s-pod-network.58932c4b7aa6a5543cee3a7c44937a02226c27c679f070c83059d1da270053cd" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-csi--node--driver--f5rgx-eth0" May 17 00:30:46.662985 env[1216]: 2025-05-17 00:30:46.658 [INFO][4068] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:30:46.662985 env[1216]: 2025-05-17 00:30:46.660 [INFO][3990] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="58932c4b7aa6a5543cee3a7c44937a02226c27c679f070c83059d1da270053cd" May 17 00:30:46.663906 env[1216]: time="2025-05-17T00:30:46.663177127Z" level=info msg="TearDown network for sandbox \"58932c4b7aa6a5543cee3a7c44937a02226c27c679f070c83059d1da270053cd\" successfully" May 17 00:30:46.663906 env[1216]: time="2025-05-17T00:30:46.663717483Z" level=info msg="StopPodSandbox for \"58932c4b7aa6a5543cee3a7c44937a02226c27c679f070c83059d1da270053cd\" returns successfully" May 17 00:30:46.671089 env[1216]: time="2025-05-17T00:30:46.664625074Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-f5rgx,Uid:5b8b07bb-2baf-4857-913a-a85ceb0e478f,Namespace:calico-system,Attempt:1,}" May 17 00:30:46.668643 systemd[1]: Started cri-containerd-d014d1c5d4db8b9970c48f57cff04e94c0048692530beca59480faed7f450a61.scope. May 17 00:30:46.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.712000 audit: BPF prog-id=189 op=LOAD May 17 00:30:46.713000 audit[4083]: AVC avc: denied { bpf } for pid=4083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.713000 audit[4083]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3977 pid=4083 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:46.713000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430313464316335643464623862393937306334386635376366663034 May 17 00:30:46.713000 audit[4083]: AVC avc: denied { perfmon } for pid=4083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.713000 audit[4083]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3977 pid=4083 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:46.713000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430313464316335643464623862393937306334386635376366663034 May 17 00:30:46.713000 audit[4083]: AVC avc: denied { bpf } for pid=4083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.713000 audit[4083]: AVC avc: denied { bpf } for pid=4083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.713000 audit[4083]: AVC avc: denied { bpf } for pid=4083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.713000 audit[4083]: AVC avc: denied { perfmon } for pid=4083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.713000 audit[4083]: AVC avc: denied { perfmon } for pid=4083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.713000 audit[4083]: AVC avc: denied { perfmon } for pid=4083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.713000 audit[4083]: AVC avc: denied { perfmon } for pid=4083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.713000 audit[4083]: AVC avc: denied { perfmon } for pid=4083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.713000 audit[4083]: AVC avc: denied { bpf } for pid=4083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.713000 audit[4083]: AVC avc: denied { bpf } for pid=4083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.713000 audit: BPF prog-id=190 op=LOAD May 17 00:30:46.713000 audit[4083]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000200880 items=0 ppid=3977 pid=4083 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:46.713000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430313464316335643464623862393937306334386635376366663034 May 17 00:30:46.714000 audit[4083]: AVC avc: denied { bpf } for pid=4083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.714000 audit[4083]: AVC avc: denied { bpf } for pid=4083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.714000 audit[4083]: AVC avc: denied { perfmon } for pid=4083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.714000 audit[4083]: AVC avc: denied { perfmon } for pid=4083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.714000 audit[4083]: AVC avc: denied { perfmon } for pid=4083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.714000 audit[4083]: AVC avc: denied { perfmon } for pid=4083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.714000 audit[4083]: AVC avc: denied { perfmon } for pid=4083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.714000 audit[4083]: AVC avc: denied { bpf } for pid=4083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.714000 audit[4083]: AVC avc: denied { bpf } for pid=4083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.714000 audit: BPF prog-id=191 op=LOAD May 17 00:30:46.714000 audit[4083]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002008c8 items=0 ppid=3977 pid=4083 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:46.714000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430313464316335643464623862393937306334386635376366663034 May 17 00:30:46.714000 audit: BPF prog-id=191 op=UNLOAD May 17 00:30:46.714000 audit: BPF prog-id=190 op=UNLOAD May 17 00:30:46.714000 audit[4083]: AVC avc: denied { bpf } for pid=4083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.714000 audit[4083]: AVC avc: denied { bpf } for pid=4083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.714000 audit[4083]: AVC avc: denied { bpf } for pid=4083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.714000 audit[4083]: AVC avc: denied { perfmon } for pid=4083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.714000 audit[4083]: AVC avc: denied { perfmon } for pid=4083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.714000 audit[4083]: AVC avc: denied { perfmon } for pid=4083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.714000 audit[4083]: AVC avc: denied { perfmon } for pid=4083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.714000 audit[4083]: AVC avc: denied { perfmon } for pid=4083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.714000 audit[4083]: AVC avc: denied { bpf } for pid=4083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.714000 audit[4083]: AVC avc: denied { bpf } for pid=4083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:46.714000 audit: BPF prog-id=192 op=LOAD May 17 00:30:46.714000 audit[4083]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000200cd8 items=0 ppid=3977 pid=4083 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:46.714000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430313464316335643464623862393937306334386635376366663034 May 17 00:30:46.765024 env[1216]: time="2025-05-17T00:30:46.764834887Z" level=info msg="StartContainer for \"d014d1c5d4db8b9970c48f57cff04e94c0048692530beca59480faed7f450a61\" returns successfully" May 17 00:30:46.795000 audit[4103]: AVC avc: denied { getattr } for pid=4103 comm="coredns" path="cgroup:[4026532682]" dev="nsfs" ino=4026532682 scontext=system_u:system_r:svirt_lxc_net_t:s0:c464,c920 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 May 17 00:30:46.795000 audit[4103]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c00014c918 a2=c0004ad898 a3=0 items=0 ppid=3977 pid=4103 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c464,c920 key=(null) May 17 00:30:46.795000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 May 17 00:30:47.038442 systemd-networkd[1015]: cali6188387439f: Link UP May 17 00:30:47.048513 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:30:47.062863 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali6188387439f: link becomes ready May 17 00:30:47.066015 systemd-networkd[1015]: cali6188387439f: Gained carrier May 17 00:30:47.068564 env[1216]: time="2025-05-17T00:30:47.068516803Z" level=info msg="StopPodSandbox for \"a4d0624842c5c7e1d944a9d2ce00c50c68a145628199d481361fdb7a7f4e9534\"" May 17 00:30:47.109169 env[1216]: 2025-05-17 00:30:46.809 [INFO][4104] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-csi--node--driver--f5rgx-eth0 csi-node-driver- calico-system 5b8b07bb-2baf-4857-913a-a85ceb0e478f 978 0 2025-05-17 00:30:19 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:78f6f74485 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7 csi-node-driver-f5rgx eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali6188387439f [] [] }} ContainerID="f85f0d148cc3b1c3ba7493b6d48448e53d0b4c90e5a8775b9c63abdb1729745c" Namespace="calico-system" Pod="csi-node-driver-f5rgx" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-csi--node--driver--f5rgx-" May 17 00:30:47.109169 env[1216]: 2025-05-17 00:30:46.809 [INFO][4104] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="f85f0d148cc3b1c3ba7493b6d48448e53d0b4c90e5a8775b9c63abdb1729745c" Namespace="calico-system" Pod="csi-node-driver-f5rgx" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-csi--node--driver--f5rgx-eth0" May 17 00:30:47.109169 env[1216]: 2025-05-17 00:30:46.930 [INFO][4133] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f85f0d148cc3b1c3ba7493b6d48448e53d0b4c90e5a8775b9c63abdb1729745c" HandleID="k8s-pod-network.f85f0d148cc3b1c3ba7493b6d48448e53d0b4c90e5a8775b9c63abdb1729745c" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-csi--node--driver--f5rgx-eth0" May 17 00:30:47.109169 env[1216]: 2025-05-17 00:30:46.930 [INFO][4133] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="f85f0d148cc3b1c3ba7493b6d48448e53d0b4c90e5a8775b9c63abdb1729745c" HandleID="k8s-pod-network.f85f0d148cc3b1c3ba7493b6d48448e53d0b4c90e5a8775b9c63abdb1729745c" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-csi--node--driver--f5rgx-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00004fa00), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7", "pod":"csi-node-driver-f5rgx", "timestamp":"2025-05-17 00:30:46.930006882 +0000 UTC"}, Hostname:"ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:30:47.109169 env[1216]: 2025-05-17 00:30:46.930 [INFO][4133] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:30:47.109169 env[1216]: 2025-05-17 00:30:46.930 [INFO][4133] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:30:47.109169 env[1216]: 2025-05-17 00:30:46.930 [INFO][4133] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7' May 17 00:30:47.109169 env[1216]: 2025-05-17 00:30:46.950 [INFO][4133] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.f85f0d148cc3b1c3ba7493b6d48448e53d0b4c90e5a8775b9c63abdb1729745c" host="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:30:47.109169 env[1216]: 2025-05-17 00:30:46.960 [INFO][4133] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:30:47.109169 env[1216]: 2025-05-17 00:30:46.981 [INFO][4133] ipam/ipam.go 511: Trying affinity for 192.168.71.192/26 host="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:30:47.109169 env[1216]: 2025-05-17 00:30:46.985 [INFO][4133] ipam/ipam.go 158: Attempting to load block cidr=192.168.71.192/26 host="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:30:47.109169 env[1216]: 2025-05-17 00:30:46.995 [INFO][4133] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.71.192/26 host="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:30:47.109169 env[1216]: 2025-05-17 00:30:46.995 [INFO][4133] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.71.192/26 handle="k8s-pod-network.f85f0d148cc3b1c3ba7493b6d48448e53d0b4c90e5a8775b9c63abdb1729745c" host="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:30:47.109169 env[1216]: 2025-05-17 00:30:47.001 [INFO][4133] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.f85f0d148cc3b1c3ba7493b6d48448e53d0b4c90e5a8775b9c63abdb1729745c May 17 00:30:47.109169 env[1216]: 2025-05-17 00:30:47.014 [INFO][4133] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.71.192/26 handle="k8s-pod-network.f85f0d148cc3b1c3ba7493b6d48448e53d0b4c90e5a8775b9c63abdb1729745c" host="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:30:47.109169 env[1216]: 2025-05-17 00:30:47.025 [INFO][4133] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.71.199/26] block=192.168.71.192/26 handle="k8s-pod-network.f85f0d148cc3b1c3ba7493b6d48448e53d0b4c90e5a8775b9c63abdb1729745c" host="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:30:47.109169 env[1216]: 2025-05-17 00:30:47.025 [INFO][4133] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.71.199/26] handle="k8s-pod-network.f85f0d148cc3b1c3ba7493b6d48448e53d0b4c90e5a8775b9c63abdb1729745c" host="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:30:47.109169 env[1216]: 2025-05-17 00:30:47.025 [INFO][4133] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:30:47.109169 env[1216]: 2025-05-17 00:30:47.025 [INFO][4133] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.71.199/26] IPv6=[] ContainerID="f85f0d148cc3b1c3ba7493b6d48448e53d0b4c90e5a8775b9c63abdb1729745c" HandleID="k8s-pod-network.f85f0d148cc3b1c3ba7493b6d48448e53d0b4c90e5a8775b9c63abdb1729745c" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-csi--node--driver--f5rgx-eth0" May 17 00:30:47.111146 env[1216]: 2025-05-17 00:30:47.029 [INFO][4104] cni-plugin/k8s.go 418: Populated endpoint ContainerID="f85f0d148cc3b1c3ba7493b6d48448e53d0b4c90e5a8775b9c63abdb1729745c" Namespace="calico-system" Pod="csi-node-driver-f5rgx" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-csi--node--driver--f5rgx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-csi--node--driver--f5rgx-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"5b8b07bb-2baf-4857-913a-a85ceb0e478f", ResourceVersion:"978", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 30, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7", ContainerID:"", Pod:"csi-node-driver-f5rgx", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.71.199/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali6188387439f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:30:47.111146 env[1216]: 2025-05-17 00:30:47.030 [INFO][4104] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.71.199/32] ContainerID="f85f0d148cc3b1c3ba7493b6d48448e53d0b4c90e5a8775b9c63abdb1729745c" Namespace="calico-system" Pod="csi-node-driver-f5rgx" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-csi--node--driver--f5rgx-eth0" May 17 00:30:47.111146 env[1216]: 2025-05-17 00:30:47.030 [INFO][4104] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali6188387439f ContainerID="f85f0d148cc3b1c3ba7493b6d48448e53d0b4c90e5a8775b9c63abdb1729745c" Namespace="calico-system" Pod="csi-node-driver-f5rgx" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-csi--node--driver--f5rgx-eth0" May 17 00:30:47.111146 env[1216]: 2025-05-17 00:30:47.040 [INFO][4104] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="f85f0d148cc3b1c3ba7493b6d48448e53d0b4c90e5a8775b9c63abdb1729745c" Namespace="calico-system" Pod="csi-node-driver-f5rgx" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-csi--node--driver--f5rgx-eth0" May 17 00:30:47.111146 env[1216]: 2025-05-17 00:30:47.069 [INFO][4104] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="f85f0d148cc3b1c3ba7493b6d48448e53d0b4c90e5a8775b9c63abdb1729745c" Namespace="calico-system" Pod="csi-node-driver-f5rgx" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-csi--node--driver--f5rgx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-csi--node--driver--f5rgx-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"5b8b07bb-2baf-4857-913a-a85ceb0e478f", ResourceVersion:"978", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 30, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7", ContainerID:"f85f0d148cc3b1c3ba7493b6d48448e53d0b4c90e5a8775b9c63abdb1729745c", Pod:"csi-node-driver-f5rgx", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.71.199/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali6188387439f", MAC:"f2:e6:5d:00:db:f1", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:30:47.111146 env[1216]: 2025-05-17 00:30:47.103 [INFO][4104] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="f85f0d148cc3b1c3ba7493b6d48448e53d0b4c90e5a8775b9c63abdb1729745c" Namespace="calico-system" Pod="csi-node-driver-f5rgx" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-csi--node--driver--f5rgx-eth0" May 17 00:30:47.180788 env[1216]: time="2025-05-17T00:30:47.180653418Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:30:47.181426 env[1216]: time="2025-05-17T00:30:47.180811553Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:30:47.181426 env[1216]: time="2025-05-17T00:30:47.180888151Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:30:47.181426 env[1216]: time="2025-05-17T00:30:47.181359956Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f85f0d148cc3b1c3ba7493b6d48448e53d0b4c90e5a8775b9c63abdb1729745c pid=4172 runtime=io.containerd.runc.v2 May 17 00:30:47.260902 systemd[1]: Started cri-containerd-f85f0d148cc3b1c3ba7493b6d48448e53d0b4c90e5a8775b9c63abdb1729745c.scope. May 17 00:30:47.280644 systemd[1]: run-netns-cni\x2d56777ba8\x2defc0\x2d658d\x2d3afa\x2d622d226ef20f.mount: Deactivated successfully. May 17 00:30:47.298632 systemd-networkd[1015]: cali5282290c704: Gained IPv6LL May 17 00:30:47.322000 audit[4197]: NETFILTER_CFG table=filter:116 family=2 entries=48 op=nft_register_chain pid=4197 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:30:47.322000 audit[4197]: SYSCALL arch=c000003e syscall=46 success=yes exit=23108 a0=3 a1=7ffc15af41e0 a2=0 a3=7ffc15af41cc items=0 ppid=3365 pid=4197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:47.322000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:30:47.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:47.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:47.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:47.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:47.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:47.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:47.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:47.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:47.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:47.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:47.378000 audit: BPF prog-id=193 op=LOAD May 17 00:30:47.379000 audit[4185]: AVC avc: denied { bpf } for pid=4185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:47.379000 audit[4185]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4172 pid=4185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:47.379000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638356630643134386363336231633362613734393362366434383434 May 17 00:30:47.380000 audit[4185]: AVC avc: denied { perfmon } for pid=4185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:47.380000 audit[4185]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4172 pid=4185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:47.380000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638356630643134386363336231633362613734393362366434383434 May 17 00:30:47.383000 audit[4185]: AVC avc: denied { bpf } for pid=4185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:47.383000 audit[4185]: AVC avc: denied { bpf } for pid=4185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:47.383000 audit[4185]: AVC avc: denied { bpf } for pid=4185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:47.383000 audit[4185]: AVC avc: denied { perfmon } for pid=4185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:47.383000 audit[4185]: AVC avc: denied { perfmon } for pid=4185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:47.383000 audit[4185]: AVC avc: denied { perfmon } for pid=4185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:47.383000 audit[4185]: AVC avc: denied { perfmon } for pid=4185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:47.383000 audit[4185]: AVC avc: denied { perfmon } for pid=4185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:47.383000 audit[4185]: AVC avc: denied { bpf } for pid=4185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:47.383000 audit[4185]: AVC avc: denied { bpf } for pid=4185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:47.383000 audit: BPF prog-id=194 op=LOAD May 17 00:30:47.383000 audit[4185]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00038d8a0 items=0 ppid=4172 pid=4185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:47.383000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638356630643134386363336231633362613734393362366434383434 May 17 00:30:47.384000 audit[4185]: AVC avc: denied { bpf } for pid=4185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:47.384000 audit[4185]: AVC avc: denied { bpf } for pid=4185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:47.384000 audit[4185]: AVC avc: denied { perfmon } for pid=4185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:47.384000 audit[4185]: AVC avc: denied { perfmon } for pid=4185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:47.384000 audit[4185]: AVC avc: denied { perfmon } for pid=4185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:47.384000 audit[4185]: AVC avc: denied { perfmon } for pid=4185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:47.384000 audit[4185]: AVC avc: denied { perfmon } for pid=4185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:47.384000 audit[4185]: AVC avc: denied { bpf } for pid=4185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:47.384000 audit[4185]: AVC avc: denied { bpf } for pid=4185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:47.384000 audit: BPF prog-id=195 op=LOAD May 17 00:30:47.384000 audit[4185]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00038d8e8 items=0 ppid=4172 pid=4185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:47.384000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638356630643134386363336231633362613734393362366434383434 May 17 00:30:47.384000 audit: BPF prog-id=195 op=UNLOAD May 17 00:30:47.384000 audit: BPF prog-id=194 op=UNLOAD May 17 00:30:47.384000 audit[4185]: AVC avc: denied { bpf } for pid=4185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:47.384000 audit[4185]: AVC avc: denied { bpf } for pid=4185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:47.384000 audit[4185]: AVC avc: denied { bpf } for pid=4185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:47.384000 audit[4185]: AVC avc: denied { perfmon } for pid=4185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:47.384000 audit[4185]: AVC avc: denied { perfmon } for pid=4185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:47.384000 audit[4185]: AVC avc: denied { perfmon } for pid=4185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:47.384000 audit[4185]: AVC avc: denied { perfmon } for pid=4185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:47.384000 audit[4185]: AVC avc: denied { perfmon } for pid=4185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:47.384000 audit[4185]: AVC avc: denied { bpf } for pid=4185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:47.384000 audit[4185]: AVC avc: denied { bpf } for pid=4185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:47.384000 audit: BPF prog-id=196 op=LOAD May 17 00:30:47.384000 audit[4185]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00038dcf8 items=0 ppid=4172 pid=4185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:47.384000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638356630643134386363336231633362613734393362366434383434 May 17 00:30:47.490533 env[1216]: time="2025-05-17T00:30:47.490474527Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-f5rgx,Uid:5b8b07bb-2baf-4857-913a-a85ceb0e478f,Namespace:calico-system,Attempt:1,} returns sandbox id \"f85f0d148cc3b1c3ba7493b6d48448e53d0b4c90e5a8775b9c63abdb1729745c\"" May 17 00:30:47.510902 env[1216]: 2025-05-17 00:30:47.360 [INFO][4168] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="a4d0624842c5c7e1d944a9d2ce00c50c68a145628199d481361fdb7a7f4e9534" May 17 00:30:47.510902 env[1216]: 2025-05-17 00:30:47.360 [INFO][4168] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="a4d0624842c5c7e1d944a9d2ce00c50c68a145628199d481361fdb7a7f4e9534" iface="eth0" netns="/var/run/netns/cni-35c01167-ea4a-1416-27c3-a4921ec67f48" May 17 00:30:47.510902 env[1216]: 2025-05-17 00:30:47.361 [INFO][4168] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="a4d0624842c5c7e1d944a9d2ce00c50c68a145628199d481361fdb7a7f4e9534" iface="eth0" netns="/var/run/netns/cni-35c01167-ea4a-1416-27c3-a4921ec67f48" May 17 00:30:47.510902 env[1216]: 2025-05-17 00:30:47.361 [INFO][4168] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="a4d0624842c5c7e1d944a9d2ce00c50c68a145628199d481361fdb7a7f4e9534" iface="eth0" netns="/var/run/netns/cni-35c01167-ea4a-1416-27c3-a4921ec67f48" May 17 00:30:47.510902 env[1216]: 2025-05-17 00:30:47.361 [INFO][4168] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="a4d0624842c5c7e1d944a9d2ce00c50c68a145628199d481361fdb7a7f4e9534" May 17 00:30:47.510902 env[1216]: 2025-05-17 00:30:47.361 [INFO][4168] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a4d0624842c5c7e1d944a9d2ce00c50c68a145628199d481361fdb7a7f4e9534" May 17 00:30:47.510902 env[1216]: 2025-05-17 00:30:47.476 [INFO][4208] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a4d0624842c5c7e1d944a9d2ce00c50c68a145628199d481361fdb7a7f4e9534" HandleID="k8s-pod-network.a4d0624842c5c7e1d944a9d2ce00c50c68a145628199d481361fdb7a7f4e9534" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-goldmane--78d55f7ddc--sx8fp-eth0" May 17 00:30:47.510902 env[1216]: 2025-05-17 00:30:47.478 [INFO][4208] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:30:47.510902 env[1216]: 2025-05-17 00:30:47.478 [INFO][4208] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:30:47.510902 env[1216]: 2025-05-17 00:30:47.498 [WARNING][4208] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a4d0624842c5c7e1d944a9d2ce00c50c68a145628199d481361fdb7a7f4e9534" HandleID="k8s-pod-network.a4d0624842c5c7e1d944a9d2ce00c50c68a145628199d481361fdb7a7f4e9534" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-goldmane--78d55f7ddc--sx8fp-eth0" May 17 00:30:47.510902 env[1216]: 2025-05-17 00:30:47.498 [INFO][4208] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a4d0624842c5c7e1d944a9d2ce00c50c68a145628199d481361fdb7a7f4e9534" HandleID="k8s-pod-network.a4d0624842c5c7e1d944a9d2ce00c50c68a145628199d481361fdb7a7f4e9534" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-goldmane--78d55f7ddc--sx8fp-eth0" May 17 00:30:47.510902 env[1216]: 2025-05-17 00:30:47.506 [INFO][4208] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:30:47.510902 env[1216]: 2025-05-17 00:30:47.508 [INFO][4168] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="a4d0624842c5c7e1d944a9d2ce00c50c68a145628199d481361fdb7a7f4e9534" May 17 00:30:47.517565 env[1216]: time="2025-05-17T00:30:47.516934125Z" level=info msg="TearDown network for sandbox \"a4d0624842c5c7e1d944a9d2ce00c50c68a145628199d481361fdb7a7f4e9534\" successfully" May 17 00:30:47.517565 env[1216]: time="2025-05-17T00:30:47.516987771Z" level=info msg="StopPodSandbox for \"a4d0624842c5c7e1d944a9d2ce00c50c68a145628199d481361fdb7a7f4e9534\" returns successfully" May 17 00:30:47.516411 systemd[1]: run-netns-cni\x2d35c01167\x2dea4a\x2d1416\x2d27c3\x2da4921ec67f48.mount: Deactivated successfully. May 17 00:30:47.522779 env[1216]: time="2025-05-17T00:30:47.522724285Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-78d55f7ddc-sx8fp,Uid:a859c06b-ce28-4cc1-830c-0d905598097c,Namespace:calico-system,Attempt:1,}" May 17 00:30:47.632003 kubelet[2047]: I0517 00:30:47.629166 2047 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-674b8bbfcf-gslzx" podStartSLOduration=46.629136854 podStartE2EDuration="46.629136854s" podCreationTimestamp="2025-05-17 00:30:01 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:30:47.628191607 +0000 UTC m=+52.917298497" watchObservedRunningTime="2025-05-17 00:30:47.629136854 +0000 UTC m=+52.918243744" May 17 00:30:47.764000 audit[4238]: NETFILTER_CFG table=filter:117 family=2 entries=14 op=nft_register_rule pid=4238 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:30:47.764000 audit[4238]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffd36d1b830 a2=0 a3=7ffd36d1b81c items=0 ppid=2176 pid=4238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:47.764000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:30:47.773000 audit[4238]: NETFILTER_CFG table=nat:118 family=2 entries=44 op=nft_register_rule pid=4238 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:30:47.773000 audit[4238]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffd36d1b830 a2=0 a3=7ffd36d1b81c items=0 ppid=2176 pid=4238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:47.773000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:30:47.836000 audit[4242]: NETFILTER_CFG table=filter:119 family=2 entries=14 op=nft_register_rule pid=4242 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:30:47.836000 audit[4242]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffe1d4edd90 a2=0 a3=7ffe1d4edd7c items=0 ppid=2176 pid=4242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:47.836000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:30:47.856000 