May 17 00:46:01.041335 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] May 17 00:46:01.041355 kernel: Linux version 5.15.182-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Fri May 16 23:24:21 -00 2025 May 17 00:46:01.041363 kernel: earlycon: pl11 at MMIO 0x00000000effec000 (options '') May 17 00:46:01.041369 kernel: printk: bootconsole [pl11] enabled May 17 00:46:01.041374 kernel: efi: EFI v2.70 by EDK II May 17 00:46:01.041380 kernel: efi: ACPI 2.0=0x3fd5f018 SMBIOS=0x3e580000 SMBIOS 3.0=0x3e560000 MEMATTR=0x3ead8b98 RNG=0x3fd5f998 MEMRESERVE=0x3763cf98 May 17 00:46:01.041386 kernel: random: crng init done May 17 00:46:01.041392 kernel: ACPI: Early table checksum verification disabled May 17 00:46:01.041397 kernel: ACPI: RSDP 0x000000003FD5F018 000024 (v02 VRTUAL) May 17 00:46:01.041403 kernel: ACPI: XSDT 0x000000003FD5FF18 00006C (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 00:46:01.041408 kernel: ACPI: FACP 0x000000003FD5FC18 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 00:46:01.041413 kernel: ACPI: DSDT 0x000000003FD41018 01DFCD (v02 MSFTVM DSDT01 00000001 INTL 20230628) May 17 00:46:01.041420 kernel: ACPI: DBG2 0x000000003FD5FB18 000072 (v00 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 00:46:01.041426 kernel: ACPI: GTDT 0x000000003FD5FD98 000060 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 00:46:01.041433 kernel: ACPI: OEM0 0x000000003FD5F098 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 00:46:01.041438 kernel: ACPI: SPCR 0x000000003FD5FA98 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 00:46:01.041444 kernel: ACPI: APIC 0x000000003FD5F818 0000FC (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 00:46:01.041451 kernel: ACPI: SRAT 0x000000003FD5F198 000234 (v03 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 00:46:01.041457 kernel: ACPI: PPTT 0x000000003FD5F418 000120 (v01 VRTUAL MICROSFT 00000000 MSFT 00000000) May 17 00:46:01.041463 kernel: ACPI: BGRT 0x000000003FD5FE98 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 00:46:01.041468 kernel: ACPI: SPCR: console: pl011,mmio32,0xeffec000,115200 May 17 00:46:01.041474 kernel: NUMA: Failed to initialise from firmware May 17 00:46:01.041480 kernel: NUMA: Faking a node at [mem 0x0000000000000000-0x00000001bfffffff] May 17 00:46:01.041486 kernel: NUMA: NODE_DATA [mem 0x1bf7f2900-0x1bf7f7fff] May 17 00:46:01.041491 kernel: Zone ranges: May 17 00:46:01.041497 kernel: DMA [mem 0x0000000000000000-0x00000000ffffffff] May 17 00:46:01.041503 kernel: DMA32 empty May 17 00:46:01.041509 kernel: Normal [mem 0x0000000100000000-0x00000001bfffffff] May 17 00:46:01.041516 kernel: Movable zone start for each node May 17 00:46:01.041521 kernel: Early memory node ranges May 17 00:46:01.041527 kernel: node 0: [mem 0x0000000000000000-0x00000000007fffff] May 17 00:46:01.041533 kernel: node 0: [mem 0x0000000000824000-0x000000003e54ffff] May 17 00:46:01.041539 kernel: node 0: [mem 0x000000003e550000-0x000000003e87ffff] May 17 00:46:01.041544 kernel: node 0: [mem 0x000000003e880000-0x000000003fc7ffff] May 17 00:46:01.041550 kernel: node 0: [mem 0x000000003fc80000-0x000000003fcfffff] May 17 00:46:01.041555 kernel: node 0: [mem 0x000000003fd00000-0x000000003fffffff] May 17 00:46:01.041561 kernel: node 0: [mem 0x0000000100000000-0x00000001bfffffff] May 17 00:46:01.041567 kernel: Initmem setup node 0 [mem 0x0000000000000000-0x00000001bfffffff] May 17 00:46:01.041572 kernel: On node 0, zone DMA: 36 pages in unavailable ranges May 17 00:46:01.041578 kernel: psci: probing for conduit method from ACPI. May 17 00:46:01.041588 kernel: psci: PSCIv1.1 detected in firmware. May 17 00:46:01.041594 kernel: psci: Using standard PSCI v0.2 function IDs May 17 00:46:01.041600 kernel: psci: MIGRATE_INFO_TYPE not supported. May 17 00:46:01.041606 kernel: psci: SMC Calling Convention v1.4 May 17 00:46:01.041612 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x0 -> Node -1 May 17 00:46:01.041634 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1 -> Node -1 May 17 00:46:01.041640 kernel: percpu: Embedded 30 pages/cpu s83032 r8192 d31656 u122880 May 17 00:46:01.041647 kernel: pcpu-alloc: s83032 r8192 d31656 u122880 alloc=30*4096 May 17 00:46:01.041653 kernel: pcpu-alloc: [0] 0 [0] 1 May 17 00:46:01.041659 kernel: Detected PIPT I-cache on CPU0 May 17 00:46:01.041665 kernel: CPU features: detected: GIC system register CPU interface May 17 00:46:01.041671 kernel: CPU features: detected: Hardware dirty bit management May 17 00:46:01.041677 kernel: CPU features: detected: Spectre-BHB May 17 00:46:01.041684 kernel: CPU features: kernel page table isolation forced ON by KASLR May 17 00:46:01.041690 kernel: CPU features: detected: Kernel page table isolation (KPTI) May 17 00:46:01.041696 kernel: CPU features: detected: ARM erratum 1418040 May 17 00:46:01.041704 kernel: CPU features: detected: ARM erratum 1542419 (kernel portion) May 17 00:46:01.041710 kernel: CPU features: detected: SSBS not fully self-synchronizing May 17 00:46:01.041716 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1032156 May 17 00:46:01.041722 kernel: Policy zone: Normal May 17 00:46:01.041729 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=2d48a3f066dcb37cd386b93b4921577cdf70daa76e7b097cf98da108968f8bb5 May 17 00:46:01.041736 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 17 00:46:01.041742 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) May 17 00:46:01.041748 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 17 00:46:01.041754 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 17 00:46:01.041760 kernel: software IO TLB: mapped [mem 0x000000003a550000-0x000000003e550000] (64MB) May 17 00:46:01.041767 kernel: Memory: 3986940K/4194160K available (9792K kernel code, 2094K rwdata, 7584K rodata, 36416K init, 777K bss, 207220K reserved, 0K cma-reserved) May 17 00:46:01.041774 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 May 17 00:46:01.041781 kernel: trace event string verifier disabled May 17 00:46:01.041787 kernel: rcu: Preemptible hierarchical RCU implementation. May 17 00:46:01.041793 kernel: rcu: RCU event tracing is enabled. May 17 00:46:01.041799 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. May 17 00:46:01.041806 kernel: Trampoline variant of Tasks RCU enabled. May 17 00:46:01.041812 kernel: Tracing variant of Tasks RCU enabled. May 17 00:46:01.041818 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 17 00:46:01.041824 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 May 17 00:46:01.041831 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 May 17 00:46:01.041837 kernel: GICv3: 960 SPIs implemented May 17 00:46:01.041844 kernel: GICv3: 0 Extended SPIs implemented May 17 00:46:01.041850 kernel: GICv3: Distributor has no Range Selector support May 17 00:46:01.041856 kernel: Root IRQ handler: gic_handle_irq May 17 00:46:01.041862 kernel: GICv3: 16 PPIs implemented May 17 00:46:01.041868 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000effee000 May 17 00:46:01.041874 kernel: ITS: No ITS available, not enabling LPIs May 17 00:46:01.041881 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 17 00:46:01.041887 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). May 17 00:46:01.041893 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns May 17 00:46:01.041899 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns May 17 00:46:01.041906 kernel: Console: colour dummy device 80x25 May 17 00:46:01.041914 kernel: printk: console [tty1] enabled May 17 00:46:01.041921 kernel: ACPI: Core revision 20210730 May 17 00:46:01.041927 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) May 17 00:46:01.041933 kernel: pid_max: default: 32768 minimum: 301 May 17 00:46:01.041940 kernel: LSM: Security Framework initializing May 17 00:46:01.041946 kernel: SELinux: Initializing. May 17 00:46:01.041952 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 17 00:46:01.041958 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 17 00:46:01.041965 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3a8030, hints 0xe, misc 0x31e1 May 17 00:46:01.041972 kernel: Hyper-V: Host Build 10.0.22477.1619-1-0 May 17 00:46:01.041978 kernel: rcu: Hierarchical SRCU implementation. May 17 00:46:01.041985 kernel: Remapping and enabling EFI services. May 17 