audit[4242]: NETFILTER_CFG table=nat:120 family=2 entries=56 op=nft_register_chain pid=4242 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:30:47.856000 audit[4242]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffe1d4edd90 a2=0 a3=7ffe1d4edd7c items=0 ppid=2176 pid=4242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:47.856000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:30:47.918764 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali2089a515c9e: link becomes ready May 17 00:30:47.918521 systemd-networkd[1015]: cali2089a515c9e: Link UP May 17 00:30:47.920406 systemd-networkd[1015]: cali2089a515c9e: Gained carrier May 17 00:30:47.938467 systemd-networkd[1015]: cali266118db8a4: Gained IPv6LL May 17 00:30:47.955232 env[1216]: 2025-05-17 00:30:47.718 [INFO][4221] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-goldmane--78d55f7ddc--sx8fp-eth0 goldmane-78d55f7ddc- calico-system a859c06b-ce28-4cc1-830c-0d905598097c 990 0 2025-05-17 00:30:18 +0000 UTC map[app.kubernetes.io/name:goldmane k8s-app:goldmane pod-template-hash:78d55f7ddc projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:goldmane] map[] [] [] []} {k8s ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7 goldmane-78d55f7ddc-sx8fp eth0 goldmane [] [] [kns.calico-system ksa.calico-system.goldmane] cali2089a515c9e [] [] }} ContainerID="f80273787f4ea45fe2a310dc27e8b7dea73e5b38f83ec66d50c14935a74ff0b2" Namespace="calico-system" Pod="goldmane-78d55f7ddc-sx8fp" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-goldmane--78d55f7ddc--sx8fp-" May 17 00:30:47.955232 env[1216]: 2025-05-17 00:30:47.718 [INFO][4221] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="f80273787f4ea45fe2a310dc27e8b7dea73e5b38f83ec66d50c14935a74ff0b2" Namespace="calico-system" Pod="goldmane-78d55f7ddc-sx8fp" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-goldmane--78d55f7ddc--sx8fp-eth0" May 17 00:30:47.955232 env[1216]: 2025-05-17 00:30:47.812 [INFO][4234] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f80273787f4ea45fe2a310dc27e8b7dea73e5b38f83ec66d50c14935a74ff0b2" HandleID="k8s-pod-network.f80273787f4ea45fe2a310dc27e8b7dea73e5b38f83ec66d50c14935a74ff0b2" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-goldmane--78d55f7ddc--sx8fp-eth0" May 17 00:30:47.955232 env[1216]: 2025-05-17 00:30:47.818 [INFO][4234] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="f80273787f4ea45fe2a310dc27e8b7dea73e5b38f83ec66d50c14935a74ff0b2" HandleID="k8s-pod-network.f80273787f4ea45fe2a310dc27e8b7dea73e5b38f83ec66d50c14935a74ff0b2" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-goldmane--78d55f7ddc--sx8fp-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000235790), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7", "pod":"goldmane-78d55f7ddc-sx8fp", "timestamp":"2025-05-17 00:30:47.812787177 +0000 UTC"}, Hostname:"ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:30:47.955232 env[1216]: 2025-05-17 00:30:47.819 [INFO][4234] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:30:47.955232 env[1216]: 2025-05-17 00:30:47.819 [INFO][4234] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:30:47.955232 env[1216]: 2025-05-17 00:30:47.819 [INFO][4234] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7' May 17 00:30:47.955232 env[1216]: 2025-05-17 00:30:47.831 [INFO][4234] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.f80273787f4ea45fe2a310dc27e8b7dea73e5b38f83ec66d50c14935a74ff0b2" host="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:30:47.955232 env[1216]: 2025-05-17 00:30:47.841 [INFO][4234] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:30:47.955232 env[1216]: 2025-05-17 00:30:47.851 [INFO][4234] ipam/ipam.go 511: Trying affinity for 192.168.71.192/26 host="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:30:47.955232 env[1216]: 2025-05-17 00:30:47.854 [INFO][4234] ipam/ipam.go 158: Attempting to load block cidr=192.168.71.192/26 host="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:30:47.955232 env[1216]: 2025-05-17 00:30:47.869 [INFO][4234] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.71.192/26 host="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:30:47.955232 env[1216]: 2025-05-17 00:30:47.869 [INFO][4234] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.71.192/26 handle="k8s-pod-network.f80273787f4ea45fe2a310dc27e8b7dea73e5b38f83ec66d50c14935a74ff0b2" host="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:30:47.955232 env[1216]: 2025-05-17 00:30:47.875 [INFO][4234] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.f80273787f4ea45fe2a310dc27e8b7dea73e5b38f83ec66d50c14935a74ff0b2 May 17 00:30:47.955232 env[1216]: 2025-05-17 00:30:47.883 [INFO][4234] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.71.192/26 handle="k8s-pod-network.f80273787f4ea45fe2a310dc27e8b7dea73e5b38f83ec66d50c14935a74ff0b2" host="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:30:47.955232 env[1216]: 2025-05-17 00:30:47.900 [INFO][4234] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.71.200/26] block=192.168.71.192/26 handle="k8s-pod-network.f80273787f4ea45fe2a310dc27e8b7dea73e5b38f83ec66d50c14935a74ff0b2" host="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:30:47.955232 env[1216]: 2025-05-17 00:30:47.900 [INFO][4234] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.71.200/26] handle="k8s-pod-network.f80273787f4ea45fe2a310dc27e8b7dea73e5b38f83ec66d50c14935a74ff0b2" host="ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7" May 17 00:30:47.955232 env[1216]: 2025-05-17 00:30:47.900 [INFO][4234] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:30:47.955232 env[1216]: 2025-05-17 00:30:47.901 [INFO][4234] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.71.200/26] IPv6=[] ContainerID="f80273787f4ea45fe2a310dc27e8b7dea73e5b38f83ec66d50c14935a74ff0b2" HandleID="k8s-pod-network.f80273787f4ea45fe2a310dc27e8b7dea73e5b38f83ec66d50c14935a74ff0b2" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-goldmane--78d55f7ddc--sx8fp-eth0" May 17 00:30:47.956356 env[1216]: 2025-05-17 00:30:47.903 [INFO][4221] cni-plugin/k8s.go 418: Populated endpoint ContainerID="f80273787f4ea45fe2a310dc27e8b7dea73e5b38f83ec66d50c14935a74ff0b2" Namespace="calico-system" Pod="goldmane-78d55f7ddc-sx8fp" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-goldmane--78d55f7ddc--sx8fp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-goldmane--78d55f7ddc--sx8fp-eth0", GenerateName:"goldmane-78d55f7ddc-", Namespace:"calico-system", SelfLink:"", UID:"a859c06b-ce28-4cc1-830c-0d905598097c", ResourceVersion:"990", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 30, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"78d55f7ddc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7", ContainerID:"", Pod:"goldmane-78d55f7ddc-sx8fp", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.71.200/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali2089a515c9e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:30:47.956356 env[1216]: 2025-05-17 00:30:47.904 [INFO][4221] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.71.200/32] ContainerID="f80273787f4ea45fe2a310dc27e8b7dea73e5b38f83ec66d50c14935a74ff0b2" Namespace="calico-system" Pod="goldmane-78d55f7ddc-sx8fp" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-goldmane--78d55f7ddc--sx8fp-eth0" May 17 00:30:47.956356 env[1216]: 2025-05-17 00:30:47.904 [INFO][4221] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali2089a515c9e ContainerID="f80273787f4ea45fe2a310dc27e8b7dea73e5b38f83ec66d50c14935a74ff0b2" Namespace="calico-system" Pod="goldmane-78d55f7ddc-sx8fp" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-goldmane--78d55f7ddc--sx8fp-eth0" May 17 00:30:47.956356 env[1216]: 2025-05-17 00:30:47.922 [INFO][4221] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="f80273787f4ea45fe2a310dc27e8b7dea73e5b38f83ec66d50c14935a74ff0b2" Namespace="calico-system" Pod="goldmane-78d55f7ddc-sx8fp" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-goldmane--78d55f7ddc--sx8fp-eth0" May 17 00:30:47.956356 env[1216]: 2025-05-17 00:30:47.925 [INFO][4221] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="f80273787f4ea45fe2a310dc27e8b7dea73e5b38f83ec66d50c14935a74ff0b2" Namespace="calico-system" Pod="goldmane-78d55f7ddc-sx8fp" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-goldmane--78d55f7ddc--sx8fp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-goldmane--78d55f7ddc--sx8fp-eth0", GenerateName:"goldmane-78d55f7ddc-", Namespace:"calico-system", SelfLink:"", UID:"a859c06b-ce28-4cc1-830c-0d905598097c", ResourceVersion:"990", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 30, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"78d55f7ddc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7", ContainerID:"f80273787f4ea45fe2a310dc27e8b7dea73e5b38f83ec66d50c14935a74ff0b2", Pod:"goldmane-78d55f7ddc-sx8fp", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.71.200/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali2089a515c9e", MAC:"2e:d0:50:0d:cb:02", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:30:47.956356 env[1216]: 2025-05-17 00:30:47.950 [INFO][4221] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="f80273787f4ea45fe2a310dc27e8b7dea73e5b38f83ec66d50c14935a74ff0b2" Namespace="calico-system" Pod="goldmane-78d55f7ddc-sx8fp" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-goldmane--78d55f7ddc--sx8fp-eth0" May 17 00:30:48.007254 env[1216]: time="2025-05-17T00:30:48.007148296Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:30:48.007538 env[1216]: time="2025-05-17T00:30:48.007491374Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:30:48.007732 env[1216]: time="2025-05-17T00:30:48.007667399Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:30:48.008355 env[1216]: time="2025-05-17T00:30:48.008300738Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f80273787f4ea45fe2a310dc27e8b7dea73e5b38f83ec66d50c14935a74ff0b2 pid=4261 runtime=io.containerd.runc.v2 May 17 00:30:48.029000 audit[4270]: NETFILTER_CFG table=filter:121 family=2 entries=66 op=nft_register_chain pid=4270 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:30:48.029000 audit[4270]: SYSCALL arch=c000003e syscall=46 success=yes exit=32752 a0=3 a1=7ffd07597690 a2=0 a3=7ffd0759767c items=0 ppid=3365 pid=4270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:48.029000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:30:48.057032 systemd[1]: Started cri-containerd-f80273787f4ea45fe2a310dc27e8b7dea73e5b38f83ec66d50c14935a74ff0b2.scope. May 17 00:30:48.105000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:48.105000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:48.105000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:48.105000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:48.105000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:48.105000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:48.105000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:48.105000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:48.105000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:48.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:48.106000 audit: BPF prog-id=197 op=LOAD May 17 00:30:48.108000 audit[4272]: AVC avc: denied { bpf } for pid=4272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:48.108000 audit[4272]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4261 pid=4272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:48.108000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638303237333738376634656134356665326133313064633237653862 May 17 00:30:48.108000 audit[4272]: AVC avc: denied { perfmon } for pid=4272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:48.108000 audit[4272]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=4261 pid=4272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:48.108000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638303237333738376634656134356665326133313064633237653862 May 17 00:30:48.109000 audit[4272]: AVC avc: denied { bpf } for pid=4272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:48.109000 audit[4272]: AVC avc: denied { bpf } for pid=4272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:48.109000 audit[4272]: AVC avc: denied { bpf } for pid=4272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:48.109000 audit[4272]: AVC avc: denied { perfmon } for pid=4272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:48.109000 audit[4272]: AVC avc: denied { perfmon } for pid=4272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:48.109000 audit[4272]: AVC avc: denied { perfmon } for pid=4272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:48.109000 audit[4272]: AVC avc: denied { perfmon } for pid=4272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:48.109000 audit[4272]: AVC avc: denied { perfmon } for pid=4272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:48.109000 audit[4272]: AVC avc: denied { bpf } for pid=4272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:48.109000 audit[4272]: AVC avc: denied { bpf } for pid=4272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:48.109000 audit: BPF prog-id=198 op=LOAD May 17 00:30:48.109000 audit[4272]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003fa9f0 items=0 ppid=4261 pid=4272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:48.109000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638303237333738376634656134356665326133313064633237653862 May 17 00:30:48.110000 audit[4272]: AVC avc: denied { bpf } for pid=4272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:48.110000 audit[4272]: AVC avc: denied { bpf } for pid=4272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:48.110000 audit[4272]: AVC avc: denied { perfmon } for pid=4272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:48.110000 audit[4272]: AVC avc: denied { perfmon } for pid=4272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:48.110000 audit[4272]: AVC avc: denied { perfmon } for pid=4272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:48.110000 audit[4272]: AVC avc: denied { perfmon } for pid=4272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:48.110000 audit[4272]: AVC avc: denied { perfmon } for pid=4272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:48.110000 audit[4272]: AVC avc: denied { bpf } for pid=4272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:48.110000 audit[4272]: AVC avc: denied { bpf } for pid=4272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:48.110000 audit: BPF prog-id=199 op=LOAD May 17 00:30:48.110000 audit[4272]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003faa38 items=0 ppid=4261 pid=4272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:48.110000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638303237333738376634656134356665326133313064633237653862 May 17 00:30:48.111000 audit: BPF prog-id=199 op=UNLOAD May 17 00:30:48.112000 audit: BPF prog-id=198 op=UNLOAD May 17 00:30:48.112000 audit[4272]: AVC avc: denied { bpf } for pid=4272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:48.112000 audit[4272]: AVC avc: denied { bpf } for pid=4272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:48.112000 audit[4272]: AVC avc: denied { bpf } for pid=4272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:48.112000 audit[4272]: AVC avc: denied { perfmon } for pid=4272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:48.112000 audit[4272]: AVC avc: denied { perfmon } for pid=4272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:48.112000 audit[4272]: AVC avc: denied { perfmon } for pid=4272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:48.112000 audit[4272]: AVC avc: denied { perfmon } for pid=4272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:48.112000 audit[4272]: AVC avc: denied { perfmon } for pid=4272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:48.112000 audit[4272]: AVC avc: denied { bpf } for pid=4272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:48.112000 audit[4272]: AVC avc: denied { bpf } for pid=4272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:48.112000 audit: BPF prog-id=200 op=LOAD May 17 00:30:48.112000 audit[4272]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003fae48 items=0 ppid=4261 pid=4272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:48.112000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638303237333738376634656134356665326133313064633237653862 May 17 00:30:48.216636 env[1216]: time="2025-05-17T00:30:48.209619097Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-78d55f7ddc-sx8fp,Uid:a859c06b-ce28-4cc1-830c-0d905598097c,Namespace:calico-system,Attempt:1,} returns sandbox id \"f80273787f4ea45fe2a310dc27e8b7dea73e5b38f83ec66d50c14935a74ff0b2\"" May 17 00:30:48.514607 systemd-networkd[1015]: cali6188387439f: Gained IPv6LL May 17 00:30:49.197812 env[1216]: time="2025-05-17T00:30:49.197709557Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:30:49.200599 env[1216]: time="2025-05-17T00:30:49.200543296Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5fa544b30bbe7e24458b21b80890f8834eebe8bcb99071f6caded1a39fc59082,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:30:49.203731 env[1216]: time="2025-05-17T00:30:49.203659857Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:30:49.206117 env[1216]: time="2025-05-17T00:30:49.206067640Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:ad7d2e76f15777636c5d91c108d7655659b38fe8970255050ffa51223eb96ff4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:30:49.207345 env[1216]: time="2025-05-17T00:30:49.207183581Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\" returns image reference \"sha256:5fa544b30bbe7e24458b21b80890f8834eebe8bcb99071f6caded1a39fc59082\"" May 17 00:30:49.211801 env[1216]: time="2025-05-17T00:30:49.210328244Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\"" May 17 00:30:49.215546 env[1216]: time="2025-05-17T00:30:49.215497751Z" level=info msg="CreateContainer within sandbox \"e221be0eb2170ad0e7adcd5456b93abdc3c2e57af527fbbff7e64d532d423e11\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 17 00:30:49.246983 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2349826494.mount: Deactivated successfully. May 17 00:30:49.248509 env[1216]: time="2025-05-17T00:30:49.248441973Z" level=info msg="CreateContainer within sandbox \"e221be0eb2170ad0e7adcd5456b93abdc3c2e57af527fbbff7e64d532d423e11\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"5de0141e5da276e5e3880efe5ca9712e330eec7a538e76b94b70b2f44eeaac84\"" May 17 00:30:49.250843 env[1216]: time="2025-05-17T00:30:49.250759216Z" level=info msg="StartContainer for \"5de0141e5da276e5e3880efe5ca9712e330eec7a538e76b94b70b2f44eeaac84\"" May 17 00:30:49.305168 systemd[1]: Started cri-containerd-5de0141e5da276e5e3880efe5ca9712e330eec7a538e76b94b70b2f44eeaac84.scope. May 17 00:30:49.340625 kernel: kauditd_printk_skb: 622 callbacks suppressed May 17 00:30:49.340794 kernel: audit: type=1400 audit(1747441849.333:1290): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.362148 systemd-networkd[1015]: cali2089a515c9e: Gained IPv6LL May 17 00:30:49.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.384731 kernel: audit: type=1400 audit(1747441849.333:1291): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.406961 kernel: audit: type=1400 audit(1747441849.333:1292): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.428901 kernel: audit: type=1400 audit(1747441849.333:1293): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.453920 kernel: audit: type=1400 audit(1747441849.333:1294): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.483026 kernel: audit: type=1400 audit(1747441849.333:1295): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.505334 env[1216]: time="2025-05-17T00:30:49.498654895Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:30:49.505334 env[1216]: time="2025-05-17T00:30:49.504482243Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\" returns image reference \"sha256:5fa544b30bbe7e24458b21b80890f8834eebe8bcb99071f6caded1a39fc59082\"" May 17 00:30:49.505334 env[1216]: time="2025-05-17T00:30:49.505039352Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:5fa544b30bbe7e24458b21b80890f8834eebe8bcb99071f6caded1a39fc59082,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:30:49.506245 kernel: audit: type=1400 audit(1747441849.333:1296): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.506371 env[1216]: time="2025-05-17T00:30:49.506148236Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:30:49.530620 kernel: audit: type=1400 audit(1747441849.333:1297): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.530894 env[1216]: time="2025-05-17T00:30:49.513025870Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:ad7d2e76f15777636c5d91c108d7655659b38fe8970255050ffa51223eb96ff4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:30:49.530894 env[1216]: time="2025-05-17T00:30:49.530639803Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.0\"" May 17 00:30:49.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.580326 kernel: audit: type=1400 audit(1747441849.333:1298): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.580482 kernel: audit: type=1400 audit(1747441849.339:1299): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.339000 audit: BPF prog-id=201 op=LOAD May 17 00:30:49.340000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.340000 audit[4306]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3649 pid=4306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:49.340000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564653031343165356461323736653565333838306566653563613937 May 17 00:30:49.341000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.341000 audit[4306]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3649 pid=4306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:49.341000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564653031343165356461323736653565333838306566653563613937 May 17 00:30:49.341000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.341000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.341000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.341000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.341000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.341000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.341000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.341000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.341000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.341000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.341000 audit: BPF prog-id=202 op=LOAD May 17 00:30:49.341000 audit[4306]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00031eea0 items=0 ppid=3649 pid=4306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:49.341000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564653031343165356461323736653565333838306566653563613937 May 17 00:30:49.383000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.383000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.383000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.383000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.383000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.383000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.383000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.383000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.383000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.383000 audit: BPF prog-id=203 op=LOAD May 17 00:30:49.383000 audit[4306]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00031eee8 items=0 ppid=3649 pid=4306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:49.383000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564653031343165356461323736653565333838306566653563613937 May 17 00:30:49.405000 audit: BPF prog-id=203 op=UNLOAD May 17 00:30:49.406000 audit: BPF prog-id=202 op=UNLOAD May 17 00:30:49.406000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.406000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.406000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.406000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.406000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.406000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.406000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.406000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.406000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.406000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.406000 audit: BPF prog-id=204 op=LOAD May 17 00:30:49.406000 audit[4306]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00031f2f8 items=0 ppid=3649 pid=4306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:49.406000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564653031343165356461323736653565333838306566653563613937 May 17 00:30:49.588731 env[1216]: time="2025-05-17T00:30:49.587909550Z" level=info msg="CreateContainer within sandbox \"20326f008f438671742e2d4a580ffa5bc448cc6baea0fcc3b42b7cadcbb2d3c8\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 17 00:30:49.591611 env[1216]: time="2025-05-17T00:30:49.590669427Z" level=info msg="StartContainer for \"5de0141e5da276e5e3880efe5ca9712e330eec7a538e76b94b70b2f44eeaac84\" returns successfully" May 17 00:30:49.634673 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount922153485.mount: Deactivated successfully. May 17 00:30:49.642054 env[1216]: time="2025-05-17T00:30:49.641984373Z" level=info msg="CreateContainer within sandbox \"20326f008f438671742e2d4a580ffa5bc448cc6baea0fcc3b42b7cadcbb2d3c8\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"ca4e1a1a4968c47d212500ada5c3ac862a014a7f67a9560eccc51ca2242b01c8\"" May 17 00:30:49.642775 env[1216]: time="2025-05-17T00:30:49.642731344Z" level=info msg="StartContainer for \"ca4e1a1a4968c47d212500ada5c3ac862a014a7f67a9560eccc51ca2242b01c8\"" May 17 00:30:49.718000 audit[4348]: NETFILTER_CFG table=filter:122 family=2 entries=14 op=nft_register_rule pid=4348 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:30:49.718000 audit[4348]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffe1834e9a0 a2=0 a3=7ffe1834e98c items=0 ppid=2176 pid=4348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:49.718000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:30:49.726000 audit[4348]: NETFILTER_CFG table=nat:123 family=2 entries=20 op=nft_register_rule pid=4348 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:30:49.726000 audit[4348]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffe1834e9a0 a2=0 a3=7ffe1834e98c items=0 ppid=2176 pid=4348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:49.726000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:30:49.740262 systemd[1]: Started cri-containerd-ca4e1a1a4968c47d212500ada5c3ac862a014a7f67a9560eccc51ca2242b01c8.scope. May 17 00:30:49.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.803000 audit: BPF prog-id=205 op=LOAD May 17 00:30:49.804000 audit[4342]: AVC avc: denied { bpf } for pid=4342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.804000 audit[4342]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3834 pid=4342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:49.804000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361346531613161343936386334376432313235303061646135633361 May 17 00:30:49.805000 audit[4342]: AVC avc: denied { perfmon } for pid=4342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.805000 audit[4342]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3834 pid=4342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:49.805000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361346531613161343936386334376432313235303061646135633361 May 17 00:30:49.806000 audit[4342]: AVC avc: denied { bpf } for pid=4342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.806000 audit[4342]: AVC avc: denied { bpf } for pid=4342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.806000 audit[4342]: AVC avc: denied { bpf } for pid=4342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.806000 audit[4342]: AVC avc: denied { perfmon } for pid=4342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.806000 audit[4342]: AVC avc: denied { perfmon } for pid=4342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.806000 audit[4342]: AVC avc: denied { perfmon } for pid=4342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.806000 audit[4342]: AVC avc: denied { perfmon } for pid=4342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.806000 audit[4342]: AVC avc: denied { perfmon } for pid=4342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.806000 audit[4342]: AVC avc: denied { bpf } for pid=4342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.806000 audit[4342]: AVC avc: denied { bpf } for pid=4342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.806000 audit: BPF prog-id=206 op=LOAD May 17 00:30:49.806000 audit[4342]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000310840 items=0 ppid=3834 pid=4342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:49.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361346531613161343936386334376432313235303061646135633361 May 17 00:30:49.807000 audit[4342]: AVC avc: denied { bpf } for pid=4342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.807000 audit[4342]: AVC avc: denied { bpf } for pid=4342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.807000 audit[4342]: AVC avc: denied { perfmon } for pid=4342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.807000 audit[4342]: AVC avc: denied { perfmon } for pid=4342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.807000 audit[4342]: AVC avc: denied { perfmon } for pid=4342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.807000 audit[4342]: AVC avc: denied { perfmon } for pid=4342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.807000 audit[4342]: AVC avc: denied { perfmon } for pid=4342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.807000 audit[4342]: AVC avc: denied { bpf } for pid=4342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.807000 audit[4342]: AVC avc: denied { bpf } for pid=4342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.807000 audit: BPF prog-id=207 op=LOAD May 17 00:30:49.807000 audit[4342]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000310888 items=0 ppid=3834 pid=4342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:49.807000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361346531613161343936386334376432313235303061646135633361 May 17 00:30:49.809000 audit: BPF prog-id=207 op=UNLOAD May 17 00:30:49.809000 audit: BPF prog-id=206 op=UNLOAD May 17 00:30:49.809000 audit[4342]: AVC avc: denied { bpf } for pid=4342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.809000 audit[4342]: AVC avc: denied { bpf } for pid=4342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.809000 audit[4342]: AVC avc: denied { bpf } for pid=4342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.809000 audit[4342]: AVC avc: denied { perfmon } for pid=4342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.809000 audit[4342]: AVC avc: denied { perfmon } for pid=4342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.809000 audit[4342]: AVC avc: denied { perfmon } for pid=4342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.809000 audit[4342]: AVC avc: denied { perfmon } for pid=4342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.809000 audit[4342]: AVC avc: denied { perfmon } for pid=4342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.809000 audit[4342]: AVC avc: denied { bpf } for pid=4342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.809000 audit[4342]: AVC avc: denied { bpf } for pid=4342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:49.809000 audit: BPF prog-id=208 op=LOAD May 17 00:30:49.809000 audit[4342]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000310c98 items=0 ppid=3834 pid=4342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:49.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361346531613161343936386334376432313235303061646135633361 May 17 00:30:49.871195 env[1216]: time="2025-05-17T00:30:49.871139056Z" level=info msg="StartContainer for \"ca4e1a1a4968c47d212500ada5c3ac862a014a7f67a9560eccc51ca2242b01c8\" returns successfully" May 17 00:30:50.438000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520987 scontext=system_u:system_r:svirt_lxc_net_t:s0:c296,c329 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:30:50.438000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00187b480 a2=fc6 a3=0 items=0 ppid=1752 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c296,c329 key=(null) May 17 00:30:50.438000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:30:50.438000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c296,c329 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:30:50.438000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001cbef60 a2=fc6 a3=0 items=0 ppid=1752 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c296,c329 key=(null) May 17 00:30:50.438000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:30:50.653551 kubelet[2047]: I0517 00:30:50.653449 2047 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-5544b97fc-ncc4j" podStartSLOduration=31.733049826 podStartE2EDuration="36.653422884s" podCreationTimestamp="2025-05-17 00:30:14 +0000 UTC" firstStartedPulling="2025-05-17 00:30:44.288422741 +0000 UTC m=+49.577529611" lastFinishedPulling="2025-05-17 00:30:49.20879551 +0000 UTC m=+54.497902669" observedRunningTime="2025-05-17 00:30:49.65904409 +0000 UTC m=+54.948150987" watchObservedRunningTime="2025-05-17 00:30:50.653422884 +0000 UTC m=+55.942529763" May 17 00:30:50.654486 kubelet[2047]: I0517 00:30:50.654299 2047 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-5544b97fc-9jp6z" podStartSLOduration=32.12992977 podStartE2EDuration="36.654259944s" podCreationTimestamp="2025-05-17 00:30:14 +0000 UTC" firstStartedPulling="2025-05-17 00:30:45.004462888 +0000 UTC m=+50.293569754" lastFinishedPulling="2025-05-17 00:30:49.528793052 +0000 UTC m=+54.817899928" observedRunningTime="2025-05-17 00:30:50.651964368 +0000 UTC m=+55.941071267" watchObservedRunningTime="2025-05-17 00:30:50.654259944 +0000 UTC m=+55.943366832" May 17 00:30:50.747000 audit[4382]: NETFILTER_CFG table=filter:124 family=2 entries=14 op=nft_register_rule pid=4382 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:30:50.747000 audit[4382]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffdb32e30d0 a2=0 a3=7ffdb32e30bc items=0 ppid=2176 pid=4382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:50.747000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:30:50.755000 audit[4382]: NETFILTER_CFG table=nat:125 family=2 entries=20 op=nft_register_rule pid=4382 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:30:50.755000 audit[4382]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffdb32e30d0 a2=0 a3=7ffdb32e30bc items=0 ppid=2176 pid=4382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:50.755000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:30:51.373000 audit[1917]: AVC avc: denied { watch } for pid=1917 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520987 scontext=system_u:system_r:svirt_lxc_net_t:s0:c258,c418 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:30:51.373000 audit[1917]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c010b22ea0 a2=fc6 a3=0 items=0 ppid=1770 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c258,c418 key=(null) May 17 00:30:51.374000 audit[1917]: AVC avc: denied { watch } for pid=1917 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520989 scontext=system_u:system_r:svirt_lxc_net_t:s0:c258,c418 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:30:51.374000 audit[1917]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c00ce109c0 a2=fc6 a3=0 items=0 ppid=1770 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c258,c418 key=(null) May 17 00:30:51.374000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:30:51.373000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:30:51.376000 audit[1917]: AVC avc: denied { watch } for pid=1917 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520995 scontext=system_u:system_r:svirt_lxc_net_t:s0:c258,c418 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:30:51.376000 audit[1917]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c00dced860 a2=fc6 a3=0 items=0 ppid=1770 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c258,c418 key=(null) May 17 00:30:51.376000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:30:51.379000 audit[1917]: AVC avc: denied { watch } for pid=1917 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c258,c418 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:30:51.379000 audit[1917]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c00ce10ab0 a2=fc6 a3=0 items=0 ppid=1770 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c258,c418 key=(null) May 17 00:30:51.379000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:30:51.525000 audit[1917]: AVC avc: denied { watch } for pid=1917 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520987 scontext=system_u:system_r:svirt_lxc_net_t:s0:c258,c418 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:30:51.525000 audit[1917]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c010b23060 a2=fc6 a3=0 items=0 ppid=1770 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c258,c418 key=(null) May 17 00:30:51.525000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:30:51.525000 audit[1917]: AVC avc: denied { watch } for pid=1917 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c258,c418 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:30:51.525000 audit[1917]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c00ce10b10 a2=fc6 a3=0 items=0 ppid=1770 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c258,c418 key=(null) May 17 00:30:51.525000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:30:51.623366 kubelet[2047]: I0517 00:30:51.623323 2047 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:30:53.401006 env[1216]: time="2025-05-17T00:30:53.400938456Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:30:53.405360 env[1216]: time="2025-05-17T00:30:53.405292124Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:094053209304a3d20e6561c18d37ac2dc4c7fbb68c1579d9864c303edebffa50,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:30:53.409349 env[1216]: time="2025-05-17T00:30:53.409295380Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:30:53.412977 env[1216]: time="2025-05-17T00:30:53.412925138Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:eb5bc5c9e7a71f1d8ea69bbcc8e54b84fb7ec1e32d919c8b148f80b770f20182,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:30:53.414190 env[1216]: time="2025-05-17T00:30:53.414131393Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.0\" returns image reference \"sha256:094053209304a3d20e6561c18d37ac2dc4c7fbb68c1579d9864c303edebffa50\"" May 17 00:30:53.421190 env[1216]: time="2025-05-17T00:30:53.417973240Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.0\"" May 17 00:30:53.451361 env[1216]: time="2025-05-17T00:30:53.450938919Z" level=info msg="CreateContainer within sandbox \"dfbed74dbb0dc557778b737aba341652f126ff206150e92d503686c7e264110d\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" May 17 00:30:53.480403 env[1216]: time="2025-05-17T00:30:53.480344161Z" level=info msg="CreateContainer within sandbox \"dfbed74dbb0dc557778b737aba341652f126ff206150e92d503686c7e264110d\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"46f52d2f6604c18ed47c0d0e26b915d8dfc1b90262f4cfa049987241acf5c975\"" May 17 00:30:53.481626 env[1216]: time="2025-05-17T00:30:53.481583486Z" level=info msg="StartContainer for \"46f52d2f6604c18ed47c0d0e26b915d8dfc1b90262f4cfa049987241acf5c975\"" May 17 00:30:53.551949 systemd[1]: Started cri-containerd-46f52d2f6604c18ed47c0d0e26b915d8dfc1b90262f4cfa049987241acf5c975.scope. May 17 00:30:53.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:53.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:53.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:53.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:53.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:53.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:53.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:53.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:53.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:53.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:53.598000 audit: BPF prog-id=209 op=LOAD May 17 00:30:53.598000 audit[4401]: AVC avc: denied { bpf } for pid=4401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:53.598000 audit[4401]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=4016 pid=4401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:53.598000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436663532643266363630346331386564343763306430653236623931 May 17 00:30:53.599000 audit[4401]: AVC avc: denied { perfmon } for pid=4401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:53.599000 audit[4401]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=4016 pid=4401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:53.599000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436663532643266363630346331386564343763306430653236623931 May 17 00:30:53.599000 audit[4401]: AVC avc: denied { bpf } for pid=4401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:53.599000 audit[4401]: AVC avc: denied { bpf } for pid=4401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:53.599000 audit[4401]: AVC avc: denied { bpf } for pid=4401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:53.599000 audit[4401]: AVC avc: denied { perfmon } for pid=4401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:53.599000 audit[4401]: AVC avc: denied { perfmon } for pid=4401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:53.599000 audit[4401]: AVC avc: denied { perfmon } for pid=4401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:53.599000 audit[4401]: AVC avc: denied { perfmon } for pid=4401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:53.599000 audit[4401]: AVC avc: denied { perfmon } for pid=4401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:53.599000 audit[4401]: AVC avc: denied { bpf } for pid=4401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:53.599000 audit[4401]: AVC avc: denied { bpf } for pid=4401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:53.599000 audit: BPF prog-id=210 op=LOAD May 17 00:30:53.599000 audit[4401]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0002cdd00 items=0 ppid=4016 pid=4401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:53.599000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436663532643266363630346331386564343763306430653236623931 May 17 00:30:53.599000 audit[4401]: AVC avc: denied { bpf } for pid=4401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:53.599000 audit[4401]: AVC avc: denied { bpf } for pid=4401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:53.599000 audit[4401]: AVC avc: denied { perfmon } for pid=4401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:53.599000 audit[4401]: AVC avc: denied { perfmon } for pid=4401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:53.599000 audit[4401]: AVC avc: denied { perfmon } for pid=4401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:53.599000 audit[4401]: AVC avc: denied { perfmon } for pid=4401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:53.599000 audit[4401]: AVC avc: denied { perfmon } for pid=4401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:53.599000 audit[4401]: AVC avc: denied { bpf } for pid=4401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:53.599000 audit[4401]: AVC avc: denied { bpf } for pid=4401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:53.599000 audit: BPF prog-id=211 op=LOAD May 17 00:30:53.599000 audit[4401]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0002cdd48 items=0 ppid=4016 pid=4401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:53.599000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436663532643266363630346331386564343763306430653236623931 May 17 00:30:53.599000 audit: BPF prog-id=211 op=UNLOAD May 17 00:30:53.599000 audit: BPF prog-id=210 op=UNLOAD May 17 00:30:53.599000 audit[4401]: AVC avc: denied { bpf } for pid=4401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:53.599000 audit[4401]: AVC avc: denied { bpf } for pid=4401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:53.599000 audit[4401]: AVC avc: denied { bpf } for pid=4401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:53.599000 audit[4401]: AVC avc: denied { perfmon } for pid=4401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:53.599000 audit[4401]: AVC avc: denied { perfmon } for pid=4401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:53.599000 audit[4401]: AVC avc: denied { perfmon } for pid=4401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:53.599000 audit[4401]: AVC avc: denied { perfmon } for pid=4401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:53.599000 audit[4401]: AVC avc: denied { perfmon } for pid=4401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:53.599000 audit[4401]: AVC avc: denied { bpf } for pid=4401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:53.599000 audit[4401]: AVC avc: denied { bpf } for pid=4401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:53.599000 audit: BPF prog-id=212 op=LOAD May 17 00:30:53.599000 audit[4401]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0003bc158 items=0 ppid=4016 pid=4401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:53.599000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436663532643266363630346331386564343763306430653236623931 May 17 00:30:53.665978 env[1216]: time="2025-05-17T00:30:53.665838264Z" level=info msg="StartContainer for \"46f52d2f6604c18ed47c0d0e26b915d8dfc1b90262f4cfa049987241acf5c975\" returns successfully" May 17 00:30:53.966000 audit[4317]: AVC avc: denied { watch } for pid=4317 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_30_30.2163458567/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c237,c324 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c237,c324 tclass=file permissive=0 May 17 00:30:53.966000 audit[4317]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000f88fc0 a2=fc6 a3=0 items=0 ppid=3649 pid=4317 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c237,c324 key=(null) May 17 00:30:53.966000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:30:54.084000 audit[4440]: NETFILTER_CFG table=filter:126 family=2 entries=13 op=nft_register_rule pid=4440 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:30:54.084000 audit[4440]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffd5e7f0e10 a2=0 a3=7ffd5e7f0dfc items=0 ppid=2176 pid=4440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:54.084000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:30:54.093000 audit[4440]: NETFILTER_CFG table=nat:127 family=2 entries=27 op=nft_register_chain pid=4440 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:30:54.093000 audit[4440]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffd5e7f0e10 a2=0 a3=7ffd5e7f0dfc items=0 ppid=2176 pid=4440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:54.093000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:30:54.236000 audit[4354]: AVC avc: denied { watch } for pid=4354 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_30_30.2890834598/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c801,c979 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c801,c979 tclass=file permissive=0 May 17 00:30:54.236000 audit[4354]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000f67860 a2=fc6 a3=0 items=0 ppid=3834 pid=4354 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c801,c979 key=(null) May 17 00:30:54.236000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:30:54.660803 kubelet[2047]: I0517 00:30:54.660265 2047 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-5c756f7665-l4qrm" podStartSLOduration=28.884774034 podStartE2EDuration="35.660236091s" podCreationTimestamp="2025-05-17 00:30:19 +0000 UTC" firstStartedPulling="2025-05-17 00:30:46.640751164 +0000 UTC m=+51.929858043" lastFinishedPulling="2025-05-17 00:30:53.41621322 +0000 UTC m=+58.705320100" observedRunningTime="2025-05-17 00:30:54.6596397 +0000 UTC m=+59.948746591" watchObservedRunningTime="2025-05-17 00:30:54.660236091 +0000 UTC m=+59.949342973" May 17 00:30:54.665138 env[1216]: time="2025-05-17T00:30:54.665087018Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:30:54.670889 env[1216]: time="2025-05-17T00:30:54.670624521Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d5b08093b7928c0ac1122e59edf69b2e58c6d10ecc8b9e5cffeb809a956dc48e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:30:54.675128 env[1216]: time="2025-05-17T00:30:54.675069762Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:30:54.680253 env[1216]: time="2025-05-17T00:30:54.680195715Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:27883a4104876fe239311dd93ce6efd0c4a87de7163d57a4c8d96bd65a287ffd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:30:54.680782 env[1216]: time="2025-05-17T00:30:54.680684612Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.0\" returns image reference \"sha256:d5b08093b7928c0ac1122e59edf69b2e58c6d10ecc8b9e5cffeb809a956dc48e\"" May 17 00:30:54.686771 env[1216]: time="2025-05-17T00:30:54.686596268Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\"" May 17 00:30:54.691060 env[1216]: time="2025-05-17T00:30:54.691007467Z" level=info msg="CreateContainer within sandbox \"f85f0d148cc3b1c3ba7493b6d48448e53d0b4c90e5a8775b9c63abdb1729745c\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 17 00:30:54.721919 systemd[1]: run-containerd-runc-k8s.io-46f52d2f6604c18ed47c0d0e26b915d8dfc1b90262f4cfa049987241acf5c975-runc.FqGfn7.mount: Deactivated successfully. May 17 00:30:54.753451 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount159862012.mount: Deactivated successfully. May 17 00:30:54.761484 env[1216]: time="2025-05-17T00:30:54.761369764Z" level=info msg="CreateContainer within sandbox \"f85f0d148cc3b1c3ba7493b6d48448e53d0b4c90e5a8775b9c63abdb1729745c\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"4d190949e8c3140a61bf339bbe93ea2f81a71d1d8d05dc6e5ff87a10887c97e5\"" May 17 00:30:54.763025 env[1216]: time="2025-05-17T00:30:54.762971432Z" level=info msg="StartContainer for \"4d190949e8c3140a61bf339bbe93ea2f81a71d1d8d05dc6e5ff87a10887c97e5\"" May 17 00:30:54.806674 systemd[1]: Started cri-containerd-4d190949e8c3140a61bf339bbe93ea2f81a71d1d8d05dc6e5ff87a10887c97e5.scope. May 17 00:30:54.813216 env[1216]: time="2025-05-17T00:30:54.813146638Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:30:54.816220 env[1216]: time="2025-05-17T00:30:54.816148547Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:30:54.818021 kubelet[2047]: E0517 00:30:54.816735 2047 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:30:54.818021 kubelet[2047]: E0517 00:30:54.816825 2047 kuberuntime_image.go:42] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:30:54.818021 kubelet[2047]: E0517 00:30:54.817336 2047 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-xqc8v,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-78d55f7ddc-sx8fp_calico-system(a859c06b-ce28-4cc1-830c-0d905598097c): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:30:54.818911 kubelet[2047]: E0517 00:30:54.818780 2047 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-sx8fp" podUID="a859c06b-ce28-4cc1-830c-0d905598097c" May 17 00:30:54.819342 env[1216]: time="2025-05-17T00:30:54.819297931Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\"" May 17 00:30:54.865000 audit[4465]: AVC avc: denied { perfmon } for pid=4465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:54.871907 kernel: kauditd_printk_skb: 209 callbacks suppressed May 17 00:30:54.872183 kernel: audit: type=1400 audit(1747441854.865:1360): avc: denied { perfmon } for pid=4465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:54.865000 audit[4465]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f312a8fbcb8 items=0 ppid=4172 pid=4465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:54.939314 kernel: audit: type=1300 audit(1747441854.865:1360): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f312a8fbcb8 items=0 ppid=4172 pid=4465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:54.865000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464313930393439653863333134306136316266333339626265393365 May 17 00:30:54.973729 kernel: audit: type=1327 audit(1747441854.865:1360): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464313930393439653863333134306136316266333339626265393365 May 17 00:30:54.977504 env[1216]: time="2025-05-17T00:30:54.977438706Z" level=info msg="StopPodSandbox for \"27c945ac2d9f584fea12b7af3fa670be33c7236b3045500b3920493d6ce27c9a\"" May 17 00:30:54.866000 audit[4465]: AVC avc: denied { bpf } for pid=4465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:55.009059 kernel: audit: type=1400 audit(1747441854.866:1361): avc: denied { bpf } for pid=4465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:55.009454 env[1216]: time="2025-05-17T00:30:55.009380702Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:30:55.034728 kernel: audit: type=1400 audit(1747441854.866:1361): avc: denied { bpf } for pid=4465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:54.866000 audit[4465]: AVC avc: denied { bpf } for pid=4465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:55.038885 env[1216]: time="2025-05-17T00:30:55.037995239Z" level=info msg="StartContainer for \"4d190949e8c3140a61bf339bbe93ea2f81a71d1d8d05dc6e5ff87a10887c97e5\" returns successfully" May 17 00:30:55.039275 env[1216]: time="2025-05-17T00:30:55.039188946Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:30:55.041146 kubelet[2047]: E0517 00:30:55.039668 2047 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:30:55.041146 kubelet[2047]: E0517 00:30:55.039763 2047 kuberuntime_image.go:42] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:30:55.041146 kubelet[2047]: E0517 00:30:55.039981 2047 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.0,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:e1697e16bd03489ca69cfcf2cef8e19e,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-95dhb,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-797f4cd9d4-bwnvn_calico-system(dc308654-0619-40ae-8a66-6809b61affb7): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:30:54.866000 audit[4465]: AVC avc: denied { bpf } for pid=4465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:55.063345 env[1216]: time="2025-05-17T00:30:55.044179357Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0\"" May 17 00:30:55.064247 kernel: audit: type=1400 audit(1747441854.866:1361): avc: denied { bpf } for pid=4465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:54.866000 audit[4465]: AVC avc: denied { perfmon } for pid=4465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:55.088900 kernel: audit: type=1400 audit(1747441854.866:1361): avc: denied { perfmon } for pid=4465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:54.866000 audit[4465]: AVC avc: denied { perfmon } for pid=4465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:55.116772 kernel: audit: type=1400 audit(1747441854.866:1361): avc: denied { perfmon } for pid=4465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:54.866000 audit[4465]: AVC avc: denied { perfmon } for pid=4465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:55.138716 kernel: audit: type=1400 audit(1747441854.866:1361): avc: denied { perfmon } for pid=4465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:54.866000 audit[4465]: AVC avc: denied { perfmon } for pid=4465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:55.160901 kernel: audit: type=1400 audit(1747441854.866:1361): avc: denied { perfmon } for pid=4465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:54.866000 audit[4465]: AVC avc: denied { perfmon } for pid=4465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:54.866000 audit[4465]: AVC avc: denied { bpf } for pid=4465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:54.866000 audit[4465]: AVC avc: denied { bpf } for pid=4465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:54.866000 audit: BPF prog-id=213 op=LOAD May 17 00:30:54.866000 audit[4465]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0001b7778 items=0 ppid=4172 pid=4465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:54.866000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464313930393439653863333134306136316266333339626265393365 May 17 00:30:54.972000 audit[4465]: AVC avc: denied { bpf } for pid=4465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:54.972000 audit[4465]: AVC avc: denied { bpf } for pid=4465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:54.972000 audit[4465]: AVC avc: denied { perfmon } for pid=4465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:54.972000 audit[4465]: AVC avc: denied { perfmon } for pid=4465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:54.972000 audit[4465]: AVC avc: denied { perfmon } for pid=4465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:54.972000 audit[4465]: AVC avc: denied { perfmon } for pid=4465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:54.972000 audit[4465]: AVC avc: denied { perfmon } for pid=4465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:54.972000 audit[4465]: AVC avc: denied { bpf } for pid=4465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:54.972000 audit[4465]: AVC avc: denied { bpf } for pid=4465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:54.972000 audit: BPF prog-id=214 op=LOAD May 17 00:30:54.972000 audit[4465]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0001b77c8 items=0 ppid=4172 pid=4465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:54.972000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464313930393439653863333134306136316266333339626265393365 May 17 00:30:54.972000 audit: BPF prog-id=214 op=UNLOAD May 17 00:30:54.972000 audit: BPF prog-id=213 op=UNLOAD May 17 00:30:54.972000 audit[4465]: AVC avc: denied { bpf } for pid=4465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:54.972000 audit[4465]: AVC avc: denied { bpf } for pid=4465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:54.972000 audit[4465]: AVC avc: denied { bpf } for pid=4465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:54.972000 audit[4465]: AVC avc: denied { perfmon } for pid=4465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:54.972000 audit[4465]: AVC avc: denied { perfmon } for pid=4465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:54.972000 audit[4465]: AVC avc: denied { perfmon } for pid=4465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:54.972000 audit[4465]: AVC avc: denied { perfmon } for pid=4465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:54.972000 audit[4465]: AVC avc: denied { perfmon } for pid=4465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:54.972000 audit[4465]: AVC avc: denied { bpf } for pid=4465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:54.972000 audit[4465]: AVC avc: denied { bpf } for pid=4465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:54.972000 audit: BPF prog-id=215 op=LOAD May 17 00:30:54.972000 audit[4465]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0001b7858 items=0 ppid=4172 pid=4465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:54.972000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464313930393439653863333134306136316266333339626265393365 May 17 00:30:55.313878 env[1216]: 2025-05-17 00:30:55.231 [WARNING][4501] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="27c945ac2d9f584fea12b7af3fa670be33c7236b3045500b3920493d6ce27c9a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-calico--apiserver--5544b97fc--ncc4j-eth0", GenerateName:"calico-apiserver-5544b97fc-", Namespace:"calico-apiserver", SelfLink:"", UID:"906ab3b1-343a-409d-8e38-3de2ad671165", ResourceVersion:"1036", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 30, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5544b97fc", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7", ContainerID:"e221be0eb2170ad0e7adcd5456b93abdc3c2e57af527fbbff7e64d532d423e11", Pod:"calico-apiserver-5544b97fc-ncc4j", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.71.