00:46:01.041991 kernel: smp: Bringing up secondary CPUs ... May 17 00:46:01.041997 kernel: Detected PIPT I-cache on CPU1 May 17 00:46:01.042003 kernel: GICv3: CPU1: found redistributor 1 region 1:0x00000000f000e000 May 17 00:46:01.042009 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 17 00:46:01.042016 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] May 17 00:46:01.042022 kernel: smp: Brought up 1 node, 2 CPUs May 17 00:46:01.042028 kernel: SMP: Total of 2 processors activated. May 17 00:46:01.042036 kernel: CPU features: detected: 32-bit EL0 Support May 17 00:46:01.042042 kernel: CPU features: detected: Instruction cache invalidation not required for I/D coherence May 17 00:46:01.042049 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence May 17 00:46:01.042055 kernel: CPU features: detected: CRC32 instructions May 17 00:46:01.042061 kernel: CPU features: detected: RCpc load-acquire (LDAPR) May 17 00:46:01.042067 kernel: CPU features: detected: LSE atomic instructions May 17 00:46:01.042074 kernel: CPU features: detected: Privileged Access Never May 17 00:46:01.042080 kernel: CPU: All CPU(s) started at EL1 May 17 00:46:01.042086 kernel: alternatives: patching kernel code May 17 00:46:01.042093 kernel: devtmpfs: initialized May 17 00:46:01.042104 kernel: KASLR enabled May 17 00:46:01.042111 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 17 00:46:01.042119 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) May 17 00:46:01.042126 kernel: pinctrl core: initialized pinctrl subsystem May 17 00:46:01.042132 kernel: SMBIOS 3.1.0 present. May 17 00:46:01.042139 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 09/28/2024 May 17 00:46:01.042145 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 17 00:46:01.042152 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations May 17 00:46:01.042160 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations May 17 00:46:01.042167 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations May 17 00:46:01.042173 kernel: audit: initializing netlink subsys (disabled) May 17 00:46:01.042180 kernel: audit: type=2000 audit(0.088:1): state=initialized audit_enabled=0 res=1 May 17 00:46:01.042187 kernel: thermal_sys: Registered thermal governor 'step_wise' May 17 00:46:01.042193 kernel: cpuidle: using governor menu May 17 00:46:01.042199 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. May 17 00:46:01.042207 kernel: ASID allocator initialised with 32768 entries May 17 00:46:01.042214 kernel: ACPI: bus type PCI registered May 17 00:46:01.042221 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 17 00:46:01.042227 kernel: Serial: AMBA PL011 UART driver May 17 00:46:01.042234 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 17 00:46:01.042240 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages May 17 00:46:01.042247 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 17 00:46:01.042254 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages May 17 00:46:01.042260 kernel: cryptd: max_cpu_qlen set to 1000 May 17 00:46:01.042268 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) May 17 00:46:01.042275 kernel: ACPI: Added _OSI(Module Device) May 17 00:46:01.042281 kernel: ACPI: Added _OSI(Processor Device) May 17 00:46:01.042288 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 17 00:46:01.042294 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 17 00:46:01.042301 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 17 00:46:01.042307 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 17 00:46:01.042314 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 17 00:46:01.042321 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 17 00:46:01.042328 kernel: ACPI: Interpreter enabled May 17 00:46:01.042335 kernel: ACPI: Using GIC for interrupt routing May 17 00:46:01.042342 kernel: ARMH0011:00: ttyAMA0 at MMIO 0xeffec000 (irq = 12, base_baud = 0) is a SBSA May 17 00:46:01.042348 kernel: printk: console [ttyAMA0] enabled May 17 00:46:01.042355 kernel: printk: bootconsole [pl11] disabled May 17 00:46:01.042361 kernel: ARMH0011:01: ttyAMA1 at MMIO 0xeffeb000 (irq = 13, base_baud = 0) is a SBSA May 17 00:46:01.042368 kernel: iommu: Default domain type: Translated May 17 00:46:01.042374 kernel: iommu: DMA domain TLB invalidation policy: strict mode May 17 00:46:01.042381 kernel: vgaarb: loaded May 17 00:46:01.042387 kernel: pps_core: LinuxPPS API ver. 1 registered May 17 00:46:01.042395 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 17 00:46:01.042402 kernel: PTP clock support registered May 17 00:46:01.042408 kernel: Registered efivars operations May 17 00:46:01.042415 kernel: No ACPI PMU IRQ for CPU0 May 17 00:46:01.042421 kernel: No ACPI PMU IRQ for CPU1 May 17 00:46:01.042428 kernel: clocksource: Switched to clocksource arch_sys_counter May 17 00:46:01.042434 kernel: VFS: Disk quotas dquot_6.6.0 May 17 00:46:01.042441 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 17 00:46:01.042449 kernel: pnp: PnP ACPI init May 17 00:46:01.042456 kernel: pnp: PnP ACPI: found 0 devices May 17 00:46:01.042462 kernel: NET: Registered PF_INET protocol family May 17 00:46:01.042469 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) May 17 00:46:01.042476 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) May 17 00:46:01.042483 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 17 00:46:01.042490 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) May 17 00:46:01.042496 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) May 17 00:46:01.042503 kernel: TCP: Hash tables configured (established 32768 bind 32768) May 17 00:46:01.042511 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) May 17 00:46:01.042518 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) May 17 00:46:01.042524 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 17 00:46:01.042531 kernel: PCI: CLS 0 bytes, default 64 May 17 00:46:01.042537 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 1 counters available May 17 00:46:01.042544 kernel: kvm [1]: HYP mode not available May 17 00:46:01.042551 kernel: Initialise system trusted keyrings May 17 00:46:01.042557 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 May 17 00:46:01.042564 kernel: Key type asymmetric registered May 17 00:46:01.042571 kernel: Asymmetric key parser 'x509' registered May 17 00:46:01.042578 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 17 00:46:01.042585 kernel: io scheduler mq-deadline registered May 17 00:46:01.042591 kernel: io scheduler kyber registered May 17 00:46:01.042598 kernel: io scheduler bfq registered May 17 00:46:01.042604 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 17 00:46:01.042611 kernel: thunder_xcv, ver 1.0 May 17 00:46:01.042625 kernel: thunder_bgx, ver 1.0 May 17 00:46:01.042632 kernel: nicpf, ver 1.0 May 17 00:46:01.042639 kernel: nicvf, ver 1.0 May 17 00:46:01.042754 kernel: rtc-efi rtc-efi.0: registered as rtc0 May 17 00:46:01.042816 kernel: rtc-efi rtc-efi.0: setting system clock to 2025-05-17T00:46:00 UTC (1747442760) May 17 00:46:01.042825 kernel: efifb: probing for efifb May 17 00:46:01.042832 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k May 17 00:46:01.042839 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 May 17 00:46:01.042846 kernel: efifb: scrolling: redraw May 17 00:46:01.042852 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 May 17 00:46:01.042861 kernel: Console: switching to colour frame buffer device 128x48 May 17 00:46:01.042867 kernel: fb0: EFI VGA frame buffer device May 17 00:46:01.042874 kernel: SMCCC: SOC_ID: ARCH_SOC_ID not implemented, skipping .... May 17 00:46:01.042881 kernel: hid: raw HID events driver (C) Jiri Kosina May 17 00:46:01.042887 kernel: NET: Registered PF_INET6 protocol family May 17 00:46:01.042894 kernel: Segment Routing with IPv6 May 17 00:46:01.042900 kernel: In-situ OAM (IOAM) with IPv6 May 17 00:46:01.042907 kernel: NET: Registered PF_PACKET protocol family May 17 00:46:01.042913 kernel: Key type dns_resolver registered May 17 00:46:01.042919 kernel: registered taskstats version 1 May 17 00:46:01.042927 kernel: Loading compiled-in X.509 certificates May 17 00:46:01.042934 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.182-flatcar: 2fa973ae674d09a62938b8c6a2b9446b5340adb7' May 17 