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"caliafb2f81cc2f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:30:55.313878 env[1216]: 2025-05-17 00:30:55.232 [INFO][4501] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="27c945ac2d9f584fea12b7af3fa670be33c7236b3045500b3920493d6ce27c9a" May 17 00:30:55.313878 env[1216]: 2025-05-17 00:30:55.232 [INFO][4501] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="27c945ac2d9f584fea12b7af3fa670be33c7236b3045500b3920493d6ce27c9a" iface="eth0" netns="" May 17 00:30:55.313878 env[1216]: 2025-05-17 00:30:55.232 [INFO][4501] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="27c945ac2d9f584fea12b7af3fa670be33c7236b3045500b3920493d6ce27c9a" May 17 00:30:55.313878 env[1216]: 2025-05-17 00:30:55.232 [INFO][4501] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="27c945ac2d9f584fea12b7af3fa670be33c7236b3045500b3920493d6ce27c9a" May 17 00:30:55.313878 env[1216]: 2025-05-17 00:30:55.282 [INFO][4513] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="27c945ac2d9f584fea12b7af3fa670be33c7236b3045500b3920493d6ce27c9a" HandleID="k8s-pod-network.27c945ac2d9f584fea12b7af3fa670be33c7236b3045500b3920493d6ce27c9a" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-calico--apiserver--5544b97fc--ncc4j-eth0" May 17 00:30:55.313878 env[1216]: 2025-05-17 00:30:55.282 [INFO][4513] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:30:55.313878 env[1216]: 2025-05-17 00:30:55.282 [INFO][4513] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:30:55.313878 env[1216]: 2025-05-17 00:30:55.304 [WARNING][4513] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="27c945ac2d9f584fea12b7af3fa670be33c7236b3045500b3920493d6ce27c9a" HandleID="k8s-pod-network.27c945ac2d9f584fea12b7af3fa670be33c7236b3045500b3920493d6ce27c9a" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-calico--apiserver--5544b97fc--ncc4j-eth0" May 17 00:30:55.313878 env[1216]: 2025-05-17 00:30:55.304 [INFO][4513] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="27c945ac2d9f584fea12b7af3fa670be33c7236b3045500b3920493d6ce27c9a" HandleID="k8s-pod-network.27c945ac2d9f584fea12b7af3fa670be33c7236b3045500b3920493d6ce27c9a" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-calico--apiserver--5544b97fc--ncc4j-eth0" May 17 00:30:55.313878 env[1216]: 2025-05-17 00:30:55.309 [INFO][4513] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:30:55.313878 env[1216]: 2025-05-17 00:30:55.311 [INFO][4501] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="27c945ac2d9f584fea12b7af3fa670be33c7236b3045500b3920493d6ce27c9a" May 17 00:30:55.315826 env[1216]: time="2025-05-17T00:30:55.315727912Z" level=info msg="TearDown network for sandbox \"27c945ac2d9f584fea12b7af3fa670be33c7236b3045500b3920493d6ce27c9a\" successfully" May 17 00:30:55.316057 env[1216]: time="2025-05-17T00:30:55.316012233Z" level=info msg="StopPodSandbox for \"27c945ac2d9f584fea12b7af3fa670be33c7236b3045500b3920493d6ce27c9a\" returns successfully" May 17 00:30:55.317390 env[1216]: time="2025-05-17T00:30:55.317320458Z" level=info msg="RemovePodSandbox for \"27c945ac2d9f584fea12b7af3fa670be33c7236b3045500b3920493d6ce27c9a\"" May 17 00:30:55.317512 env[1216]: time="2025-05-17T00:30:55.317364437Z" level=info msg="Forcibly stopping sandbox \"27c945ac2d9f584fea12b7af3fa670be33c7236b3045500b3920493d6ce27c9a\"" May 17 00:30:55.578344 env[1216]: 2025-05-17 00:30:55.504 [WARNING][4528] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="27c945ac2d9f584fea12b7af3fa670be33c7236b3045500b3920493d6ce27c9a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-calico--apiserver--5544b97fc--ncc4j-eth0", GenerateName:"calico-apiserver-5544b97fc-", Namespace:"calico-apiserver", SelfLink:"", UID:"906ab3b1-343a-409d-8e38-3de2ad671165", ResourceVersion:"1036", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 30, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5544b97fc", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7", ContainerID:"e221be0eb2170ad0e7adcd5456b93abdc3c2e57af527fbbff7e64d532d423e11", Pod:"calico-apiserver-5544b97fc-ncc4j", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.71.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"caliafb2f81cc2f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:30:55.578344 env[1216]: 2025-05-17 00:30:55.505 [INFO][4528] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="27c945ac2d9f584fea12b7af3fa670be33c7236b3045500b3920493d6ce27c9a" May 17 00:30:55.578344 env[1216]: 2025-05-17 00:30:55.505 [INFO][4528] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="27c945ac2d9f584fea12b7af3fa670be33c7236b3045500b3920493d6ce27c9a" iface="eth0" netns="" May 17 00:30:55.578344 env[1216]: 2025-05-17 00:30:55.505 [INFO][4528] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="27c945ac2d9f584fea12b7af3fa670be33c7236b3045500b3920493d6ce27c9a" May 17 00:30:55.578344 env[1216]: 2025-05-17 00:30:55.505 [INFO][4528] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="27c945ac2d9f584fea12b7af3fa670be33c7236b3045500b3920493d6ce27c9a" May 17 00:30:55.578344 env[1216]: 2025-05-17 00:30:55.559 [INFO][4537] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="27c945ac2d9f584fea12b7af3fa670be33c7236b3045500b3920493d6ce27c9a" HandleID="k8s-pod-network.27c945ac2d9f584fea12b7af3fa670be33c7236b3045500b3920493d6ce27c9a" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-calico--apiserver--5544b97fc--ncc4j-eth0" May 17 00:30:55.578344 env[1216]: 2025-05-17 00:30:55.560 [INFO][4537] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:30:55.578344 env[1216]: 2025-05-17 00:30:55.560 [INFO][4537] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:30:55.578344 env[1216]: 2025-05-17 00:30:55.570 [WARNING][4537] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="27c945ac2d9f584fea12b7af3fa670be33c7236b3045500b3920493d6ce27c9a" HandleID="k8s-pod-network.27c945ac2d9f584fea12b7af3fa670be33c7236b3045500b3920493d6ce27c9a" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-calico--apiserver--5544b97fc--ncc4j-eth0" May 17 00:30:55.578344 env[1216]: 2025-05-17 00:30:55.570 [INFO][4537] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="27c945ac2d9f584fea12b7af3fa670be33c7236b3045500b3920493d6ce27c9a" HandleID="k8s-pod-network.27c945ac2d9f584fea12b7af3fa670be33c7236b3045500b3920493d6ce27c9a" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-calico--apiserver--5544b97fc--ncc4j-eth0" May 17 00:30:55.578344 env[1216]: 2025-05-17 00:30:55.573 [INFO][4537] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:30:55.578344 env[1216]: 2025-05-17 00:30:55.575 [INFO][4528] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="27c945ac2d9f584fea12b7af3fa670be33c7236b3045500b3920493d6ce27c9a" May 17 00:30:55.579449 env[1216]: time="2025-05-17T00:30:55.578388273Z" level=info msg="TearDown network for sandbox \"27c945ac2d9f584fea12b7af3fa670be33c7236b3045500b3920493d6ce27c9a\" successfully" May 17 00:30:55.587609 env[1216]: time="2025-05-17T00:30:55.586890428Z" level=info msg="RemovePodSandbox \"27c945ac2d9f584fea12b7af3fa670be33c7236b3045500b3920493d6ce27c9a\" returns successfully" May 17 00:30:55.588008 env[1216]: time="2025-05-17T00:30:55.587958720Z" level=info msg="StopPodSandbox for \"700404bef465df98287b71107fad94c0a389122ae7534ced3f0eaeed6a6d8246\"" May 17 00:30:55.651654 kubelet[2047]: E0517 00:30:55.651583 2047 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-sx8fp" podUID="a859c06b-ce28-4cc1-830c-0d905598097c" May 17 00:30:55.728000 audit[4565]: NETFILTER_CFG table=filter:128 family=2 entries=12 op=nft_register_rule pid=4565 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:30:55.728000 audit[4565]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7fff1ae3b630 a2=0 a3=7fff1ae3b61c items=0 ppid=2176 pid=4565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:55.728000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:30:55.736000 audit[4565]: NETFILTER_CFG table=nat:129 family=2 entries=22 op=nft_register_rule pid=4565 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:30:55.736000 audit[4565]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fff1ae3b630 a2=0 a3=7fff1ae3b61c items=0 ppid=2176 pid=4565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:55.736000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:30:55.769995 env[1216]: 2025-05-17 00:30:55.688 [WARNING][4552] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="700404bef465df98287b71107fad94c0a389122ae7534ced3f0eaeed6a6d8246" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-calico--kube--controllers--5c756f7665--l4qrm-eth0", GenerateName:"calico-kube-controllers-5c756f7665-", Namespace:"calico-system", SelfLink:"", UID:"65f0f637-2986-4c66-955a-c220f11cf598", ResourceVersion:"1049", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 30, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5c756f7665", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7", ContainerID:"dfbed74dbb0dc557778b737aba341652f126ff206150e92d503686c7e264110d", Pod:"calico-kube-controllers-5c756f7665-l4qrm", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.71.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali266118db8a4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:30:55.769995 env[1216]: 2025-05-17 00:30:55.689 [INFO][4552] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="700404bef465df98287b71107fad94c0a389122ae7534ced3f0eaeed6a6d8246" May 17 00:30:55.769995 env[1216]: 2025-05-17 00:30:55.689 [INFO][4552] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="700404bef465df98287b71107fad94c0a389122ae7534ced3f0eaeed6a6d8246" iface="eth0" netns="" May 17 00:30:55.769995 env[1216]: 2025-05-17 00:30:55.689 [INFO][4552] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="700404bef465df98287b71107fad94c0a389122ae7534ced3f0eaeed6a6d8246" May 17 00:30:55.769995 env[1216]: 2025-05-17 00:30:55.689 [INFO][4552] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="700404bef465df98287b71107fad94c0a389122ae7534ced3f0eaeed6a6d8246" May 17 00:30:55.769995 env[1216]: 2025-05-17 00:30:55.749 [INFO][4559] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="700404bef465df98287b71107fad94c0a389122ae7534ced3f0eaeed6a6d8246" HandleID="k8s-pod-network.700404bef465df98287b71107fad94c0a389122ae7534ced3f0eaeed6a6d8246" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-calico--kube--controllers--5c756f7665--l4qrm-eth0" May 17 00:30:55.769995 env[1216]: 2025-05-17 00:30:55.749 [INFO][4559] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:30:55.769995 env[1216]: 2025-05-17 00:30:55.749 [INFO][4559] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:30:55.769995 env[1216]: 2025-05-17 00:30:55.763 [WARNING][4559] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="700404bef465df98287b71107fad94c0a389122ae7534ced3f0eaeed6a6d8246" HandleID="k8s-pod-network.700404bef465df98287b71107fad94c0a389122ae7534ced3f0eaeed6a6d8246" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-calico--kube--controllers--5c756f7665--l4qrm-eth0" May 17 00:30:55.769995 env[1216]: 2025-05-17 00:30:55.763 [INFO][4559] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="700404bef465df98287b71107fad94c0a389122ae7534ced3f0eaeed6a6d8246" HandleID="k8s-pod-network.700404bef465df98287b71107fad94c0a389122ae7534ced3f0eaeed6a6d8246" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-calico--kube--controllers--5c756f7665--l4qrm-eth0" May 17 00:30:55.769995 env[1216]: 2025-05-17 00:30:55.765 [INFO][4559] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:30:55.769995 env[1216]: 2025-05-17 00:30:55.767 [INFO][4552] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="700404bef465df98287b71107fad94c0a389122ae7534ced3f0eaeed6a6d8246" May 17 00:30:55.771796 env[1216]: time="2025-05-17T00:30:55.771548704Z" level=info msg="TearDown network for sandbox \"700404bef465df98287b71107fad94c0a389122ae7534ced3f0eaeed6a6d8246\" successfully" May 17 00:30:55.772054 env[1216]: time="2025-05-17T00:30:55.771990510Z" level=info msg="StopPodSandbox for \"700404bef465df98287b71107fad94c0a389122ae7534ced3f0eaeed6a6d8246\" returns successfully" May 17 00:30:55.772984 env[1216]: time="2025-05-17T00:30:55.772941556Z" level=info msg="RemovePodSandbox for \"700404bef465df98287b71107fad94c0a389122ae7534ced3f0eaeed6a6d8246\"" May 17 00:30:55.773360 env[1216]: time="2025-05-17T00:30:55.773156367Z" level=info msg="Forcibly stopping sandbox \"700404bef465df98287b71107fad94c0a389122ae7534ced3f0eaeed6a6d8246\"" May 17 00:30:55.958210 env[1216]: 2025-05-17 00:30:55.869 [WARNING][4576] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="700404bef465df98287b71107fad94c0a389122ae7534ced3f0eaeed6a6d8246" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-calico--kube--controllers--5c756f7665--l4qrm-eth0", GenerateName:"calico-kube-controllers-5c756f7665-", Namespace:"calico-system", SelfLink:"", UID:"65f0f637-2986-4c66-955a-c220f11cf598", ResourceVersion:"1049", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 30, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5c756f7665", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7", ContainerID:"dfbed74dbb0dc557778b737aba341652f126ff206150e92d503686c7e264110d", Pod:"calico-kube-controllers-5c756f7665-l4qrm", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.71.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali266118db8a4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:30:55.958210 env[1216]: 2025-05-17 00:30:55.869 [INFO][4576] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="700404bef465df98287b71107fad94c0a389122ae7534ced3f0eaeed6a6d8246" May 17 00:30:55.958210 env[1216]: 2025-05-17 00:30:55.870 [INFO][4576] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="700404bef465df98287b71107fad94c0a389122ae7534ced3f0eaeed6a6d8246" iface="eth0" netns="" May 17 00:30:55.958210 env[1216]: 2025-05-17 00:30:55.870 [INFO][4576] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="700404bef465df98287b71107fad94c0a389122ae7534ced3f0eaeed6a6d8246" May 17 00:30:55.958210 env[1216]: 2025-05-17 00:30:55.870 [INFO][4576] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="700404bef465df98287b71107fad94c0a389122ae7534ced3f0eaeed6a6d8246" May 17 00:30:55.958210 env[1216]: 2025-05-17 00:30:55.928 [INFO][4583] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="700404bef465df98287b71107fad94c0a389122ae7534ced3f0eaeed6a6d8246" HandleID="k8s-pod-network.700404bef465df98287b71107fad94c0a389122ae7534ced3f0eaeed6a6d8246" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-calico--kube--controllers--5c756f7665--l4qrm-eth0" May 17 00:30:55.958210 env[1216]: 2025-05-17 00:30:55.928 [INFO][4583] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:30:55.958210 env[1216]: 2025-05-17 00:30:55.928 [INFO][4583] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:30:55.958210 env[1216]: 2025-05-17 00:30:55.945 [WARNING][4583] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="700404bef465df98287b71107fad94c0a389122ae7534ced3f0eaeed6a6d8246" HandleID="k8s-pod-network.700404bef465df98287b71107fad94c0a389122ae7534ced3f0eaeed6a6d8246" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-calico--kube--controllers--5c756f7665--l4qrm-eth0" May 17 00:30:55.958210 env[1216]: 2025-05-17 00:30:55.945 [INFO][4583] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="700404bef465df98287b71107fad94c0a389122ae7534ced3f0eaeed6a6d8246" HandleID="k8s-pod-network.700404bef465df98287b71107fad94c0a389122ae7534ced3f0eaeed6a6d8246" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-calico--kube--controllers--5c756f7665--l4qrm-eth0" May 17 00:30:55.958210 env[1216]: 2025-05-17 00:30:55.950 [INFO][4583] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:30:55.958210 env[1216]: 2025-05-17 00:30:55.952 [INFO][4576] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="700404bef465df98287b71107fad94c0a389122ae7534ced3f0eaeed6a6d8246" May 17 00:30:55.958210 env[1216]: time="2025-05-17T00:30:55.955103529Z" level=info msg="TearDown network for sandbox \"700404bef465df98287b71107fad94c0a389122ae7534ced3f0eaeed6a6d8246\" successfully" May 17 00:30:55.960886 env[1216]: time="2025-05-17T00:30:55.960810395Z" level=info msg="RemovePodSandbox \"700404bef465df98287b71107fad94c0a389122ae7534ced3f0eaeed6a6d8246\" returns successfully" May 17 00:30:55.961856 env[1216]: time="2025-05-17T00:30:55.961805338Z" level=info msg="StopPodSandbox for \"a4d0624842c5c7e1d944a9d2ce00c50c68a145628199d481361fdb7a7f4e9534\"" May 17 00:30:56.098030 env[1216]: 2025-05-17 00:30:56.023 [WARNING][4597] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a4d0624842c5c7e1d944a9d2ce00c50c68a145628199d481361fdb7a7f4e9534" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-goldmane--78d55f7ddc--sx8fp-eth0", GenerateName:"goldmane-78d55f7ddc-", Namespace:"calico-system", SelfLink:"", UID:"a859c06b-ce28-4cc1-830c-0d905598097c", ResourceVersion:"1064", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 30, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"78d55f7ddc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7", ContainerID:"f80273787f4ea45fe2a310dc27e8b7dea73e5b38f83ec66d50c14935a74ff0b2", Pod:"goldmane-78d55f7ddc-sx8fp", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.71.200/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali2089a515c9e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:30:56.098030 env[1216]: 2025-05-17 00:30:56.023 [INFO][4597] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="a4d0624842c5c7e1d944a9d2ce00c50c68a145628199d481361fdb7a7f4e9534" May 17 00:30:56.098030 env[1216]: 2025-05-17 00:30:56.023 [INFO][4597] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a4d0624842c5c7e1d944a9d2ce00c50c68a145628199d481361fdb7a7f4e9534" iface="eth0" netns="" May 17 00:30:56.098030 env[1216]: 2025-05-17 00:30:56.023 [INFO][4597] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="a4d0624842c5c7e1d944a9d2ce00c50c68a145628199d481361fdb7a7f4e9534" May 17 00:30:56.098030 env[1216]: 2025-05-17 00:30:56.023 [INFO][4597] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a4d0624842c5c7e1d944a9d2ce00c50c68a145628199d481361fdb7a7f4e9534" May 17 00:30:56.098030 env[1216]: 2025-05-17 00:30:56.075 [INFO][4605] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a4d0624842c5c7e1d944a9d2ce00c50c68a145628199d481361fdb7a7f4e9534" HandleID="k8s-pod-network.a4d0624842c5c7e1d944a9d2ce00c50c68a145628199d481361fdb7a7f4e9534" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-goldmane--78d55f7ddc--sx8fp-eth0" May 17 00:30:56.098030 env[1216]: 2025-05-17 00:30:56.075 [INFO][4605] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:30:56.098030 env[1216]: 2025-05-17 00:30:56.075 [INFO][4605] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:30:56.098030 env[1216]: 2025-05-17 00:30:56.087 [WARNING][4605] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a4d0624842c5c7e1d944a9d2ce00c50c68a145628199d481361fdb7a7f4e9534" HandleID="k8s-pod-network.a4d0624842c5c7e1d944a9d2ce00c50c68a145628199d481361fdb7a7f4e9534" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-goldmane--78d55f7ddc--sx8fp-eth0" May 17 00:30:56.098030 env[1216]: 2025-05-17 00:30:56.087 [INFO][4605] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a4d0624842c5c7e1d944a9d2ce00c50c68a145628199d481361fdb7a7f4e9534" HandleID="k8s-pod-network.a4d0624842c5c7e1d944a9d2ce00c50c68a145628199d481361fdb7a7f4e9534" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-goldmane--78d55f7ddc--sx8fp-eth0" May 17 00:30:56.098030 env[1216]: 2025-05-17 00:30:56.093 [INFO][4605] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:30:56.098030 env[1216]: 2025-05-17 00:30:56.095 [INFO][4597] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="a4d0624842c5c7e1d944a9d2ce00c50c68a145628199d481361fdb7a7f4e9534" May 17 00:30:56.098030 env[1216]: time="2025-05-17T00:30:56.097969657Z" level=info msg="TearDown network for sandbox \"a4d0624842c5c7e1d944a9d2ce00c50c68a145628199d481361fdb7a7f4e9534\" successfully" May 17 00:30:56.098030 env[1216]: time="2025-05-17T00:30:56.098025423Z" level=info msg="StopPodSandbox for \"a4d0624842c5c7e1d944a9d2ce00c50c68a145628199d481361fdb7a7f4e9534\" returns successfully" May 17 00:30:56.099185 env[1216]: time="2025-05-17T00:30:56.098737090Z" level=info msg="RemovePodSandbox for \"a4d0624842c5c7e1d944a9d2ce00c50c68a145628199d481361fdb7a7f4e9534\"" May 17 00:30:56.099185 env[1216]: time="2025-05-17T00:30:56.098785271Z" level=info msg="Forcibly stopping sandbox \"a4d0624842c5c7e1d944a9d2ce00c50c68a145628199d481361fdb7a7f4e9534\"" May 17 00:30:56.263211 env[1216]: 2025-05-17 00:30:56.189 [WARNING][4621] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a4d0624842c5c7e1d944a9d2ce00c50c68a145628199d481361fdb7a7f4e9534" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-goldmane--78d55f7ddc--sx8fp-eth0", GenerateName:"goldmane-78d55f7ddc-", Namespace:"calico-system", SelfLink:"", UID:"a859c06b-ce28-4cc1-830c-0d905598097c", ResourceVersion:"1064", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 30, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"78d55f7ddc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7", ContainerID:"f80273787f4ea45fe2a310dc27e8b7dea73e5b38f83ec66d50c14935a74ff0b2", Pod:"goldmane-78d55f7ddc-sx8fp", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.71.200/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali2089a515c9e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:30:56.263211 env[1216]: 2025-05-17 00:30:56.190 [INFO][4621] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="a4d0624842c5c7e1d944a9d2ce00c50c68a145628199d481361fdb7a7f4e9534" May 17 00:30:56.263211 env[1216]: 2025-05-17 00:30:56.190 [INFO][4621] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a4d0624842c5c7e1d944a9d2ce00c50c68a145628199d481361fdb7a7f4e9534" iface="eth0" netns="" May 17 00:30:56.263211 env[1216]: 2025-05-17 00:30:56.190 [INFO][4621] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="a4d0624842c5c7e1d944a9d2ce00c50c68a145628199d481361fdb7a7f4e9534" May 17 00:30:56.263211 env[1216]: 2025-05-17 00:30:56.190 [INFO][4621] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a4d0624842c5c7e1d944a9d2ce00c50c68a145628199d481361fdb7a7f4e9534" May 17 00:30:56.263211 env[1216]: 2025-05-17 00:30:56.242 [INFO][4629] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a4d0624842c5c7e1d944a9d2ce00c50c68a145628199d481361fdb7a7f4e9534" HandleID="k8s-pod-network.a4d0624842c5c7e1d944a9d2ce00c50c68a145628199d481361fdb7a7f4e9534" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-goldmane--78d55f7ddc--sx8fp-eth0" May 17 00:30:56.263211 env[1216]: 2025-05-17 00:30:56.243 [INFO][4629] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:30:56.263211 env[1216]: 2025-05-17 00:30:56.243 [INFO][4629] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:30:56.263211 env[1216]: 2025-05-17 00:30:56.255 [WARNING][4629] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a4d0624842c5c7e1d944a9d2ce00c50c68a145628199d481361fdb7a7f4e9534" HandleID="k8s-pod-network.a4d0624842c5c7e1d944a9d2ce00c50c68a145628199d481361fdb7a7f4e9534" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-goldmane--78d55f7ddc--sx8fp-eth0" May 17 00:30:56.263211 env[1216]: 2025-05-17 00:30:56.255 [INFO][4629] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a4d0624842c5c7e1d944a9d2ce00c50c68a145628199d481361fdb7a7f4e9534" HandleID="k8s-pod-network.a4d0624842c5c7e1d944a9d2ce00c50c68a145628199d481361fdb7a7f4e9534" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-goldmane--78d55f7ddc--sx8fp-eth0" May 17 00:30:56.263211 env[1216]: 2025-05-17 00:30:56.257 [INFO][4629] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:30:56.263211 env[1216]: 2025-05-17 00:30:56.260 [INFO][4621] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="a4d0624842c5c7e1d944a9d2ce00c50c68a145628199d481361fdb7a7f4e9534" May 17 00:30:56.264420 env[1216]: time="2025-05-17T00:30:56.264367961Z" level=info msg="TearDown network for sandbox \"a4d0624842c5c7e1d944a9d2ce00c50c68a145628199d481361fdb7a7f4e9534\" successfully" May 17 00:30:56.271174 env[1216]: time="2025-05-17T00:30:56.271107799Z" level=info msg="RemovePodSandbox \"a4d0624842c5c7e1d944a9d2ce00c50c68a145628199d481361fdb7a7f4e9534\" returns successfully" May 17 00:30:56.271933 env[1216]: time="2025-05-17T00:30:56.271891292Z" level=info msg="StopPodSandbox for \"38b9f7870f314bc8c74101a725e7fab52d045d1b5a1c684e98888a801f12cdcc\"" May 17 00:30:56.442138 env[1216]: 2025-05-17 00:30:56.379 [WARNING][4645] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="38b9f7870f314bc8c74101a725e7fab52d045d1b5a1c684e98888a801f12cdcc" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-coredns--674b8bbfcf--ztckd-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"321c0e51-f8c3-46b7-a173-1e567c86d95b", ResourceVersion:"965", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 30, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7", ContainerID:"84e000f218be6cc33abd8ab22b06b7caffae02444617fab89910e58586aceee2", Pod:"coredns-674b8bbfcf-ztckd", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.71.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali52f6af829ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:30:56.442138 env[1216]: 2025-05-17 00:30:56.379 [INFO][4645] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="38b9f7870f314bc8c74101a725e7fab52d045d1b5a1c684e98888a801f12cdcc" May 17 00:30:56.442138 env[1216]: 2025-05-17 00:30:56.379 [INFO][4645] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="38b9f7870f314bc8c74101a725e7fab52d045d1b5a1c684e98888a801f12cdcc" iface="eth0" netns="" May 17 00:30:56.442138 env[1216]: 2025-05-17 00:30:56.379 [INFO][4645] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="38b9f7870f314bc8c74101a725e7fab52d045d1b5a1c684e98888a801f12cdcc" May 17 00:30:56.442138 env[1216]: 2025-05-17 00:30:56.379 [INFO][4645] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="38b9f7870f314bc8c74101a725e7fab52d045d1b5a1c684e98888a801f12cdcc" May 17 00:30:56.442138 env[1216]: 2025-05-17 00:30:56.421 [INFO][4652] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="38b9f7870f314bc8c74101a725e7fab52d045d1b5a1c684e98888a801f12cdcc" HandleID="k8s-pod-network.38b9f7870f314bc8c74101a725e7fab52d045d1b5a1c684e98888a801f12cdcc" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-coredns--674b8bbfcf--ztckd-eth0" May 17 00:30:56.442138 env[1216]: 2025-05-17 00:30:56.422 [INFO][4652] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:30:56.442138 env[1216]: 2025-05-17 00:30:56.422 [INFO][4652] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:30:56.442138 env[1216]: 2025-05-17 00:30:56.434 [WARNING][4652] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="38b9f7870f314bc8c74101a725e7fab52d045d1b5a1c684e98888a801f12cdcc" HandleID="k8s-pod-network.38b9f7870f314bc8c74101a725e7fab52d045d1b5a1c684e98888a801f12cdcc" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-coredns--674b8bbfcf--ztckd-eth0" May 17 00:30:56.442138 env[1216]: 2025-05-17 00:30:56.434 [INFO][4652] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="38b9f7870f314bc8c74101a725e7fab52d045d1b5a1c684e98888a801f12cdcc" HandleID="k8s-pod-network.38b9f7870f314bc8c74101a725e7fab52d045d1b5a1c684e98888a801f12cdcc" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-coredns--674b8bbfcf--ztckd-eth0" May 17 00:30:56.442138 env[1216]: 2025-05-17 00:30:56.437 [INFO][4652] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:30:56.442138 env[1216]: 2025-05-17 00:30:56.439 [INFO][4645] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="38b9f7870f314bc8c74101a725e7fab52d045d1b5a1c684e98888a801f12cdcc" May 17 00:30:56.443421 env[1216]: time="2025-05-17T00:30:56.443361125Z" level=info msg="TearDown network for sandbox \"38b9f7870f314bc8c74101a725e7fab52d045d1b5a1c684e98888a801f12cdcc\" successfully" May 17 00:30:56.443605 env[1216]: time="2025-05-17T00:30:56.443573698Z" level=info msg="StopPodSandbox for \"38b9f7870f314bc8c74101a725e7fab52d045d1b5a1c684e98888a801f12cdcc\" returns successfully" May 17 00:30:56.444461 env[1216]: time="2025-05-17T00:30:56.444418039Z" level=info msg="RemovePodSandbox for \"38b9f7870f314bc8c74101a725e7fab52d045d1b5a1c684e98888a801f12cdcc\"" May 17 00:30:56.444716 env[1216]: time="2025-05-17T00:30:56.444632589Z" level=info msg="Forcibly stopping sandbox \"38b9f7870f314bc8c74101a725e7fab52d045d1b5a1c684e98888a801f12cdcc\"" May 17 00:30:56.642393 env[1216]: 2025-05-17 00:30:56.544 [WARNING][4667] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="38b9f7870f314bc8c74101a725e7fab52d045d1b5a1c684e98888a801f12cdcc" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-coredns--674b8bbfcf--ztckd-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"321c0e51-f8c3-46b7-a173-1e567c86d95b", ResourceVersion:"965", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 30, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7", ContainerID:"84e000f218be6cc33abd8ab22b06b7caffae02444617fab89910e58586aceee2", Pod:"coredns-674b8bbfcf-ztckd", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.71.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali52f6af829ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:30:56.642393 env[1216]: 2025-05-17 00:30:56.545 [INFO][4667] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="38b9f7870f314bc8c74101a725e7fab52d045d1b5a1c684e98888a801f12cdcc" May 17 00:30:56.642393 env[1216]: 2025-05-17 00:30:56.545 [INFO][4667] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="38b9f7870f314bc8c74101a725e7fab52d045d1b5a1c684e98888a801f12cdcc" iface="eth0" netns="" May 17 00:30:56.642393 env[1216]: 2025-05-17 00:30:56.545 [INFO][4667] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="38b9f7870f314bc8c74101a725e7fab52d045d1b5a1c684e98888a801f12cdcc" May 17 00:30:56.642393 env[1216]: 2025-05-17 00:30:56.545 [INFO][4667] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="38b9f7870f314bc8c74101a725e7fab52d045d1b5a1c684e98888a801f12cdcc" May 17 00:30:56.642393 env[1216]: 2025-05-17 00:30:56.622 [INFO][4674] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="38b9f7870f314bc8c74101a725e7fab52d045d1b5a1c684e98888a801f12cdcc" HandleID="k8s-pod-network.38b9f7870f314bc8c74101a725e7fab52d045d1b5a1c684e98888a801f12cdcc" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-coredns--674b8bbfcf--ztckd-eth0" May 17 00:30:56.642393 env[1216]: 2025-05-17 00:30:56.623 [INFO][4674] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:30:56.642393 env[1216]: 2025-05-17 00:30:56.623 [INFO][4674] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:30:56.642393 env[1216]: 2025-05-17 00:30:56.634 [WARNING][4674] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="38b9f7870f314bc8c74101a725e7fab52d045d1b5a1c684e98888a801f12cdcc" HandleID="k8s-pod-network.38b9f7870f314bc8c74101a725e7fab52d045d1b5a1c684e98888a801f12cdcc" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-coredns--674b8bbfcf--ztckd-eth0" May 17 00:30:56.642393 env[1216]: 2025-05-17 00:30:56.634 [INFO][4674] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="38b9f7870f314bc8c74101a725e7fab52d045d1b5a1c684e98888a801f12cdcc" HandleID="k8s-pod-network.38b9f7870f314bc8c74101a725e7fab52d045d1b5a1c684e98888a801f12cdcc" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-coredns--674b8bbfcf--ztckd-eth0" May 17 00:30:56.642393 env[1216]: 2025-05-17 00:30:56.637 [INFO][4674] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:30:56.642393 env[1216]: 2025-05-17 00:30:56.639 [INFO][4667] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="38b9f7870f314bc8c74101a725e7fab52d045d1b5a1c684e98888a801f12cdcc" May 17 00:30:56.643531 env[1216]: time="2025-05-17T00:30:56.642452147Z" level=info msg="TearDown network for sandbox \"38b9f7870f314bc8c74101a725e7fab52d045d1b5a1c684e98888a801f12cdcc\" successfully" May 17 00:30:56.649106 env[1216]: time="2025-05-17T00:30:56.648753802Z" level=info msg="RemovePodSandbox \"38b9f7870f314bc8c74101a725e7fab52d045d1b5a1c684e98888a801f12cdcc\" returns successfully" May 17 00:30:56.649685 env[1216]: time="2025-05-17T00:30:56.649342041Z" level=info msg="StopPodSandbox for \"4c35600aa5b627fbb3ef3071e9d4c28f2c17eedb7a64fe05b2cf6d7966a6bd7c\"" May 17 00:30:56.744000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520987 scontext=system_u:system_r:svirt_lxc_net_t:s0:c296,c329 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:30:56.744000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001eb0a80 a2=fc6 a3=0 items=0 ppid=1752 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c296,c329 key=(null) May 17 00:30:56.744000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:30:56.747000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520987 scontext=system_u:system_r:svirt_lxc_net_t:s0:c296,c329 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:30:56.747000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001cf5940 a2=fc6 a3=0 items=0 ppid=1752 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c296,c329 key=(null) May 17 00:30:56.747000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:30:56.747000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520987 scontext=system_u:system_r:svirt_lxc_net_t:s0:c296,c329 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:30:56.747000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001cf5980 a2=fc6 a3=0 items=0 ppid=1752 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c296,c329 key=(null) May 17 00:30:56.747000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:30:56.747000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520987 scontext=system_u:system_r:svirt_lxc_net_t:s0:c296,c329 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:30:56.747000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001cf59c0 a2=fc6 a3=0 items=0 ppid=1752 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c296,c329 key=(null) May 17 00:30:56.747000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:30:56.824834 env[1216]: 2025-05-17 00:30:56.754 [WARNING][4690] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="4c35600aa5b627fbb3ef3071e9d4c28f2c17eedb7a64fe05b2cf6d7966a6bd7c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-coredns--674b8bbfcf--gslzx-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"9ee031f2-ed1e-4d3c-b82c-99c5de10f1f4", ResourceVersion:"996", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 30, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7", ContainerID:"a3f33694f994aedb7e80cf1f44e989c089e7803da96ab962627949944d739a90", Pod:"coredns-674b8bbfcf-gslzx", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.71.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali5282290c704", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:30:56.824834 env[1216]: 2025-05-17 00:30:56.754 [INFO][4690] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="4c35600aa5b627fbb3ef3071e9d4c28f2c17eedb7a64fe05b2cf6d7966a6bd7c" May 17 00:30:56.824834 env[1216]: 2025-05-17 00:30:56.754 [INFO][4690] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="4c35600aa5b627fbb3ef3071e9d4c28f2c17eedb7a64fe05b2cf6d7966a6bd7c" iface="eth0" netns="" May 17 00:30:56.824834 env[1216]: 2025-05-17 00:30:56.755 [INFO][4690] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="4c35600aa5b627fbb3ef3071e9d4c28f2c17eedb7a64fe05b2cf6d7966a6bd7c" May 17 00:30:56.824834 env[1216]: 2025-05-17 00:30:56.755 [INFO][4690] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4c35600aa5b627fbb3ef3071e9d4c28f2c17eedb7a64fe05b2cf6d7966a6bd7c" May 17 00:30:56.824834 env[1216]: 2025-05-17 00:30:56.803 [INFO][4697] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4c35600aa5b627fbb3ef3071e9d4c28f2c17eedb7a64fe05b2cf6d7966a6bd7c" HandleID="k8s-pod-network.4c35600aa5b627fbb3ef3071e9d4c28f2c17eedb7a64fe05b2cf6d7966a6bd7c" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-coredns--674b8bbfcf--gslzx-eth0" May 17 00:30:56.824834 env[1216]: 2025-05-17 00:30:56.804 [INFO][4697] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:30:56.824834 env[1216]: 2025-05-17 00:30:56.804 [INFO][4697] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:30:56.824834 env[1216]: 2025-05-17 00:30:56.817 [WARNING][4697] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4c35600aa5b627fbb3ef3071e9d4c28f2c17eedb7a64fe05b2cf6d7966a6bd7c" HandleID="k8s-pod-network.4c35600aa5b627fbb3ef3071e9d4c28f2c17eedb7a64fe05b2cf6d7966a6bd7c" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-coredns--674b8bbfcf--gslzx-eth0" May 17 00:30:56.824834 env[1216]: 2025-05-17 00:30:56.817 [INFO][4697] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4c35600aa5b627fbb3ef3071e9d4c28f2c17eedb7a64fe05b2cf6d7966a6bd7c" HandleID="k8s-pod-network.4c35600aa5b627fbb3ef3071e9d4c28f2c17eedb7a64fe05b2cf6d7966a6bd7c" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-coredns--674b8bbfcf--gslzx-eth0" May 17 00:30:56.824834 env[1216]: 2025-05-17 00:30:56.820 [INFO][4697] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:30:56.824834 env[1216]: 2025-05-17 00:30:56.822 [INFO][4690] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="4c35600aa5b627fbb3ef3071e9d4c28f2c17eedb7a64fe05b2cf6d7966a6bd7c" May 17 00:30:56.826359 env[1216]: time="2025-05-17T00:30:56.826299692Z" level=info msg="TearDown network for sandbox \"4c35600aa5b627fbb3ef3071e9d4c28f2c17eedb7a64fe05b2cf6d7966a6bd7c\" successfully" May 17 00:30:56.826490 env[1216]: time="2025-05-17T00:30:56.826462248Z" level=info msg="StopPodSandbox for \"4c35600aa5b627fbb3ef3071e9d4c28f2c17eedb7a64fe05b2cf6d7966a6bd7c\" returns successfully" May 17 00:30:56.827394 env[1216]: time="2025-05-17T00:30:56.827355596Z" level=info msg="RemovePodSandbox for \"4c35600aa5b627fbb3ef3071e9d4c28f2c17eedb7a64fe05b2cf6d7966a6bd7c\"" May 17 00:30:56.827609 env[1216]: time="2025-05-17T00:30:56.827540621Z" level=info msg="Forcibly stopping sandbox \"4c35600aa5b627fbb3ef3071e9d4c28f2c17eedb7a64fe05b2cf6d7966a6bd7c\"" May 17 00:30:56.999622 env[1216]: 2025-05-17 00:30:56.932 [WARNING][4713] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="4c35600aa5b627fbb3ef3071e9d4c28f2c17eedb7a64fe05b2cf6d7966a6bd7c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-coredns--674b8bbfcf--gslzx-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"9ee031f2-ed1e-4d3c-b82c-99c5de10f1f4", ResourceVersion:"996", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 30, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7", ContainerID:"a3f33694f994aedb7e80cf1f44e989c089e7803da96ab962627949944d739a90", Pod:"coredns-674b8bbfcf-gslzx", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.71.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali5282290c704", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:30:56.999622 env[1216]: 2025-05-17 00:30:56.932 [INFO][4713] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="4c35600aa5b627fbb3ef3071e9d4c28f2c17eedb7a64fe05b2cf6d7966a6bd7c" May 17 00:30:56.999622 env[1216]: 2025-05-17 00:30:56.932 [INFO][4713] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="4c35600aa5b627fbb3ef3071e9d4c28f2c17eedb7a64fe05b2cf6d7966a6bd7c" iface="eth0" netns="" May 17 00:30:56.999622 env[1216]: 2025-05-17 00:30:56.932 [INFO][4713] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="4c35600aa5b627fbb3ef3071e9d4c28f2c17eedb7a64fe05b2cf6d7966a6bd7c" May 17 00:30:56.999622 env[1216]: 2025-05-17 00:30:56.932 [INFO][4713] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4c35600aa5b627fbb3ef3071e9d4c28f2c17eedb7a64fe05b2cf6d7966a6bd7c" May 17 00:30:56.999622 env[1216]: 2025-05-17 00:30:56.977 [INFO][4720] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4c35600aa5b627fbb3ef3071e9d4c28f2c17eedb7a64fe05b2cf6d7966a6bd7c" HandleID="k8s-pod-network.4c35600aa5b627fbb3ef3071e9d4c28f2c17eedb7a64fe05b2cf6d7966a6bd7c" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-coredns--674b8bbfcf--gslzx-eth0" May 17 00:30:56.999622 env[1216]: 2025-05-17 00:30:56.978 [INFO][4720] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:30:56.999622 env[1216]: 2025-05-17 00:30:56.978 [INFO][4720] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:30:56.999622 env[1216]: 2025-05-17 00:30:56.989 [WARNING][4720] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4c35600aa5b627fbb3ef3071e9d4c28f2c17eedb7a64fe05b2cf6d7966a6bd7c" HandleID="k8s-pod-network.4c35600aa5b627fbb3ef3071e9d4c28f2c17eedb7a64fe05b2cf6d7966a6bd7c" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-coredns--674b8bbfcf--gslzx-eth0" May 17 00:30:56.999622 env[1216]: 2025-05-17 00:30:56.989 [INFO][4720] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4c35600aa5b627fbb3ef3071e9d4c28f2c17eedb7a64fe05b2cf6d7966a6bd7c" HandleID="k8s-pod-network.4c35600aa5b627fbb3ef3071e9d4c28f2c17eedb7a64fe05b2cf6d7966a6bd7c" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-coredns--674b8bbfcf--gslzx-eth0" May 17 00:30:56.999622 env[1216]: 2025-05-17 00:30:56.993 [INFO][4720] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:30:56.999622 env[1216]: 2025-05-17 00:30:56.995 [INFO][4713] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="4c35600aa5b627fbb3ef3071e9d4c28f2c17eedb7a64fe05b2cf6d7966a6bd7c" May 17 00:30:57.000572 env[1216]: time="2025-05-17T00:30:57.000504399Z" level=info msg="TearDown network for sandbox \"4c35600aa5b627fbb3ef3071e9d4c28f2c17eedb7a64fe05b2cf6d7966a6bd7c\" successfully" May 17 00:30:57.517831 env[1216]: time="2025-05-17T00:30:57.517756770Z" level=info msg="RemovePodSandbox \"4c35600aa5b627fbb3ef3071e9d4c28f2c17eedb7a64fe05b2cf6d7966a6bd7c\" returns successfully" May 17 00:30:57.519109 env[1216]: time="2025-05-17T00:30:57.519063645Z" level=info msg="StopPodSandbox for \"74fc87334f78fb1a2c484b24de65157ae69a6602f8490b6ab360e61b545e6af6\"" May 17 00:30:57.520439 env[1216]: time="2025-05-17T00:30:57.520396457Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:30:57.633198 env[1216]: 2025-05-17 00:30:57.575 [WARNING][4735] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="74fc87334f78fb1a2c484b24de65157ae69a6602f8490b6ab360e61b545e6af6" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-calico--apiserver--5544b97fc--9jp6z-eth0", GenerateName:"calico-apiserver-5544b97fc-", Namespace:"calico-apiserver", SelfLink:"", UID:"d7e6c2c3-1282-4564-8eee-869b9655c267", ResourceVersion:"1018", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 30, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5544b97fc", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7", ContainerID:"20326f008f438671742e2d4a580ffa5bc448cc6baea0fcc3b42b7cadcbb2d3c8", Pod:"calico-apiserver-5544b97fc-9jp6z", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.71.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calia62815005d1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:30:57.633198 env[1216]: 2025-05-17 00:30:57.580 [INFO][4735] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="74fc87334f78fb1a2c484b24de65157ae69a6602f8490b6ab360e61b545e6af6" May 17 00:30:57.633198 env[1216]: 2025-05-17 00:30:57.580 [INFO][4735] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="74fc87334f78fb1a2c484b24de65157ae69a6602f8490b6ab360e61b545e6af6" iface="eth0" netns="" May 17 00:30:57.633198 env[1216]: 2025-05-17 00:30:57.580 [INFO][4735] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="74fc87334f78fb1a2c484b24de65157ae69a6602f8490b6ab360e61b545e6af6" May 17 00:30:57.633198 env[1216]: 2025-05-17 00:30:57.580 [INFO][4735] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="74fc87334f78fb1a2c484b24de65157ae69a6602f8490b6ab360e61b545e6af6" May 17 00:30:57.633198 env[1216]: 2025-05-17 00:30:57.609 [INFO][4742] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="74fc87334f78fb1a2c484b24de65157ae69a6602f8490b6ab360e61b545e6af6" HandleID="k8s-pod-network.74fc87334f78fb1a2c484b24de65157ae69a6602f8490b6ab360e61b545e6af6" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-calico--apiserver--5544b97fc--9jp6z-eth0" May 17 00:30:57.633198 env[1216]: 2025-05-17 00:30:57.610 [INFO][4742] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:30:57.633198 env[1216]: 2025-05-17 00:30:57.610 [INFO][4742] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:30:57.633198 env[1216]: 2025-05-17 00:30:57.620 [WARNING][4742] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="74fc87334f78fb1a2c484b24de65157ae69a6602f8490b6ab360e61b545e6af6" HandleID="k8s-pod-network.74fc87334f78fb1a2c484b24de65157ae69a6602f8490b6ab360e61b545e6af6" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-calico--apiserver--5544b97fc--9jp6z-eth0" May 17 00:30:57.633198 env[1216]: 2025-05-17 00:30:57.620 [INFO][4742] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="74fc87334f78fb1a2c484b24de65157ae69a6602f8490b6ab360e61b545e6af6" HandleID="k8s-pod-network.74fc87334f78fb1a2c484b24de65157ae69a6602f8490b6ab360e61b545e6af6" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-calico--apiserver--5544b97fc--9jp6z-eth0" May 17 00:30:57.633198 env[1216]: 2025-05-17 00:30:57.628 [INFO][4742] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:30:57.633198 env[1216]: 2025-05-17 00:30:57.630 [INFO][4735] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="74fc87334f78fb1a2c484b24de65157ae69a6602f8490b6ab360e61b545e6af6" May 17 00:30:57.634178 env[1216]: time="2025-05-17T00:30:57.633202975Z" level=info msg="TearDown network for sandbox \"74fc87334f78fb1a2c484b24de65157ae69a6602f8490b6ab360e61b545e6af6\" successfully" May 17 00:30:57.634178 env[1216]: time="2025-05-17T00:30:57.633246621Z" level=info msg="StopPodSandbox for \"74fc87334f78fb1a2c484b24de65157ae69a6602f8490b6ab360e61b545e6af6\" returns successfully" May 17 00:30:57.634178 env[1216]: time="2025-05-17T00:30:57.634074710Z" level=info msg="RemovePodSandbox for \"74fc87334f78fb1a2c484b24de65157ae69a6602f8490b6ab360e61b545e6af6\"" May 17 00:30:57.634178 env[1216]: time="2025-05-17T00:30:57.634119933Z" level=info msg="Forcibly stopping sandbox \"74fc87334f78fb1a2c484b24de65157ae69a6602f8490b6ab360e61b545e6af6\"" May 17 00:30:57.759257 env[1216]: 2025-05-17 00:30:57.703 [WARNING][4757] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="74fc87334f78fb1a2c484b24de65157ae69a6602f8490b6ab360e61b545e6af6" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-calico--apiserver--5544b97fc--9jp6z-eth0", GenerateName:"calico-apiserver-5544b97fc-", Namespace:"calico-apiserver", SelfLink:"", UID:"d7e6c2c3-1282-4564-8eee-869b9655c267", ResourceVersion:"1018", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 30, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5544b97fc", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7", ContainerID:"20326f008f438671742e2d4a580ffa5bc448cc6baea0fcc3b42b7cadcbb2d3c8", Pod:"calico-apiserver-5544b97fc-9jp6z", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.71.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calia62815005d1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:30:57.759257 env[1216]: 2025-05-17 00:30:57.704 [INFO][4757] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="74fc87334f78fb1a2c484b24de65157ae69a6602f8490b6ab360e61b545e6af6" May 17 00:30:57.759257 env[1216]: 2025-05-17 00:30:57.704 [INFO][4757] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="74fc87334f78fb1a2c484b24de65157ae69a6602f8490b6ab360e61b545e6af6" iface="eth0" netns="" May 17 00:30:57.759257 env[1216]: 2025-05-17 00:30:57.704 [INFO][4757] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="74fc87334f78fb1a2c484b24de65157ae69a6602f8490b6ab360e61b545e6af6" May 17 00:30:57.759257 env[1216]: 2025-05-17 00:30:57.704 [INFO][4757] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="74fc87334f78fb1a2c484b24de65157ae69a6602f8490b6ab360e61b545e6af6" May 17 00:30:57.759257 env[1216]: 2025-05-17 00:30:57.742 [INFO][4764] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="74fc87334f78fb1a2c484b24de65157ae69a6602f8490b6ab360e61b545e6af6" HandleID="k8s-pod-network.74fc87334f78fb1a2c484b24de65157ae69a6602f8490b6ab360e61b545e6af6" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-calico--apiserver--5544b97fc--9jp6z-eth0" May 17 00:30:57.759257 env[1216]: 2025-05-17 00:30:57.742 [INFO][4764] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:30:57.759257 env[1216]: 2025-05-17 00:30:57.742 [INFO][4764] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:30:57.759257 env[1216]: 2025-05-17 00:30:57.753 [WARNING][4764] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="74fc87334f78fb1a2c484b24de65157ae69a6602f8490b6ab360e61b545e6af6" HandleID="k8s-pod-network.74fc87334f78fb1a2c484b24de65157ae69a6602f8490b6ab360e61b545e6af6" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-calico--apiserver--5544b97fc--9jp6z-eth0" May 17 00:30:57.759257 env[1216]: 2025-05-17 00:30:57.753 [INFO][4764] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="74fc87334f78fb1a2c484b24de65157ae69a6602f8490b6ab360e61b545e6af6" HandleID="k8s-pod-network.74fc87334f78fb1a2c484b24de65157ae69a6602f8490b6ab360e61b545e6af6" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-calico--apiserver--5544b97fc--9jp6z-eth0" May 17 00:30:57.759257 env[1216]: 2025-05-17 00:30:57.755 [INFO][4764] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:30:57.759257 env[1216]: 2025-05-17 00:30:57.757 [INFO][4757] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="74fc87334f78fb1a2c484b24de65157ae69a6602f8490b6ab360e61b545e6af6" May 17 00:30:57.760357 env[1216]: time="2025-05-17T00:30:57.759287277Z" level=info msg="TearDown network for sandbox \"74fc87334f78fb1a2c484b24de65157ae69a6602f8490b6ab360e61b545e6af6\" successfully" May 17 00:30:58.341184 env[1216]: time="2025-05-17T00:30:58.335684277Z" level=info msg="RemovePodSandbox \"74fc87334f78fb1a2c484b24de65157ae69a6602f8490b6ab360e61b545e6af6\" returns successfully" May 17 00:30:58.341184 env[1216]: time="2025-05-17T00:30:58.337866302Z" level=info msg="StopPodSandbox for \"f10659a095b6207e25ad3f2ea8706faadc6cd96cea0f4c04f07a756f854db02e\"" May 17 00:30:58.444353 env[1216]: time="2025-05-17T00:30:58.444248096Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:45c8692ffc029387ee93ba83da8ad26da9749cf2ba6ed03981f8f9933ed5a5b0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:30:58.450441 env[1216]: 2025-05-17 00:30:58.391 [WARNING][4783] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="f10659a095b6207e25ad3f2ea8706faadc6cd96cea0f4c04f07a756f854db02e" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-whisker--6fb67bf47d--pm895-eth0" May 17 00:30:58.450441 env[1216]: 2025-05-17 00:30:58.391 [INFO][4783] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="f10659a095b6207e25ad3f2ea8706faadc6cd96cea0f4c04f07a756f854db02e" May 17 00:30:58.450441 env[1216]: 2025-05-17 00:30:58.391 [INFO][4783] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f10659a095b6207e25ad3f2ea8706faadc6cd96cea0f4c04f07a756f854db02e" iface="eth0" netns="" May 17 00:30:58.450441 env[1216]: 2025-05-17 00:30:58.391 [INFO][4783] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="f10659a095b6207e25ad3f2ea8706faadc6cd96cea0f4c04f07a756f854db02e" May 17 00:30:58.450441 env[1216]: 2025-05-17 00:30:58.391 [INFO][4783] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f10659a095b6207e25ad3f2ea8706faadc6cd96cea0f4c04f07a756f854db02e" May 17 00:30:58.450441 env[1216]: 2025-05-17 00:30:58.427 [INFO][4790] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f10659a095b6207e25ad3f2ea8706faadc6cd96cea0f4c04f07a756f854db02e" HandleID="k8s-pod-network.f10659a095b6207e25ad3f2ea8706faadc6cd96cea0f4c04f07a756f854db02e" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-whisker--6fb67bf47d--pm895-eth0" May 17 00:30:58.450441 env[1216]: 2025-05-17 00:30:58.427 [INFO][4790] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:30:58.450441 env[1216]: 2025-05-17 00:30:58.427 [INFO][4790] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:30:58.450441 env[1216]: 2025-05-17 00:30:58.438 [WARNING][4790] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f10659a095b6207e25ad3f2ea8706faadc6cd96cea0f4c04f07a756f854db02e" HandleID="k8s-pod-network.f10659a095b6207e25ad3f2ea8706faadc6cd96cea0f4c04f07a756f854db02e" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-whisker--6fb67bf47d--pm895-eth0" May 17 00:30:58.450441 env[1216]: 2025-05-17 00:30:58.438 [INFO][4790] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f10659a095b6207e25ad3f2ea8706faadc6cd96cea0f4c04f07a756f854db02e" HandleID="k8s-pod-network.f10659a095b6207e25ad3f2ea8706faadc6cd96cea0f4c04f07a756f854db02e" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-whisker--6fb67bf47d--pm895-eth0" May 17 00:30:58.450441 env[1216]: 2025-05-17 00:30:58.440 [INFO][4790] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:30:58.450441 env[1216]: 2025-05-17 00:30:58.443 [INFO][4783] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="f10659a095b6207e25ad3f2ea8706faadc6cd96cea0f4c04f07a756f854db02e" May 17 00:30:58.451444 env[1216]: time="2025-05-17T00:30:58.450480695Z" level=info msg="TearDown network for sandbox \"f10659a095b6207e25ad3f2ea8706faadc6cd96cea0f4c04f07a756f854db02e\" successfully" May 17 00:30:58.451444 env[1216]: time="2025-05-17T00:30:58.450521178Z" level=info msg="StopPodSandbox for \"f10659a095b6207e25ad3f2ea8706faadc6cd96cea0f4c04f07a756f854db02e\" returns successfully" May 17 00:30:58.451926 env[1216]: time="2025-05-17T00:30:58.451883579Z" level=info msg="RemovePodSandbox for \"f10659a095b6207e25ad3f2ea8706faadc6cd96cea0f4c04f07a756f854db02e\"" May 17 00:30:58.452262 env[1216]: time="2025-05-17T00:30:58.452170047Z" level=info msg="Forcibly stopping sandbox \"f10659a095b6207e25ad3f2ea8706faadc6cd96cea0f4c04f07a756f854db02e\"" May 17 00:30:58.556487 env[1216]: 2025-05-17 00:30:58.501 [WARNING][4805] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="f10659a095b6207e25ad3f2ea8706faadc6cd96cea0f4c04f07a756f854db02e" WorkloadEndpoint="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-whisker--6fb67bf47d--pm895-eth0" May 17 00:30:58.556487 env[1216]: 2025-05-17 00:30:58.501 [INFO][4805] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="f10659a095b6207e25ad3f2ea8706faadc6cd96cea0f4c04f07a756f854db02e" May 17 00:30:58.556487 env[1216]: 2025-05-17 00:30:58.501 [INFO][4805] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f10659a095b6207e25ad3f2ea8706faadc6cd96cea0f4c04f07a756f854db02e" iface="eth0" netns="" May 17 00:30:58.556487 env[1216]: 2025-05-17 00:30:58.501 [INFO][4805] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="f10659a095b6207e25ad3f2ea8706faadc6cd96cea0f4c04f07a756f854db02e" May 17 00:30:58.556487 env[1216]: 2025-05-17 00:30:58.501 [INFO][4805] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f10659a095b6207e25ad3f2ea8706faadc6cd96cea0f4c04f07a756f854db02e" May 17 00:30:58.556487 env[1216]: 2025-05-17 00:30:58.533 [INFO][4812] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f10659a095b6207e25ad3f2ea8706faadc6cd96cea0f4c04f07a756f854db02e" HandleID="k8s-pod-network.f10659a095b6207e25ad3f2ea8706faadc6cd96cea0f4c04f07a756f854db02e" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-whisker--6fb67bf47d--pm895-eth0" May 17 00:30:58.556487 env[1216]: 2025-05-17 00:30:58.534 [INFO][4812] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:30:58.556487 env[1216]: 2025-05-17 00:30:58.534 [INFO][4812] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:30:58.556487 env[1216]: 2025-05-17 00:30:58.549 [WARNING][4812] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f10659a095b6207e25ad3f2ea8706faadc6cd96cea0f4c04f07a756f854db02e" HandleID="k8s-pod-network.f10659a095b6207e25ad3f2ea8706faadc6cd96cea0f4c04f07a756f854db02e" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-whisker--6fb67bf47d--pm895-eth0" May 17 00:30:58.556487 env[1216]: 2025-05-17 00:30:58.549 [INFO][4812] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f10659a095b6207e25ad3f2ea8706faadc6cd96cea0f4c04f07a756f854db02e" HandleID="k8s-pod-network.f10659a095b6207e25ad3f2ea8706faadc6cd96cea0f4c04f07a756f854db02e" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-whisker--6fb67bf47d--pm895-eth0" May 17 00:30:58.556487 env[1216]: 2025-05-17 00:30:58.551 [INFO][4812] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:30:58.556487 env[1216]: 2025-05-17 00:30:58.554 [INFO][4805] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="f10659a095b6207e25ad3f2ea8706faadc6cd96cea0f4c04f07a756f854db02e" May 17 00:30:58.557283 env[1216]: time="2025-05-17T00:30:58.557221163Z" level=info msg="TearDown network for sandbox \"f10659a095b6207e25ad3f2ea8706faadc6cd96cea0f4c04f07a756f854db02e\" successfully" May 17 00:30:58.651222 env[1216]: time="2025-05-17T00:30:58.649223701Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:30:58.779899 env[1216]: time="2025-05-17T00:30:58.779812649Z" level=info msg="RemovePodSandbox \"f10659a095b6207e25ad3f2ea8706faadc6cd96cea0f4c04f07a756f854db02e\" returns successfully" May 17 00:30:58.780841 env[1216]: time="2025-05-17T00:30:58.780789616Z" level=info msg="StopPodSandbox for \"58932c4b7aa6a5543cee3a7c44937a02226c27c679f070c83059d1da270053cd\"" May 17 00:30:58.782402 env[1216]: time="2025-05-17T00:30:58.782345443Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:dca5c16181edde2e860463615523ce457cd9dcfca85b7cfdcd6f3ea7de6f2ac8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:30:58.784146 env[1216]: time="2025-05-17T00:30:58.784096588Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0\" returns image reference \"sha256:45c8692ffc029387ee93ba83da8ad26da9749cf2ba6ed03981f8f9933ed5a5b0\"" May 17 00:30:58.789029 env[1216]: time="2025-05-17T00:30:58.788124823Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\"" May 17 00:30:58.793588 env[1216]: time="2025-05-17T00:30:58.793528155Z" level=info msg="CreateContainer within sandbox \"f85f0d148cc3b1c3ba7493b6d48448e53d0b4c90e5a8775b9c63abdb1729745c\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 17 00:30:58.834105 env[1216]: time="2025-05-17T00:30:58.834044377Z" level=info msg="CreateContainer within sandbox \"f85f0d148cc3b1c3ba7493b6d48448e53d0b4c90e5a8775b9c63abdb1729745c\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"800b9557754f2d14f44612f3a00abe7954fb0e0259bbf3843359d0f7bdef2469\"" May 17 00:30:58.838295 env[1216]: time="2025-05-17T00:30:58.835580801Z" level=info msg="StartContainer for \"800b9557754f2d14f44612f3a00abe7954fb0e0259bbf3843359d0f7bdef2469\"" May 17 00:30:58.844066 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2751690154.mount: Deactivated successfully. May 17 00:30:58.911900 systemd[1]: Started cri-containerd-800b9557754f2d14f44612f3a00abe7954fb0e0259bbf3843359d0f7bdef2469.scope. May 17 00:30:58.922612 env[1216]: time="2025-05-17T00:30:58.922534448Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:30:58.924614 env[1216]: time="2025-05-17T00:30:58.924547283Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:30:58.925430 kubelet[2047]: E0517 00:30:58.925072 2047 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:30:58.925430 kubelet[2047]: E0517 00:30:58.925141 2047 kuberuntime_image.go:42] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:30:58.932000 kubelet[2047]: E0517 00:30:58.929232 2047 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-95dhb,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-797f4cd9d4-bwnvn_calico-system(dc308654-0619-40ae-8a66-6809b61affb7): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:30:58.937729 kubelet[2047]: E0517 00:30:58.934993 2047 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-797f4cd9d4-bwnvn" podUID="dc308654-0619-40ae-8a66-6809b61affb7" May 17 00:30:58.945673 systemd[1]: run-containerd-runc-k8s.io-800b9557754f2d14f44612f3a00abe7954fb0e0259bbf3843359d0f7bdef2469-runc.BiAnNo.mount: Deactivated successfully. May 17 00:30:58.990000 audit[4842]: AVC avc: denied { perfmon } for pid=4842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:58.990000 audit[4842]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f8bb47475f8 items=0 ppid=4172 pid=4842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:58.990000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830306239353537373534663264313466343436313266336130306162 May 17 00:30:58.993000 audit[4842]: AVC avc: denied { bpf } for pid=4842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:58.993000 audit[4842]: AVC avc: denied { bpf } for pid=4842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:58.993000 audit[4842]: AVC avc: denied { bpf } for pid=4842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:58.993000 audit[4842]: AVC avc: denied { perfmon } for pid=4842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:58.993000 audit[4842]: AVC avc: denied { perfmon } for pid=4842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:58.993000 audit[4842]: AVC avc: denied { perfmon } for pid=4842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:58.993000 audit[4842]: AVC avc: denied { perfmon } for pid=4842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:58.993000 audit[4842]: AVC avc: denied { perfmon } for pid=4842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:58.993000 audit[4842]: AVC avc: denied { bpf } for pid=4842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:58.993000 audit[4842]: AVC avc: denied { bpf } for pid=4842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:58.993000 audit: BPF prog-id=216 op=LOAD May 17 00:30:58.993000 audit[4842]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000315ec8 items=0 ppid=4172 pid=4842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:58.993000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830306239353537373534663264313466343436313266336130306162 May 17 00:30:58.995000 audit[4842]: AVC avc: denied { bpf } for pid=4842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:58.995000 audit[4842]: AVC avc: denied { bpf } for pid=4842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:58.995000 audit[4842]: AVC avc: denied { perfmon } for pid=4842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:58.995000 audit[4842]: AVC avc: denied { perfmon } for pid=4842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:58.995000 audit[4842]: AVC avc: denied { perfmon } for pid=4842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:58.995000 audit[4842]: AVC avc: denied { perfmon } for pid=4842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:58.995000 audit[4842]: AVC avc: denied { perfmon } for pid=4842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:58.995000 audit[4842]: AVC avc: denied { bpf } for pid=4842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:58.995000 audit[4842]: AVC avc: denied { bpf } for pid=4842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:58.995000 audit: BPF prog-id=217 op=LOAD May 17 00:30:58.995000 audit[4842]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000315f18 items=0 ppid=4172 pid=4842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:58.995000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830306239353537373534663264313466343436313266336130306162 May 17 00:30:58.997000 audit: BPF prog-id=217 op=UNLOAD May 17 00:30:58.997000 audit: BPF prog-id=216 op=UNLOAD May 17 00:30:58.997000 audit[4842]: AVC avc: denied { bpf } for pid=4842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:58.997000 audit[4842]: AVC avc: denied { bpf } for pid=4842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:58.997000 audit[4842]: AVC avc: denied { bpf } for pid=4842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:58.997000 audit[4842]: AVC avc: denied { perfmon } for pid=4842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:58.997000 audit[4842]: AVC avc: denied { perfmon } for pid=4842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:58.997000 audit[4842]: AVC avc: denied { perfmon } for pid=4842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:58.997000 audit[4842]: AVC avc: denied { perfmon } for pid=4842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:58.997000 audit[4842]: AVC avc: denied { perfmon } for pid=4842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:58.997000 audit[4842]: AVC avc: denied { bpf } for pid=4842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:58.997000 audit[4842]: AVC avc: denied { bpf } for pid=4842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:30:58.997000 audit: BPF prog-id=218 op=LOAD May 17 00:30:58.997000 audit[4842]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000315fa8 items=0 ppid=4172 pid=4842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:30:58.997000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830306239353537373534663264313466343436313266336130306162 May 17 00:30:59.013089 env[1216]: 2025-05-17 00:30:58.890 [WARNING][4828] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="58932c4b7aa6a5543cee3a7c44937a02226c27c679f070c83059d1da270053cd" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-csi--node--driver--f5rgx-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"5b8b07bb-2baf-4857-913a-a85ceb0e478f", ResourceVersion:"988", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 30, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7", ContainerID:"f85f0d148cc3b1c3ba7493b6d48448e53d0b4c90e5a8775b9c63abdb1729745c", Pod:"csi-node-driver-f5rgx", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.71.199/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali6188387439f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:30:59.013089 env[1216]: 2025-05-17 00:30:58.890 [INFO][4828] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="58932c4b7aa6a5543cee3a7c44937a02226c27c679f070c83059d1da270053cd" May 17 00:30:59.013089 env[1216]: 2025-05-17 00:30:58.891 [INFO][4828] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="58932c4b7aa6a5543cee3a7c44937a02226c27c679f070c83059d1da270053cd" iface="eth0" netns="" May 17 00:30:59.013089 env[1216]: 2025-05-17 00:30:58.891 [INFO][4828] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="58932c4b7aa6a5543cee3a7c44937a02226c27c679f070c83059d1da270053cd" May 17 00:30:59.013089 env[1216]: 2025-05-17 00:30:58.891 [INFO][4828] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="58932c4b7aa6a5543cee3a7c44937a02226c27c679f070c83059d1da270053cd" May 17 00:30:59.013089 env[1216]: 2025-05-17 00:30:58.979 [INFO][4847] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="58932c4b7aa6a5543cee3a7c44937a02226c27c679f070c83059d1da270053cd" HandleID="k8s-pod-network.58932c4b7aa6a5543cee3a7c44937a02226c27c679f070c83059d1da270053cd" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-csi--node--driver--f5rgx-eth0" May 17 00:30:59.013089 env[1216]: 2025-05-17 00:30:58.980 [INFO][4847] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:30:59.013089 env[1216]: 2025-05-17 00:30:58.980 [INFO][4847] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:30:59.013089 env[1216]: 2025-05-17 00:30:59.001 [WARNING][4847] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="58932c4b7aa6a5543cee3a7c44937a02226c27c679f070c83059d1da270053cd" HandleID="k8s-pod-network.58932c4b7aa6a5543cee3a7c44937a02226c27c679f070c83059d1da270053cd" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-csi--node--driver--f5rgx-eth0" May 17 00:30:59.013089 env[1216]: 2025-05-17 00:30:59.001 [INFO][4847] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="58932c4b7aa6a5543cee3a7c44937a02226c27c679f070c83059d1da270053cd" HandleID="k8s-pod-network.58932c4b7aa6a5543cee3a7c44937a02226c27c679f070c83059d1da270053cd" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-csi--node--driver--f5rgx-eth0" May 17 00:30:59.013089 env[1216]: 2025-05-17 00:30:59.003 [INFO][4847] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:30:59.013089 env[1216]: 2025-05-17 00:30:59.010 [INFO][4828] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="58932c4b7aa6a5543cee3a7c44937a02226c27c679f070c83059d1da270053cd" May 17 00:30:59.014498 env[1216]: time="2025-05-17T00:30:59.014443812Z" level=info msg="TearDown network for sandbox \"58932c4b7aa6a5543cee3a7c44937a02226c27c679f070c83059d1da270053cd\" successfully" May 17 00:30:59.014658 env[1216]: time="2025-05-17T00:30:59.014619471Z" level=info msg="StopPodSandbox for \"58932c4b7aa6a5543cee3a7c44937a02226c27c679f070c83059d1da270053cd\" returns successfully" May 17 00:30:59.015598 env[1216]: time="2025-05-17T00:30:59.015540487Z" level=info msg="RemovePodSandbox for \"58932c4b7aa6a5543cee3a7c44937a02226c27c679f070c83059d1da270053cd\"" May 17 00:30:59.015756 env[1216]: time="2025-05-17T00:30:59.015597569Z" level=info msg="Forcibly stopping sandbox \"58932c4b7aa6a5543cee3a7c44937a02226c27c679f070c83059d1da270053cd\"" May 17 00:30:59.034577 env[1216]: time="2025-05-17T00:30:59.034507678Z" level=info msg="StartContainer for \"800b9557754f2d14f44612f3a00abe7954fb0e0259bbf3843359d0f7bdef2469\" returns successfully" May 17 00:30:59.168242 kubelet[2047]: I0517 00:30:59.168100 2047 csi_plugin.go:106] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 17 00:30:59.168242 kubelet[2047]: I0517 00:30:59.168162 2047 csi_plugin.go:119] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 17 00:30:59.190098 env[1216]: 2025-05-17 00:30:59.102 [WARNING][4883] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="58932c4b7aa6a5543cee3a7c44937a02226c27c679f070c83059d1da270053cd" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-csi--node--driver--f5rgx-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"5b8b07bb-2baf-4857-913a-a85ceb0e478f", ResourceVersion:"988", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 30, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250516-2100-98e6c7b6c07b082ea6c7", ContainerID:"f85f0d148cc3b1c3ba7493b6d48448e53d0b4c90e5a8775b9c63abdb1729745c", Pod:"csi-node-driver-f5rgx", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.71.199/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali6188387439f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:30:59.190098 env[1216]: 2025-05-17 00:30:59.103 [INFO][4883] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="58932c4b7aa6a5543cee3a7c44937a02226c27c679f070c83059d1da270053cd" May 17 00:30:59.190098 env[1216]: 2025-05-17 00:30:59.103 [INFO][4883] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="58932c4b7aa6a5543cee3a7c44937a02226c27c679f070c83059d1da270053cd" iface="eth0" netns="" May 17 00:30:59.190098 env[1216]: 2025-05-17 00:30:59.103 [INFO][4883] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="58932c4b7aa6a5543cee3a7c44937a02226c27c679f070c83059d1da270053cd" May 17 00:30:59.190098 env[1216]: 2025-05-17 00:30:59.103 [INFO][4883] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="58932c4b7aa6a5543cee3a7c44937a02226c27c679f070c83059d1da270053cd" May 17 00:30:59.190098 env[1216]: 2025-05-17 00:30:59.134 [INFO][4895] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="58932c4b7aa6a5543cee3a7c44937a02226c27c679f070c83059d1da270053cd" HandleID="k8s-pod-network.58932c4b7aa6a5543cee3a7c44937a02226c27c679f070c83059d1da270053cd" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-csi--node--driver--f5rgx-eth0" May 17 00:30:59.190098 env[1216]: 2025-05-17 00:30:59.134 [INFO][4895] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:30:59.190098 env[1216]: 2025-05-17 00:30:59.134 [INFO][4895] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:30:59.190098 env[1216]: 2025-05-17 00:30:59.180 [WARNING][4895] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="58932c4b7aa6a5543cee3a7c44937a02226c27c679f070c83059d1da270053cd" HandleID="k8s-pod-network.58932c4b7aa6a5543cee3a7c44937a02226c27c679f070c83059d1da270053cd" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-csi--node--driver--f5rgx-eth0" May 17 00:30:59.190098 env[1216]: 2025-05-17 00:30:59.181 [INFO][4895] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="58932c4b7aa6a5543cee3a7c44937a02226c27c679f070c83059d1da270053cd" HandleID="k8s-pod-network.58932c4b7aa6a5543cee3a7c44937a02226c27c679f070c83059d1da270053cd" Workload="ci--3510--3--7--nightly--20250516--2100--98e6c7b6c07b082ea6c7-k8s-csi--node--driver--f5rgx-eth0" May 17 00:30:59.190098 env[1216]: 2025-05-17 00:30:59.184 [INFO][4895] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:30:59.190098 env[1216]: 2025-05-17 00:30:59.187 [INFO][4883] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="58932c4b7aa6a5543cee3a7c44937a02226c27c679f070c83059d1da270053cd" May 17 00:30:59.191221 env[1216]: time="2025-05-17T00:30:59.190149750Z" level=info msg="TearDown network for sandbox \"58932c4b7aa6a5543cee3a7c44937a02226c27c679f070c83059d1da270053cd\" successfully" May 17 00:30:59.210462 env[1216]: time="2025-05-17T00:30:59.210267815Z" level=info msg="RemovePodSandbox \"58932c4b7aa6a5543cee3a7c44937a02226c27c679f070c83059d1da270053cd\" returns successfully" May 17 00:31:07.049166 systemd[1]: Started sshd@7-10.128.0.54:22-139.178.89.65:44700.service. May 17 00:31:07.071617 kernel: kauditd_printk_skb: 94 callbacks suppressed May 17 00:31:07.071887 kernel: audit: type=1130 audit(1747441867.050:1378): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.128.0.54:22-139.178.89.65:44700 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:31:07.050000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.128.0.54:22-139.178.89.65:44700 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:31:07.089586 env[1216]: time="2025-05-17T00:31:07.089226670Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\"" May 17 00:31:07.104716 kubelet[2047]: I0517 00:31:07.104587 2047 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-f5rgx" podStartSLOduration=36.813375947 podStartE2EDuration="48.104562211s" podCreationTimestamp="2025-05-17 00:30:19 +0000 UTC" firstStartedPulling="2025-05-17 00:30:47.494940744 +0000 UTC m=+52.784047615" lastFinishedPulling="2025-05-17 00:30:58.786127016 +0000 UTC m=+64.075233879" observedRunningTime="2025-05-17 00:30:59.704138535 +0000 UTC m=+64.993245426" watchObservedRunningTime="2025-05-17 00:31:07.104562211 +0000 UTC m=+72.393669101" May 17 00:31:07.220054 env[1216]: time="2025-05-17T00:31:07.219890475Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:31:07.222161 env[1216]: time="2025-05-17T00:31:07.222078649Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:31:07.223123 kubelet[2047]: E0517 00:31:07.222528 2047 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:31:07.223123 kubelet[2047]: E0517 00:31:07.222752 2047 kuberuntime_image.go:42] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:31:07.223123 kubelet[2047]: E0517 00:31:07.223010 2047 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-xqc8v,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-78d55f7ddc-sx8fp_calico-system(a859c06b-ce28-4cc1-830c-0d905598097c): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:31:07.225214 kubelet[2047]: E0517 00:31:07.224238 2047 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-sx8fp" podUID="a859c06b-ce28-4cc1-830c-0d905598097c" May 17 00:31:07.351000 audit[4916]: USER_ACCT pid=4916 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:07.353184 sshd[4916]: Accepted publickey for core from 139.178.89.65 port 44700 ssh2: RSA SHA256:jyE3lnafiBGDGJK6dHnApyF/jgfCnjVgkPORJQqM9Ps May 17 00:31:07.384907 kernel: audit: type=1101 audit(1747441867.351:1379): pid=4916 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:07.385277 sshd[4916]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:31:07.383000 audit[4916]: CRED_ACQ pid=4916 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:07.412709 kernel: audit: type=1103 audit(1747441867.383:1380): pid=4916 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:07.383000 audit[4916]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc6ba22370 a2=3 a3=0 items=0 ppid=1 pid=4916 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:31:07.432216 systemd-logind[1224]: New session 8 of user core. May 17 00:31:07.433349 systemd[1]: Started session-8.scope. May 17 00:31:07.461716 kernel: audit: type=1006 audit(1747441867.383:1381): pid=4916 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=8 res=1 May 17 00:31:07.461874 kernel: audit: type=1300 audit(1747441867.383:1381): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc6ba22370 a2=3 a3=0 items=0 ppid=1 pid=4916 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:31:07.383000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:31:07.475163 kernel: audit: type=1327 audit(1747441867.383:1381): proctitle=737368643A20636F7265205B707269765D May 17 00:31:07.459000 audit[4916]: USER_START pid=4916 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:07.473000 audit[4918]: CRED_ACQ pid=4918 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:07.533139 kernel: audit: type=1105 audit(1747441867.459:1382): pid=4916 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:07.533298 kernel: audit: type=1103 audit(1747441867.473:1383): pid=4918 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:07.765313 sshd[4916]: pam_unix(sshd:session): session closed for user core May 17 00:31:07.768000 audit[4916]: USER_END pid=4916 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:07.772341 systemd[1]: sshd@7-10.128.0.54:22-139.178.89.65:44700.service: Deactivated successfully. May 17 00:31:07.774467 systemd[1]: session-8.scope: Deactivated successfully. May 17 00:31:07.779615 systemd-logind[1224]: Session 8 logged out. Waiting for processes to exit. May 17 00:31:07.782297 systemd-logind[1224]: Removed session 8. May 17 00:31:07.768000 audit[4916]: CRED_DISP pid=4916 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:07.828156 kernel: audit: type=1106 audit(1747441867.768:1384): pid=4916 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:07.828372 kernel: audit: type=1104 audit(1747441867.768:1385): pid=4916 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:07.772000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.128.0.54:22-139.178.89.65:44700 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:31:09.551722 systemd[1]: run-containerd-runc-k8s.io-6f4ec2c86f5d221f35ae0a09c858e646760ce80f1738999d3cd1f6354f9583bc-runc.Itbk2o.mount: Deactivated successfully. May 17 00:31:12.063650 kubelet[2047]: E0517 00:31:12.063586 2047 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-797f4cd9d4-bwnvn" podUID="dc308654-0619-40ae-8a66-6809b61affb7" May 17 00:31:12.819441 systemd[1]: Started sshd@8-10.128.0.54:22-139.178.89.65:44712.service. May 17 00:31:12.819000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.128.0.54:22-139.178.89.65:44712 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:31:12.825382 kernel: kauditd_printk_skb: 1 callbacks suppressed May 17 00:31:12.825561 kernel: audit: type=1130 audit(1747441872.819:1387): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.128.0.54:22-139.178.89.65:44712 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:31:13.125000 audit[4970]: USER_ACCT pid=4970 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:13.127441 sshd[4970]: Accepted publickey for core from 139.178.89.65 port 44712 ssh2: RSA SHA256:jyE3lnafiBGDGJK6dHnApyF/jgfCnjVgkPORJQqM9Ps May 17 00:31:13.156749 kernel: audit: type=1101 audit(1747441873.125:1388): pid=4970 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:13.156000 audit[4970]: CRED_ACQ pid=4970 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:13.158142 sshd[4970]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:31:13.178953 systemd[1]: Started session-9.scope. May 17 00:31:13.180108 systemd-logind[1224]: New session 9 of user core. May 17 00:31:13.202902 kernel: audit: type=1103 audit(1747441873.156:1389): pid=4970 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:13.203050 kernel: audit: type=1006 audit(1747441873.156:1390): pid=4970 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 May 17 00:31:13.203130 kernel: audit: type=1300 audit(1747441873.156:1390): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffbcd555e0 a2=3 a3=0 items=0 ppid=1 pid=4970 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:31:13.156000 audit[4970]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffbcd555e0 a2=3 a3=0 items=0 ppid=1 pid=4970 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:31:13.233000 kernel: audit: type=1327 audit(1747441873.156:1390): proctitle=737368643A20636F7265205B707269765D May 17 00:31:13.156000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:31:13.198000 audit[4970]: USER_START pid=4970 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:13.273645 kernel: audit: type=1105 audit(1747441873.198:1391): pid=4970 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:13.200000 audit[4972]: CRED_ACQ pid=4972 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:13.298732 kernel: audit: type=1103 audit(1747441873.200:1392): pid=4972 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:13.465827 sshd[4970]: pam_unix(sshd:session): session closed for user core May 17 00:31:13.467000 audit[4970]: USER_END pid=4970 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:13.468000 audit[4970]: CRED_DISP pid=4970 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:13.507497 systemd-logind[1224]: Session 9 logged out. Waiting for processes to exit. May 17 00:31:13.510951 systemd[1]: sshd@8-10.128.0.54:22-139.178.89.65:44712.service: Deactivated successfully. May 17 00:31:13.513238 systemd[1]: session-9.scope: Deactivated successfully. May 17 00:31:13.516510 systemd-logind[1224]: Removed session 9. May 17 00:31:13.525957 kernel: audit: type=1106 audit(1747441873.467:1393): pid=4970 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:13.526201 kernel: audit: type=1104 audit(1747441873.468:1394): pid=4970 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:13.510000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.128.0.54:22-139.178.89.65:44712 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:31:18.515086 systemd[1]: Started sshd@9-10.128.0.54:22-139.178.89.65:39982.service. May 17 00:31:18.546295 kernel: kauditd_printk_skb: 1 callbacks suppressed May 17 00:31:18.546437 kernel: audit: type=1130 audit(1747441878.514:1396): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.128.0.54:22-139.178.89.65:39982 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:31:18.514000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.128.0.54:22-139.178.89.65:39982 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:31:18.816000 audit[4984]: USER_ACCT pid=4984 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:18.821843 sshd[4984]: Accepted publickey for core from 139.178.89.65 port 39982 ssh2: RSA SHA256:jyE3lnafiBGDGJK6dHnApyF/jgfCnjVgkPORJQqM9Ps May 17 00:31:18.849323 kernel: audit: type=1101 audit(1747441878.816:1397): pid=4984 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:18.848000 audit[4984]: CRED_ACQ pid=4984 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:18.851175 sshd[4984]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:31:18.863015 systemd[1]: Started session-10.scope. May 17 00:31:18.865908 systemd-logind[1224]: New session 10 of user core. May 17 00:31:18.875720 kernel: audit: type=1103 audit(1747441878.848:1398): pid=4984 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:18.895798 kernel: audit: type=1006 audit(1747441878.848:1399): pid=4984 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 May 17 00:31:18.895970 kernel: audit: type=1300 audit(1747441878.848:1399): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcc65bfa80 a2=3 a3=0 items=0 ppid=1 pid=4984 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:31:18.848000 audit[4984]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcc65bfa80 a2=3 a3=0 items=0 ppid=1 pid=4984 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:31:18.848000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:31:18.924741 kernel: audit: type=1327 audit(1747441878.848:1399): proctitle=737368643A20636F7265205B707269765D May 17 00:31:18.876000 audit[4984]: USER_START pid=4984 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:18.966626 kernel: audit: type=1105 audit(1747441878.876:1400): pid=4984 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:18.966881 kernel: audit: type=1103 audit(1747441878.888:1401): pid=4986 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:18.888000 audit[4986]: CRED_ACQ pid=4986 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:19.191218 sshd[4984]: pam_unix(sshd:session): session closed for user core May 17 00:31:19.191000 audit[4984]: USER_END pid=4984 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:19.199018 systemd[1]: sshd@9-10.128.0.54:22-139.178.89.65:39982.service: Deactivated successfully. May 17 00:31:19.200662 systemd[1]: session-10.scope: Deactivated successfully. May 17 00:31:19.204131 systemd-logind[1224]: Session 10 logged out. Waiting for processes to exit. May 17 00:31:19.207177 systemd-logind[1224]: Removed session 10. May 17 00:31:19.191000 audit[4984]: CRED_DISP pid=4984 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:19.251041 kernel: audit: type=1106 audit(1747441879.191:1402): pid=4984 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:19.251224 kernel: audit: type=1104 audit(1747441879.191:1403): pid=4984 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:19.253540 systemd[1]: Started sshd@10-10.128.0.54:22-139.178.89.65:39992.service. May 17 00:31:19.197000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.128.0.54:22-139.178.89.65:39982 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:31:19.253000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.128.0.54:22-139.178.89.65:39992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:31:19.540000 audit[4996]: USER_ACCT pid=4996 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:19.544818 sshd[4996]: Accepted publickey for core from 139.178.89.65 port 39992 ssh2: RSA SHA256:jyE3lnafiBGDGJK6dHnApyF/jgfCnjVgkPORJQqM9Ps May 17 00:31:19.543000 audit[4996]: CRED_ACQ pid=4996 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:19.543000 audit[4996]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeaceaa340 a2=3 a3=0 items=0 ppid=1 pid=4996 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:31:19.543000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:31:19.546211 sshd[4996]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:31:19.554349 systemd-logind[1224]: New session 11 of user core. May 17 00:31:19.555515 systemd[1]: Started session-11.scope. May 17 00:31:19.564000 audit[4996]: USER_START pid=4996 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:19.568000 audit[4998]: CRED_ACQ pid=4998 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:19.620958 kubelet[2047]: I0517 00:31:19.620145 2047 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:31:19.685000 audit[5000]: NETFILTER_CFG table=filter:130 family=2 entries=12 op=nft_register_rule pid=5000 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:31:19.685000 audit[5000]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7fff67b478a0 a2=0 a3=7fff67b4788c items=0 ppid=2176 pid=5000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:31:19.685000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:31:19.692000 audit[5000]: NETFILTER_CFG table=nat:131 family=2 entries=34 op=nft_register_chain pid=5000 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:31:19.692000 audit[5000]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7fff67b478a0 a2=0 a3=7fff67b4788c items=0 ppid=2176 pid=5000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:31:19.692000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:31:19.991780 sshd[4996]: pam_unix(sshd:session): session closed for user core May 17 00:31:19.992000 audit[4996]: USER_END pid=4996 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:19.993000 audit[4996]: CRED_DISP pid=4996 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:19.998405 systemd-logind[1224]: Session 11 logged out. Waiting for processes to exit. May 17 00:31:19.999000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.128.0.54:22-139.178.89.65:39992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:31:20.000356 systemd[1]: sshd@10-10.128.0.54:22-139.178.89.65:39992.service: Deactivated successfully. May 17 00:31:20.002270 systemd[1]: session-11.scope: Deactivated successfully. May 17 00:31:20.005681 systemd-logind[1224]: Removed session 11. May 17 00:31:20.043999 systemd[1]: Started sshd@11-10.128.0.54:22-139.178.89.65:40004.service. May 17 00:31:20.045000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.128.0.54:22-139.178.89.65:40004 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:31:20.368000 audit[5008]: USER_ACCT pid=5008 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:20.372414 sshd[5008]: Accepted publickey for core from 139.178.89.65 port 40004 ssh2: RSA SHA256:jyE3lnafiBGDGJK6dHnApyF/jgfCnjVgkPORJQqM9Ps May 17 00:31:20.371000 audit[5008]: CRED_ACQ pid=5008 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:20.372000 audit[5008]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffece0d8260 a2=3 a3=0 items=0 ppid=1 pid=5008 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:31:20.372000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:31:20.375008 sshd[5008]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:31:20.384160 systemd-logind[1224]: New session 12 of user core. May 17 00:31:20.389195 systemd[1]: Started session-12.scope. May 17 00:31:20.400000 audit[5008]: USER_START pid=5008 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:20.404000 audit[5010]: CRED_ACQ pid=5010 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:20.777847 sshd[5008]: pam_unix(sshd:session): session closed for user core May 17 00:31:20.780000 audit[5008]: USER_END pid=5008 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:20.781000 audit[5008]: CRED_DISP pid=5008 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:20.786324 systemd-logind[1224]: Session 12 logged out. Waiting for processes to exit. May 17 00:31:20.789000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.128.0.54:22-139.178.89.65:40004 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:31:20.789867 systemd[1]: sshd@11-10.128.0.54:22-139.178.89.65:40004.service: Deactivated successfully. May 17 00:31:20.791442 systemd[1]: session-12.scope: Deactivated successfully. May 17 00:31:20.795835 systemd-logind[1224]: Removed session 12. May 17 00:31:23.062447 kubelet[2047]: E0517 00:31:23.062283 2047 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-sx8fp" podUID="a859c06b-ce28-4cc1-830c-0d905598097c" May 17 00:31:25.824000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.128.0.54:22-139.178.89.65:40016 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:31:25.825094 systemd[1]: Started sshd@12-10.128.0.54:22-139.178.89.65:40016.service. May 17 00:31:25.831116 kernel: kauditd_printk_skb: 29 callbacks suppressed May 17 00:31:25.831237 kernel: audit: type=1130 audit(1747441885.824:1425): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.128.0.54:22-139.178.89.65:40016 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:31:26.133000 audit[5048]: USER_ACCT pid=5048 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:26.136500 sshd[5048]: Accepted publickey for core from 139.178.89.65 port 40016 ssh2: RSA SHA256:jyE3lnafiBGDGJK6dHnApyF/jgfCnjVgkPORJQqM9Ps May 17 00:31:26.164723 kernel: audit: type=1101 audit(1747441886.133:1426): pid=5048 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:26.165883 sshd[5048]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:31:26.164000 audit[5048]: CRED_ACQ pid=5048 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:26.186899 systemd-logind[1224]: New session 13 of user core. May 17 00:31:26.197792 systemd[1]: Started session-13.scope. May 17 00:31:26.213906 kernel: audit: type=1103 audit(1747441886.164:1427): pid=5048 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:26.214141 kernel: audit: type=1006 audit(1747441886.164:1428): pid=5048 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 May 17 00:31:26.214206 kernel: audit: type=1300 audit(1747441886.164:1428): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc6d5cd6f0 a2=3 a3=0 items=0 ppid=1 pid=5048 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:31:26.164000 audit[5048]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc6d5cd6f0 a2=3 a3=0 items=0 ppid=1 pid=5048 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:31:26.164000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:31:26.250922 kernel: audit: type=1327 audit(1747441886.164:1428): proctitle=737368643A20636F7265205B707269765D May 17 00:31:26.251183 kernel: audit: type=1105 audit(1747441886.205:1429): pid=5048 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:26.205000 audit[5048]: USER_START pid=5048 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:26.211000 audit[5050]: CRED_ACQ pid=5050 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:26.309164 kernel: audit: type=1103 audit(1747441886.211:1430): pid=5050 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:26.485434 sshd[5048]: pam_unix(sshd:session): session closed for user core May 17 00:31:26.488000 audit[5048]: USER_END pid=5048 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:26.492957 systemd[1]: sshd@12-10.128.0.54:22-139.178.89.65:40016.service: Deactivated successfully. May 17 00:31:26.494566 systemd[1]: session-13.scope: Deactivated successfully. May 17 00:31:26.499845 systemd-logind[1224]: Session 13 logged out. Waiting for processes to exit. May 17 00:31:26.502334 systemd-logind[1224]: Removed session 13. May 17 00:31:26.488000 audit[5048]: CRED_DISP pid=5048 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:26.546904 kernel: audit: type=1106 audit(1747441886.488:1431): pid=5048 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:26.547292 kernel: audit: type=1104 audit(1747441886.488:1432): pid=5048 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:26.488000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.128.0.54:22-139.178.89.65:40016 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:31:27.067080 env[1216]: time="2025-05-17T00:31:27.067024536Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\"" May 17 00:31:27.211904 env[1216]: time="2025-05-17T00:31:27.211792508Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:31:27.214320 env[1216]: time="2025-05-17T00:31:27.214235313Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:31:27.214964 kubelet[2047]: E0517 00:31:27.214886 2047 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:31:27.215518 kubelet[2047]: E0517 00:31:27.214976 2047 kuberuntime_image.go:42] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:31:27.215518 kubelet[2047]: E0517 00:31:27.215172 2047 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.0,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:e1697e16bd03489ca69cfcf2cef8e19e,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-95dhb,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-797f4cd9d4-bwnvn_calico-system(dc308654-0619-40ae-8a66-6809b61affb7): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:31:27.218648 env[1216]: time="2025-05-17T00:31:27.218591487Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\"" May 17 00:31:27.348907 env[1216]: time="2025-05-17T00:31:27.348826811Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:31:27.350717 env[1216]: time="2025-05-17T00:31:27.350617293Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:31:27.351130 kubelet[2047]: E0517 00:31:27.351062 2047 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:31:27.351346 kubelet[2047]: E0517 00:31:27.351295 2047 kuberuntime_image.go:42] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:31:27.351599 kubelet[2047]: E0517 00:31:27.351531 2047 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-95dhb,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-797f4cd9d4-bwnvn_calico-system(dc308654-0619-40ae-8a66-6809b61affb7): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:31:27.353432 kubelet[2047]: E0517 00:31:27.353364 2047 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-797f4cd9d4-bwnvn" podUID="dc308654-0619-40ae-8a66-6809b61affb7" May 17 00:31:31.537342 systemd[1]: Started sshd@13-10.128.0.54:22-139.178.89.65:48662.service. May 17 00:31:31.537000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.128.0.54:22-139.178.89.65:48662 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:31:31.545000 kernel: kauditd_printk_skb: 1 callbacks suppressed May 17 00:31:31.545164 kernel: audit: type=1130 audit(1747441891.537:1434): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.128.0.54:22-139.178.89.65:48662 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:31:31.844000 audit[5062]: USER_ACCT pid=5062 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:31.848770 sshd[5062]: Accepted publickey for core from 139.178.89.65 port 48662 ssh2: RSA SHA256:jyE3lnafiBGDGJK6dHnApyF/jgfCnjVgkPORJQqM9Ps May 17 00:31:31.877757 kernel: audit: type=1101 audit(1747441891.844:1435): pid=5062 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:31.878983 sshd[5062]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:31:31.876000 audit[5062]: CRED_ACQ pid=5062 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:31.910519 kernel: audit: type=1103 audit(1747441891.876:1436): pid=5062 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:31.920817 systemd[1]: Started session-14.scope. May 17 00:31:31.924453 systemd-logind[1224]: New session 14 of user core. May 17 00:31:31.929577 kernel: audit: type=1006 audit(1747441891.876:1437): pid=5062 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 May 17 00:31:31.929773 kernel: audit: type=1300 audit(1747441891.876:1437): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe9e531ee0 a2=3 a3=0 items=0 ppid=1 pid=5062 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:31:31.876000 audit[5062]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe9e531ee0 a2=3 a3=0 items=0 ppid=1 pid=5062 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:31:31.958118 kernel: audit: type=1327 audit(1747441891.876:1437): proctitle=737368643A20636F7265205B707269765D May 17 00:31:31.876000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:31:31.967747 kernel: audit: type=1105 audit(1747441891.943:1438): pid=5062 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:31.943000 audit[5062]: USER_START pid=5062 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:31.953000 audit[5064]: CRED_ACQ pid=5064 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:32.000102 kernel: audit: type=1103 audit(1747441891.953:1439): pid=5064 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:32.248407 sshd[5062]: pam_unix(sshd:session): session closed for user core May 17 00:31:32.249000 audit[5062]: USER_END pid=5062 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:32.285908 kernel: audit: type=1106 audit(1747441892.249:1440): pid=5062 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:32.249000 audit[5062]: CRED_DISP pid=5062 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:32.288760 systemd[1]: sshd@13-10.128.0.54:22-139.178.89.65:48662.service: Deactivated successfully. May 17 00:31:32.290647 systemd[1]: session-14.scope: Deactivated successfully. May 17 00:31:32.295569 systemd-logind[1224]: Session 14 logged out. Waiting for processes to exit. May 17 00:31:32.298212 systemd-logind[1224]: Removed session 14. May 17 00:31:32.287000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.128.0.54:22-139.178.89.65:48662 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:31:32.311795 kernel: audit: type=1104 audit(1747441892.249:1441): pid=5062 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:35.064889 env[1216]: time="2025-05-17T00:31:35.064815376Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\"" May 17 00:31:35.215877 env[1216]: time="2025-05-17T00:31:35.215776056Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:31:35.217836 env[1216]: time="2025-05-17T00:31:35.217748739Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:31:35.218187 kubelet[2047]: E0517 00:31:35.218116 2047 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:31:35.218829 kubelet[2047]: E0517 00:31:35.218205 2047 kuberuntime_image.go:42] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:31:35.218829 kubelet[2047]: E0517 00:31:35.218443 2047 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-xqc8v,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-78d55f7ddc-sx8fp_calico-system(a859c06b-ce28-4cc1-830c-0d905598097c): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:31:35.220358 kubelet[2047]: E0517 00:31:35.220289 2047 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-sx8fp" podUID="a859c06b-ce28-4cc1-830c-0d905598097c" May 17 00:31:37.295000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.128.0.54:22-139.178.89.65:35944 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:31:37.295871 systemd[1]: Started sshd@14-10.128.0.54:22-139.178.89.65:35944.service. May 17 00:31:37.301586 kernel: kauditd_printk_skb: 1 callbacks suppressed May 17 00:31:37.301745 kernel: audit: type=1130 audit(1747441897.295:1443): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.128.0.54:22-139.178.89.65:35944 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:31:37.601000 audit[5075]: USER_ACCT pid=5075 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:37.602976 sshd[5075]: Accepted publickey for core from 139.178.89.65 port 35944 ssh2: RSA SHA256:jyE3lnafiBGDGJK6dHnApyF/jgfCnjVgkPORJQqM9Ps May 17 00:31:37.633337 kernel: audit: type=1101 audit(1747441897.601:1444): pid=5075 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:37.633000 audit[5075]: CRED_ACQ pid=5075 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:37.635467 sshd[5075]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:31:37.648089 systemd[1]: Started session-15.scope. May 17 00:31:37.651709 systemd-logind[1224]: New session 15 of user core. May 17 00:31:37.660714 kernel: audit: type=1103 audit(1747441897.633:1445): pid=5075 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:37.633000 audit[5075]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffa761b0b0 a2=3 a3=0 items=0 ppid=1 pid=5075 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:31:37.706623 kernel: audit: type=1006 audit(1747441897.633:1446): pid=5075 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 May 17 00:31:37.707150 kernel: audit: type=1300 audit(1747441897.633:1446): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffa761b0b0 a2=3 a3=0 items=0 ppid=1 pid=5075 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:31:37.707259 kernel: audit: type=1327 audit(1747441897.633:1446): proctitle=737368643A20636F7265205B707269765D May 17 00:31:37.633000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:31:37.660000 audit[5075]: USER_START pid=5075 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:37.748942 kernel: audit: type=1105 audit(1747441897.660:1447): pid=5075 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:37.749135 kernel: audit: type=1103 audit(1747441897.666:1448): pid=5077 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:37.666000 audit[5077]: CRED_ACQ pid=5077 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:37.960516 sshd[5075]: pam_unix(sshd:session): session closed for user core May 17 00:31:37.963000 audit[5075]: USER_END pid=5075 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:37.996733 kernel: audit: type=1106 audit(1747441897.963:1449): pid=5075 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:37.963000 audit[5075]: CRED_DISP pid=5075 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:37.999077 systemd[1]: sshd@14-10.128.0.54:22-139.178.89.65:35944.service: Deactivated successfully. May 17 00:31:38.000658 systemd[1]: session-15.scope: Deactivated successfully. May 17 00:31:38.004128 systemd-logind[1224]: Session 15 logged out. Waiting for processes to exit. May 17 00:31:38.006601 systemd-logind[1224]: Removed session 15. May 17 00:31:37.996000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.128.0.54:22-139.178.89.65:35944 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:31:38.022749 kernel: audit: type=1104 audit(1747441897.963:1450): pid=5075 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:41.064321 kubelet[2047]: E0517 00:31:41.064250 2047 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-797f4cd9d4-bwnvn" podUID="dc308654-0619-40ae-8a66-6809b61affb7" May 17 00:31:42.171360 systemd[1]: run-containerd-runc-k8s.io-46f52d2f6604c18ed47c0d0e26b915d8dfc1b90262f4cfa049987241acf5c975-runc.XnAydR.mount: Deactivated successfully. May 17 00:31:43.009908 systemd[1]: Started sshd@15-10.128.0.54:22-139.178.89.65:35946.service. May 17 00:31:43.010000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.128.0.54:22-139.178.89.65:35946 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:31:43.016349 kernel: kauditd_printk_skb: 1 callbacks suppressed May 17 00:31:43.016498 kernel: audit: type=1130 audit(1747441903.010:1452): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.128.0.54:22-139.178.89.65:35946 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:31:43.315000 audit[5128]: USER_ACCT pid=5128 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:43.318717 sshd[5128]: Accepted publickey for core from 139.178.89.65 port 35946 ssh2: RSA SHA256:jyE3lnafiBGDGJK6dHnApyF/jgfCnjVgkPORJQqM9Ps May 17 00:31:43.346732 kernel: audit: type=1101 audit(1747441903.315:1453): pid=5128 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:43.346000 audit[5128]: CRED_ACQ pid=5128 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:43.347873 sshd[5128]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:31:43.368439 systemd[1]: Started session-16.scope. May 17 00:31:43.370718 systemd-logind[1224]: New session 16 of user core. May 17 00:31:43.373822 kernel: audit: type=1103 audit(1747441903.346:1454): pid=5128 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:43.373954 kernel: audit: type=1006 audit(1747441903.346:1455): pid=5128 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 May 17 00:31:43.346000 audit[5128]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc96431360 a2=3 a3=0 items=0 ppid=1 pid=5128 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:31:43.346000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:31:43.430914 kernel: audit: type=1300 audit(1747441903.346:1455): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc96431360 a2=3 a3=0 items=0 ppid=1 pid=5128 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:31:43.431076 kernel: audit: type=1327 audit(1747441903.346:1455): proctitle=737368643A20636F7265205B707269765D May 17 00:31:43.431172 kernel: audit: type=1105 audit(1747441903.390:1456): pid=5128 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:43.390000 audit[5128]: USER_START pid=5128 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:43.392000 audit[5130]: CRED_ACQ pid=5130 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:43.488844 kernel: audit: type=1103 audit(1747441903.392:1457): pid=5130 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:43.666070 sshd[5128]: pam_unix(sshd:session): session closed for user core May 17 00:31:43.668000 audit[5128]: USER_END pid=5128 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:43.672939 systemd[1]: sshd@15-10.128.0.54:22-139.178.89.65:35946.service: Deactivated successfully. May 17 00:31:43.674544 systemd[1]: session-16.scope: Deactivated successfully. May 17 00:31:43.677378 systemd-logind[1224]: Session 16 logged out. Waiting for processes to exit. May 17 00:31:43.679736 systemd-logind[1224]: Removed session 16. May 17 00:31:43.705775 kernel: audit: type=1106 audit(1747441903.668:1458): pid=5128 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:43.706139 kernel: audit: type=1104 audit(1747441903.668:1459): pid=5128 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:43.668000 audit[5128]: CRED_DISP pid=5128 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:43.724112 systemd[1]: Started sshd@16-10.128.0.54:22-139.178.89.65:35960.service. May 17 00:31:43.668000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.128.0.54:22-139.178.89.65:35946 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:31:43.723000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.128.0.54:22-139.178.89.65:35960 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:31:44.017000 audit[5140]: USER_ACCT pid=5140 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:44.018571 sshd[5140]: Accepted publickey for core from 139.178.89.65 port 35960 ssh2: RSA SHA256:jyE3lnafiBGDGJK6dHnApyF/jgfCnjVgkPORJQqM9Ps May 17 00:31:44.019000 audit[5140]: CRED_ACQ pid=5140 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:44.020000 audit[5140]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffddbaab0d0 a2=3 a3=0 items=0 ppid=1 pid=5140 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:31:44.020000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:31:44.021475 sshd[5140]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:31:44.029076 systemd-logind[1224]: New session 17 of user core. May 17 00:31:44.029989 systemd[1]: Started session-17.scope. May 17 00:31:44.039000 audit[5140]: USER_START pid=5140 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:44.043000 audit[5142]: CRED_ACQ pid=5142 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:44.375800 sshd[5140]: pam_unix(sshd:session): session closed for user core May 17 00:31:44.377000 audit[5140]: USER_END pid=5140 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:44.377000 audit[5140]: CRED_DISP pid=5140 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:44.381135 systemd[1]: sshd@16-10.128.0.54:22-139.178.89.65:35960.service: Deactivated successfully. May 17 00:31:44.380000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.128.0.54:22-139.178.89.65:35960 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:31:44.382681 systemd[1]: session-17.scope: Deactivated successfully. May 17 00:31:44.383830 systemd-logind[1224]: Session 17 logged out. Waiting for processes to exit. May 17 00:31:44.385320 systemd-logind[1224]: Removed session 17. May 17 00:31:44.425371 systemd[1]: Started sshd@17-10.128.0.54:22-139.178.89.65:35972.service. May 17 00:31:44.426000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.128.0.54:22-139.178.89.65:35972 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:31:44.719000 audit[5150]: USER_ACCT pid=5150 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:44.721749 sshd[5150]: Accepted publickey for core from 139.178.89.65 port 35972 ssh2: RSA SHA256:jyE3lnafiBGDGJK6dHnApyF/jgfCnjVgkPORJQqM9Ps May 17 00:31:44.721000 audit[5150]: CRED_ACQ pid=5150 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:44.721000 audit[5150]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffedc289110 a2=3 a3=0 items=0 ppid=1 pid=5150 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:31:44.721000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:31:44.723193 sshd[5150]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:31:44.733270 systemd[1]: Started session-18.scope. May 17 00:31:44.734080 systemd-logind[1224]: New session 18 of user core. May 17 00:31:44.745000 audit[5150]: USER_START pid=5150 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:44.749000 audit[5152]: CRED_ACQ pid=5152 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:45.808000 audit[5162]: NETFILTER_CFG table=filter:132 family=2 entries=24 op=nft_register_rule pid=5162 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:31:45.808000 audit[5162]: SYSCALL arch=c000003e syscall=46 success=yes exit=13432 a0=3 a1=7ffc14769890 a2=0 a3=7ffc1476987c items=0 ppid=2176 pid=5162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:31:45.808000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:31:45.821000 audit[5162]: NETFILTER_CFG table=nat:133 family=2 entries=22 op=nft_register_rule pid=5162 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:31:45.821000 audit[5162]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffc14769890 a2=0 a3=0 items=0 ppid=2176 pid=5162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:31:45.821000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:31:45.865956 sshd[5150]: pam_unix(sshd:session): session closed for user core May 17 00:31:45.869000 audit[5150]: USER_END pid=5150 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:45.869000 audit[5150]: CRED_DISP pid=5150 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:45.873784 systemd-logind[1224]: Session 18 logged out. Waiting for processes to exit. May 17 00:31:45.877434 systemd[1]: sshd@17-10.128.0.54:22-139.178.89.65:35972.service: Deactivated successfully. May 17 00:31:45.876000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.128.0.54:22-139.178.89.65:35972 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:31:45.879898 systemd[1]: session-18.scope: Deactivated successfully. May 17 00:31:45.883422 systemd-logind[1224]: Removed session 18. May 17 00:31:45.888000 audit[5164]: NETFILTER_CFG table=filter:134 family=2 entries=36 op=nft_register_rule pid=5164 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:31:45.888000 audit[5164]: SYSCALL arch=c000003e syscall=46 success=yes exit=13432 a0=3 a1=7ffe5e197600 a2=0 a3=7ffe5e1975ec items=0 ppid=2176 pid=5164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:31:45.888000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:31:45.897000 audit[5164]: NETFILTER_CFG table=nat:135 family=2 entries=22 op=nft_register_rule pid=5164 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:31:45.897000 audit[5164]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe5e197600 a2=0 a3=0 items=0 ppid=2176 pid=5164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:31:45.897000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:31:45.914000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.128.0.54:22-139.178.89.65:35986 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:31:45.915398 systemd[1]: Started sshd@18-10.128.0.54:22-139.178.89.65:35986.service. May 17 00:31:46.217000 audit[5167]: USER_ACCT pid=5167 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:46.221100 sshd[5167]: Accepted publickey for core from 139.178.89.65 port 35986 ssh2: RSA SHA256:jyE3lnafiBGDGJK6dHnApyF/jgfCnjVgkPORJQqM9Ps May 17 00:31:46.219000 audit[5167]: CRED_ACQ pid=5167 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:46.220000 audit[5167]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffae632810 a2=3 a3=0 items=0 ppid=1 pid=5167 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:31:46.220000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:31:46.222433 sshd[5167]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:31:46.230575 systemd-logind[1224]: New session 19 of user core. May 17 00:31:46.231356 systemd[1]: Started session-19.scope. May 17 00:31:46.247000 audit[5167]: USER_START pid=5167 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:46.250000 audit[5170]: CRED_ACQ pid=5170 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:46.669079 sshd[5167]: pam_unix(sshd:session): session closed for user core May 17 00:31:46.669000 audit[5167]: USER_END pid=5167 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:46.669000 audit[5167]: CRED_DISP pid=5167 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:46.673928 systemd[1]: sshd@18-10.128.0.54:22-139.178.89.65:35986.service: Deactivated successfully. May 17 00:31:46.672000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.128.0.54:22-139.178.89.65:35986 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:31:46.675303 systemd[1]: session-19.scope: Deactivated successfully. May 17 00:31:46.676523 systemd-logind[1224]: Session 19 logged out. Waiting for processes to exit. May 17 00:31:46.678442 systemd-logind[1224]: Removed session 19. May 17 00:31:46.721767 systemd[1]: Started sshd@19-10.128.0.54:22-139.178.89.65:33874.service. May 17 00:31:46.720000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.128.0.54:22-139.178.89.65:33874 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:31:47.020000 audit[5177]: USER_ACCT pid=5177 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:47.022680 sshd[5177]: Accepted publickey for core from 139.178.89.65 port 33874 ssh2: RSA SHA256:jyE3lnafiBGDGJK6dHnApyF/jgfCnjVgkPORJQqM9Ps May 17 00:31:47.023000 audit[5177]: CRED_ACQ pid=5177 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:47.023000 audit[5177]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffecb478dd0 a2=3 a3=0 items=0 ppid=1 pid=5177 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:31:47.023000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:31:47.025775 sshd[5177]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:31:47.033953 systemd-logind[1224]: New session 20 of user core. May 17 00:31:47.034186 systemd[1]: Started session-20.scope. May 17 00:31:47.043000 audit[5177]: USER_START pid=5177 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:47.045000 audit[5179]: CRED_ACQ pid=5179 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:47.062066 kubelet[2047]: E0517 00:31:47.061887 2047 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-sx8fp" podUID="a859c06b-ce28-4cc1-830c-0d905598097c" May 17 00:31:47.326121 sshd[5177]: pam_unix(sshd:session): session closed for user core May 17 00:31:47.327000 audit[5177]: USER_END pid=5177 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:47.327000 audit[5177]: CRED_DISP pid=5177 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:47.331000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.128.0.54:22-139.178.89.65:33874 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:31:47.332727 systemd[1]: sshd@19-10.128.0.54:22-139.178.89.65:33874.service: Deactivated successfully. May 17 00:31:47.334231 systemd[1]: session-20.scope: Deactivated successfully. May 17 00:31:47.335848 systemd-logind[1224]: Session 20 logged out. Waiting for processes to exit. May 17 00:31:47.338116 systemd-logind[1224]: Removed session 20. May 17 00:31:50.438000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c296,c329 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:31:50.445778 kernel: kauditd_printk_skb: 57 callbacks suppressed May 17 00:31:50.445965 kernel: audit: type=1400 audit(1747441910.438:1502): avc: denied { watch } for pid=1877 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c296,c329 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:31:50.438000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520987 scontext=system_u:system_r:svirt_lxc_net_t:s0:c296,c329 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:31:50.498887 kernel: audit: type=1400 audit(1747441910.438:1501): avc: denied { watch } for pid=1877 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520987 scontext=system_u:system_r:svirt_lxc_net_t:s0:c296,c329 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:31:50.499095 kernel: audit: type=1300 audit(1747441910.438:1501): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001eb0a80 a2=fc6 a3=0 items=0 ppid=1752 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c296,c329 key=(null) May 17 00:31:50.438000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001eb0a80 a2=fc6 a3=0 items=0 ppid=1752 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c296,c329 key=(null) May 17 00:31:50.438000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:31:50.534749 kernel: audit: type=1327 audit(1747441910.438:1501): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:31:50.438000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00129cab0 a2=fc6 a3=0 items=0 ppid=1752 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c296,c329 key=(null) May 17 00:31:50.563854 kernel: audit: type=1300 audit(1747441910.438:1502): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00129cab0 a2=fc6 a3=0 items=0 ppid=1752 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c296,c329 key=(null) May 17 00:31:50.438000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:31:50.627339 kernel: audit: type=1327 audit(1747441910.438:1502): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:31:51.376000 audit[1917]: AVC avc: denied { watch } for pid=1917 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520989 scontext=system_u:system_r:svirt_lxc_net_t:s0:c258,c418 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:31:51.407733 kernel: audit: type=1400 audit(1747441911.376:1503): avc: denied { watch } for pid=1917 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520989 scontext=system_u:system_r:svirt_lxc_net_t:s0:c258,c418 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:31:51.407920 kernel: audit: type=1300 audit(1747441911.376:1503): arch=c000003e syscall=254 success=no exit=-13 a0=81 a1=c00e5911a0 a2=fc6 a3=0 items=0 ppid=1770 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c258,c418 key=(null) May 17 00:31:51.376000 audit[1917]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=81 a1=c00e5911a0 a2=fc6 a3=0 items=0 ppid=1770 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c258,c418 key=(null) May 17 00:31:51.443735 kernel: audit: type=1327 audit(1747441911.376:1503): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:31:51.376000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:31:51.377000 audit[1917]: AVC avc: denied { watch } for pid=1917 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520987 scontext=system_u:system_r:svirt_lxc_net_t:s0:c258,c418 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:31:51.501044 kernel: audit: type=1400 audit(1747441911.377:1504): avc: denied { watch } for pid=1917 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520987 scontext=system_u:system_r:svirt_lxc_net_t:s0:c258,c418 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:31:51.377000 audit[1917]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=81 a1=c011dbc2e0 a2=fc6 a3=0 items=0 ppid=1770 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c258,c418 key=(null) May 17 00:31:51.377000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:31:51.377000 audit[1917]: AVC avc: denied { watch } for pid=1917 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520995 scontext=system_u:system_r:svirt_lxc_net_t:s0:c258,c418 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:31:51.377000 audit[1917]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=81 a1=c00e591200 a2=fc6 a3=0 items=0 ppid=1770 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c258,c418 key=(null) May 17 00:31:51.377000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:31:51.406000 audit[1917]: AVC avc: denied { watch } for pid=1917 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c258,c418 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:31:51.406000 audit[1917]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=81 a1=c00e591290 a2=fc6 a3=0 items=0 ppid=1770 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c258,c418 key=(null) May 17 00:31:51.406000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:31:51.527000 audit[1917]: AVC avc: denied { watch } for pid=1917 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520987 scontext=system_u:system_r:svirt_lxc_net_t:s0:c258,c418 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:31:51.527000 audit[1917]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=81 a1=c011728be0 a2=fc6 a3=0 items=0 ppid=1770 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c258,c418 key=(null) May 17 00:31:51.527000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:31:51.528000 audit[1917]: AVC avc: denied { watch } for pid=1917 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c258,c418 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:31:51.528000 audit[1917]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=81 a1=c00e51e930 a2=fc6 a3=0 items=0 ppid=1770 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c258,c418 key=(null) May 17 00:31:51.528000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:31:52.374160 systemd[1]: Started sshd@20-10.128.0.54:22-139.178.89.65:33876.service. May 17 00:31:52.373000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.128.0.54:22-139.178.89.65:33876 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:31:52.667000 audit[5189]: USER_ACCT pid=5189 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:52.668820 sshd[5189]: Accepted publickey for core from 139.178.89.65 port 33876 ssh2: RSA SHA256:jyE3lnafiBGDGJK6dHnApyF/jgfCnjVgkPORJQqM9Ps May 17 00:31:52.669000 audit[5189]: CRED_ACQ pid=5189 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:52.670000 audit[5189]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffde12e24f0 a2=3 a3=0 items=0 ppid=1 pid=5189 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:31:52.670000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:31:52.671903 sshd[5189]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:31:52.680001 systemd-logind[1224]: New session 21 of user core. May 17 00:31:52.680759 systemd[1]: Started session-21.scope. May 17 00:31:52.692000 audit[5189]: USER_START pid=5189 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:52.695000 audit[5191]: CRED_ACQ pid=5191 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:52.924000 audit[5199]: NETFILTER_CFG table=filter:136 family=2 entries=24 op=nft_register_rule pid=5199 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:31:52.924000 audit[5199]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7fff6b4a3fa0 a2=0 a3=7fff6b4a3f8c items=0 ppid=2176 pid=5199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:31:52.924000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:31:52.933000 audit[5199]: NETFILTER_CFG table=nat:137 family=2 entries=106 op=nft_register_chain pid=5199 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:31:52.933000 audit[5199]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7fff6b4a3fa0 a2=0 a3=7fff6b4a3f8c items=0 ppid=2176 pid=5199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:31:52.933000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:31:53.018144 sshd[5189]: pam_unix(sshd:session): session closed for user core May 17 00:31:53.020000 audit[5189]: USER_END pid=5189 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:53.020000 audit[5189]: CRED_DISP pid=5189 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:53.024009 systemd[1]: sshd@20-10.128.0.54:22-139.178.89.65:33876.service: Deactivated successfully. May 17 00:31:53.025382 systemd[1]: session-21.scope: Deactivated successfully. May 17 00:31:53.023000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.128.0.54:22-139.178.89.65:33876 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:31:53.026892 systemd-logind[1224]: Session 21 logged out. Waiting for processes to exit. May 17 00:31:53.028903 systemd-logind[1224]: Removed session 21. May 17 00:31:53.977000 audit[4317]: AVC avc: denied { watch } for pid=4317 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_30_30.2163458567/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c237,c324 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c237,c324 tclass=file permissive=0 May 17 00:31:53.977000 audit[4317]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001d7b7a0 a2=fc6 a3=0 items=0 ppid=3649 pid=4317 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c237,c324 key=(null) May 17 00:31:53.977000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:31:54.236000 audit[4354]: AVC avc: denied { watch } for pid=4354 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_30_30.2890834598/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c801,c979 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c801,c979 tclass=file permissive=0 May 17 00:31:54.236000 audit[4354]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0007ffa60 a2=fc6 a3=0 items=0 ppid=3834 pid=4354 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c801,c979 key=(null) May 17 00:31:54.236000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:31:55.067968 kubelet[2047]: E0517 00:31:55.067514 2047 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-797f4cd9d4-bwnvn" podUID="dc308654-0619-40ae-8a66-6809b61affb7" May 17 00:31:56.684414 kernel: kauditd_printk_skb: 37 callbacks suppressed May 17 00:31:56.684892 kernel: audit: type=1400 audit(1747441916.674:1522): avc: denied { associate } for pid=1372 comm="google_accounts" name="#c0" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=0 May 17 00:31:56.674000 audit[1372]: AVC avc: denied { associate } for pid=1372 comm="google_accounts" name="#c0" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=0 May 17 00:31:56.677358 google-accounts[1372]: ERROR Exception calling the response handler. [Errno 13] Permission denied: '/var/lib/google'. Traceback (most recent call last): File "/usr/lib/python3.9/site-packages/google_compute_engine/metadata_watcher.py", line 200, in WatchMetadata handler(response) File "/usr/lib/python3.9/site-packages/google_compute_engine/accounts/accounts_daemon.py", line 285, in HandleAccounts self.utils.SetConfiguredUsers(desired_users.keys()) File "/usr/lib/python3.9/site-packages/google_compute_engine/accounts/accounts_utils.py", line 324, in SetConfiguredUsers os.makedirs(self.google_users_dir) File "/usr/lib/python-exec/python3.9/../../../lib/python3.9/os.py", line 225, in makedirs mkdir(name, mode) PermissionError: [Errno 13] Permission denied: '/var/lib/google' May 17 00:31:56.674000 audit[1372]: SYSCALL arch=c000003e syscall=83 success=no exit=-13 a0=7fdce5d54b00 a1=1ff a2=1ff a3=0 items=0 ppid=1317 pid=1372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts0 ses=4294967295 comm="google_accounts" exe="/usr/bin/python3.9" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:31:56.738498 kernel: audit: type=1300 audit(1747441916.674:1522): arch=c000003e syscall=83 success=no exit=-13 a0=7fdce5d54b00 a1=1ff a2=1ff a3=0 items=0 ppid=1317 pid=1372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts0 ses=4294967295 comm="google_accounts" exe="/usr/bin/python3.9" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:31:56.738877 kernel: audit: type=1327 audit(1747441916.674:1522): proctitle=2F7573722F6C69622F707974686F6E2D657865632F707974686F6E332E392F707974686F6E33002F7573722F62696E2F676F6F676C655F6163636F756E74735F6461656D6F6E May 17 00:31:56.674000 audit: PROCTITLE proctitle=2F7573722F6C69622F707974686F6E2D657865632F707974686F6E332E392F707974686F6E33002F7573722F62696E2F676F6F676C655F6163636F756E74735F6461656D6F6E May 17 00:31:56.745000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520987 scontext=system_u:system_r:svirt_lxc_net_t:s0:c296,c329 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:31:56.790254 kernel: audit: type=1400 audit(1747441916.745:1523): avc: denied { watch } for pid=1877 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520987 scontext=system_u:system_r:svirt_lxc_net_t:s0:c296,c329 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:31:56.790421 kernel: audit: type=1300 audit(1747441916.745:1523): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001063c40 a2=fc6 a3=0 items=0 ppid=1752 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c296,c329 key=(null) May 17 00:31:56.745000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001063c40 a2=fc6 a3=0 items=0 ppid=1752 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c296,c329 key=(null) May 17 00:31:56.745000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:31:56.748000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520987 scontext=system_u:system_r:svirt_lxc_net_t:s0:c296,c329 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:31:56.861836 kernel: audit: type=1327 audit(1747441916.745:1523): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:31:56.861956 kernel: audit: type=1400 audit(1747441916.748:1524): avc: denied { watch } for pid=1877 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520987 scontext=system_u:system_r:svirt_lxc_net_t:s0:c296,c329 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:31:56.748000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001063f00 a2=fc6 a3=0 items=0 ppid=1752 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c296,c329 key=(null) May 17 00:31:56.925979 kernel: audit: type=1300 audit(1747441916.748:1524): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001063f00 a2=fc6 a3=0 items=0 ppid=1752 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c296,c329 key=(null) May 17 00:31:56.926196 kernel: audit: type=1327 audit(1747441916.748:1524): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:31:56.748000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:31:56.748000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520987 scontext=system_u:system_r:svirt_lxc_net_t:s0:c296,c329 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:31:56.748000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001063f40 a2=fc6 a3=0 items=0 ppid=1752 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c296,c329 key=(null) May 17 00:31:56.748000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:31:56.748000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520987 scontext=system_u:system_r:svirt_lxc_net_t:s0:c296,c329 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:31:56.982833 kernel: audit: type=1400 audit(1747441916.748:1525): avc: denied { watch } for pid=1877 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520987 scontext=system_u:system_r:svirt_lxc_net_t:s0:c296,c329 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:31:56.748000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001063f80 a2=fc6 a3=0 items=0 ppid=1752 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c296,c329 key=(null) May 17 00:31:56.748000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:31:58.074435 systemd[1]: Started sshd@21-10.128.0.54:22-139.178.89.65:60652.service. May 17 00:31:58.074000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.128.0.54:22-139.178.89.65:60652 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:31:58.394000 audit[5226]: USER_ACCT pid=5226 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:58.397227 sshd[5226]: Accepted publickey for core from 139.178.89.65 port 60652 ssh2: RSA SHA256:jyE3lnafiBGDGJK6dHnApyF/jgfCnjVgkPORJQqM9Ps May 17 00:31:58.397000 audit[5226]: CRED_ACQ pid=5226 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:58.397000 audit[5226]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe38a5b830 a2=3 a3=0 items=0 ppid=1 pid=5226 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:31:58.397000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:31:58.399136 sshd[5226]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:31:58.409792 systemd[1]: Started session-22.scope. May 17 00:31:58.412790 systemd-logind[1224]: New session 22 of user core. May 17 00:31:58.425000 audit[5226]: USER_START pid=5226 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:58.429000 audit[5228]: CRED_ACQ pid=5228 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:58.778813 sshd[5226]: pam_unix(sshd:session): session closed for user core May 17 00:31:58.781000 audit[5226]: USER_END pid=5226 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:58.781000 audit[5226]: CRED_DISP pid=5226 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:31:58.786838 systemd-logind[1224]: Session 22 logged out. Waiting for processes to exit. May 17 00:31:58.787612 systemd[1]: sshd@21-10.128.0.54:22-139.178.89.65:60652.service: Deactivated successfully. May 17 00:31:58.787000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.128.0.54:22-139.178.89.65:60652 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:31:58.791388 systemd[1]: session-22.scope: Deactivated successfully. May 17 00:31:58.794954 systemd-logind[1224]: Removed session 22. May 17 00:32:02.063004 kubelet[2047]: E0517 00:32:02.062941 2047 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-sx8fp" podUID="a859c06b-ce28-4cc1-830c-0d905598097c" May 17 00:32:03.839130 systemd[1]: Started sshd@22-10.128.0.54:22-139.178.89.65:60654.service. May 17 00:32:03.837000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.128.0.54:22-139.178.89.65:60654 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:03.845012 kernel: kauditd_printk_skb: 16 callbacks suppressed May 17 00:32:03.845230 kernel: audit: type=1130 audit(1747441923.837:1536): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.128.0.54:22-139.178.89.65:60654 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:04.174000 audit[5246]: USER_ACCT pid=5246 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:32:04.208602 sshd[5246]: Accepted publickey for core from 139.178.89.65 port 60654 ssh2: RSA SHA256:jyE3lnafiBGDGJK6dHnApyF/jgfCnjVgkPORJQqM9Ps May 17 00:32:04.209374 kernel: audit: type=1101 audit(1747441924.174:1537): pid=5246 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:32:04.210178 sshd[5246]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:32:04.207000 audit[5246]: CRED_ACQ pid=5246 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:32:04.236840 kernel: audit: type=1103 audit(1747441924.207:1538): pid=5246 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:32:04.255805 kernel: audit: type=1006 audit(1747441924.207:1539): pid=5246 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 May 17 00:32:04.207000 audit[5246]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe4e55b1a0 a2=3 a3=0 items=0 ppid=1 pid=5246 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:32:04.286329 kernel: audit: type=1300 audit(1747441924.207:1539): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe4e55b1a0 a2=3 a3=0 items=0 ppid=1 pid=5246 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:32:04.285410 systemd-logind[1224]: New session 23 of user core. May 17 00:32:04.301092 kernel: audit: type=1327 audit(1747441924.207:1539): proctitle=737368643A20636F7265205B707269765D May 17 00:32:04.207000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:32:04.302183 systemd[1]: Started session-23.scope. May 17 00:32:04.313000 audit[5246]: USER_START pid=5246 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:32:04.348840 kernel: audit: type=1105 audit(1747441924.313:1540): pid=5246 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:32:04.317000 audit[5248]: CRED_ACQ pid=5248 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:32:04.376823 kernel: audit: type=1103 audit(1747441924.317:1541): pid=5248 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:32:04.669008 sshd[5246]: pam_unix(sshd:session): session closed for user core May 17 00:32:04.669000 audit[5246]: USER_END pid=5246 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:32:04.684310 systemd[1]: sshd@22-10.128.0.54:22-139.178.89.65:60654.service: Deactivated successfully. May 17 00:32:04.687907 systemd[1]: session-23.scope: Deactivated successfully. May 17 00:32:04.678000 audit[5246]: CRED_DISP pid=5246 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:32:04.710883 systemd-logind[1224]: Session 23 logged out. Waiting for processes to exit. May 17 00:32:04.713370 systemd-logind[1224]: Removed session 23. May 17 00:32:04.730216 kernel: audit: type=1106 audit(1747441924.669:1542): pid=5246 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:32:04.730435 kernel: audit: type=1104 audit(1747441924.678:1543): pid=5246 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:32:04.683000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.128.0.54:22-139.178.89.65:60654 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:08.062547 env[1216]: time="2025-05-17T00:32:08.061943280Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\"" May 17 00:32:08.207477 env[1216]: time="2025-05-17T00:32:08.207396020Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:32:08.209779 env[1216]: time="2025-05-17T00:32:08.209666163Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:32:08.210334 kubelet[2047]: E0517 00:32:08.210279 2047 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:32:08.211091 kubelet[2047]: E0517 00:32:08.210352 2047 kuberuntime_image.go:42] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:32:08.211241 kubelet[2047]: E0517 00:32:08.211172 2047 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.0,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:e1697e16bd03489ca69cfcf2cef8e19e,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-95dhb,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-797f4cd9d4-bwnvn_calico-system(dc308654-0619-40ae-8a66-6809b61affb7): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:32:08.214284 env[1216]: time="2025-05-17T00:32:08.214243386Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\"" May 17 00:32:08.340854 env[1216]: time="2025-05-17T00:32:08.340748029Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:32:08.342771 env[1216]: time="2025-05-17T00:32:08.342627634Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:32:08.343149 kubelet[2047]: E0517 00:32:08.343083 2047 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:32:08.343285 kubelet[2047]: E0517 00:32:08.343164 2047 kuberuntime_image.go:42] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:32:08.343435 kubelet[2047]: E0517 00:32:08.343363 2047 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-95dhb,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-797f4cd9d4-bwnvn_calico-system(dc308654-0619-40ae-8a66-6809b61affb7): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:32:08.345235 kubelet[2047]: E0517 00:32:08.345122 2047 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-797f4cd9d4-bwnvn" podUID="dc308654-0619-40ae-8a66-6809b61affb7"