00:46:01.042940 kernel: Key type .fscrypt registered May 17 00:46:01.042947 kernel: Key type fscrypt-provisioning registered May 17 00:46:01.042954 kernel: ima: No TPM chip found, activating TPM-bypass! May 17 00:46:01.042960 kernel: ima: Allocated hash algorithm: sha1 May 17 00:46:01.042967 kernel: ima: No architecture policies found May 17 00:46:01.042973 kernel: clk: Disabling unused clocks May 17 00:46:01.042981 kernel: Freeing unused kernel memory: 36416K May 17 00:46:01.042988 kernel: Run /init as init process May 17 00:46:01.042994 kernel: with arguments: May 17 00:46:01.043000 kernel: /init May 17 00:46:01.043007 kernel: with environment: May 17 00:46:01.043013 kernel: HOME=/ May 17 00:46:01.043019 kernel: TERM=linux May 17 00:46:01.043026 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 17 00:46:01.043035 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 17 00:46:01.043045 systemd[1]: Detected virtualization microsoft. May 17 00:46:01.043052 systemd[1]: Detected architecture arm64. May 17 00:46:01.043059 systemd[1]: Running in initrd. May 17 00:46:01.043066 systemd[1]: No hostname configured, using default hostname. May 17 00:46:01.043074 systemd[1]: Hostname set to . May 17 00:46:01.043081 systemd[1]: Initializing machine ID from random generator. May 17 00:46:01.043088 systemd[1]: Queued start job for default target initrd.target. May 17 00:46:01.043097 systemd[1]: Started systemd-ask-password-console.path. May 17 00:46:01.043104 systemd[1]: Reached target cryptsetup.target. May 17 00:46:01.043111 systemd[1]: Reached target paths.target. May 17 00:46:01.043118 systemd[1]: Reached target slices.target. May 17 00:46:01.043126 systemd[1]: Reached target swap.target. May 17 00:46:01.043133 systemd[1]: Reached target timers.target. May 17 00:46:01.043140 systemd[1]: Listening on iscsid.socket. May 17 00:46:01.043148 systemd[1]: Listening on iscsiuio.socket. May 17 00:46:01.043156 systemd[1]: Listening on systemd-journald-audit.socket. May 17 00:46:01.043163 systemd[1]: Listening on systemd-journald-dev-log.socket. May 17 00:46:01.043170 systemd[1]: Listening on systemd-journald.socket. May 17 00:46:01.043178 systemd[1]: Listening on systemd-networkd.socket. May 17 00:46:01.043185 systemd[1]: Listening on systemd-udevd-control.socket. May 17 00:46:01.043192 systemd[1]: Listening on systemd-udevd-kernel.socket. May 17 00:46:01.043199 systemd[1]: Reached target sockets.target. May 17 00:46:01.043206 systemd[1]: Starting kmod-static-nodes.service... May 17 00:46:01.043214 systemd[1]: Finished network-cleanup.service. May 17 00:46:01.043222 systemd[1]: Starting systemd-fsck-usr.service... May 17 00:46:01.043229 systemd[1]: Starting systemd-journald.service... May 17 00:46:01.043236 systemd[1]: Starting systemd-modules-load.service... May 17 00:46:01.043243 systemd[1]: Starting systemd-resolved.service... May 17 00:46:01.043255 systemd-journald[276]: Journal started May 17 00:46:01.043294 systemd-journald[276]: Runtime Journal (/run/log/journal/bd19c151fdac4c6782784e70bfb081bb) is 8.0M, max 78.5M, 70.5M free. May 17 00:46:01.043587 systemd-modules-load[277]: Inserted module 'overlay' May 17 00:46:01.064243 systemd[1]: Starting systemd-vconsole-setup.service... May 17 00:46:01.086641 systemd[1]: Started systemd-journald.service. May 17 00:46:01.086698 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 17 00:46:01.091000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:01.094681 systemd[1]: Finished kmod-static-nodes.service. May 17 00:46:01.115524 kernel: audit: type=1130 audit(1747442761.091:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:01.115548 kernel: Bridge firewalling registered May 17 00:46:01.097373 systemd-resolved[278]: Positive Trust Anchors: May 17 00:46:01.097382 systemd-resolved[278]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 17 00:46:01.228318 kernel: audit: type=1130 audit(1747442761.126:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:01.228344 kernel: SCSI subsystem initialized May 17 00:46:01.228354 kernel: audit: type=1130 audit(1747442761.150:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:01.228363 kernel: audit: type=1130 audit(1747442761.156:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:01.228381 kernel: audit: type=1130 audit(1747442761.162:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:01.126000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:01.150000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:01.156000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:01.162000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:01.097410 systemd-resolved[278]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 17 00:46:01.281071 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 17 00:46:01.099534 systemd-resolved[278]: Defaulting to hostname 'linux'. May 17 00:46:01.298611 kernel: device-mapper: uevent: version 1.0.3 May 17 00:46:01.298918 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 17 00:46:01.115364 systemd-modules-load[277]: Inserted module 'br_netfilter' May 17 00:46:01.127198 systemd[1]: Started systemd-resolved.service. May 17 00:46:01.151422 systemd[1]: Finished systemd-fsck-usr.service. May 17 00:46:01.319000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:01.157445 systemd[1]: Finished systemd-vconsole-setup.service. May 17 00:46:01.352502 kernel: audit: type=1130 audit(1747442761.319:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:01.162646 systemd[1]: Reached target nss-lookup.target. May 17 00:46:01.351000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:01.233579 systemd[1]: Starting dracut-cmdline-ask.service... May 17 00:46:01.378000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:01.289659 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 17 00:46:01.411248 kernel: audit: type=1130 audit(1747442761.351:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:01.411273 kernel: audit: type=1130 audit(1747442761.378:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:01.297822 systemd-modules-load[277]: Inserted module 'dm_multipath' May 17 00:46:01.305799 systemd[1]: Finished systemd-modules-load.service. May 17 00:46:01.432743 dracut-cmdline[295]: dracut-dracut-053 May 17 00:46:01.432743 dracut-cmdline[295]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=2d48a3f066dcb37cd386b93b4921577cdf70daa76e7b097cf98da108968f8bb5 May 17 00:46:01.441000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:01.320446 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 17 00:46:01.501125 kernel: audit: type=1130 audit(1747442761.441:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:01.352740 systemd[1]: Finished dracut-cmdline-ask.service. May 17 00:46:01.382865 systemd[1]: Starting dracut-cmdline.service... May 17 00:46:01.410038 systemd[1]: Starting systemd-sysctl.service... May 17 00:46:01.436888 systemd[1]: Finished systemd-sysctl.service. May 17 00:46:01.576650 kernel: Loading iSCSI transport class v2.0-870. May 17 00:46:01.591668 kernel: iscsi: registered transport (tcp) May 17 00:46:01.612900 kernel: iscsi: registered transport (qla4xxx) May 17 00:46:01.612957 kernel: QLogic iSCSI HBA Driver May 17 00:46:01.649487 systemd[1]: Finished dracut-cmdline.service. May 17 00:46:01.653000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:01.655152 systemd[1]: Starting dracut-pre-udev.service... May 17 00:46:01.717638 kernel: raid6: neonx8 gen() 13729 MB/s May 17 00:46:01.733630 kernel: raid6: neonx8 xor() 10743 MB/s May 17 00:46:01.753629 kernel: raid6: neonx4 gen() 13541 MB/s May 17 00:46:01.774628 kernel: raid6: neonx4 xor() 11319 MB/s May 17 00:46:01.794628 kernel: raid6: neonx2 gen() 12959 MB/s May 17 00:46:01.815627 kernel: raid6: neonx2 xor() 10311 MB/s May 17 00:46:01.836632 kernel: raid6: neonx1 gen() 10532 MB/s May 17 00:46:01.857628 kernel: raid6: neonx1 xor() 8787 MB/s May 17 00:46:01.877628 kernel: raid6: int64x8 gen() 6269 MB/s May 17 00:46:01.898628 kernel: raid6: int64x8 xor() 3543 MB/s May 17 00:46:01.918650 kernel: raid6: int64x4 gen() 7237 MB/s May 17 00:46:01.938661 kernel: raid6: int64x4 xor() 3854 MB/s May 17 00:46:01.959634 kernel: raid6: int64x2 gen() 6150 MB/s May 17 00:46:01.979627 kernel: raid6: int64x2 xor() 3318 MB/s May 17 00:46:01.999627 kernel: raid6: int64x1 gen() 5046 MB/s May 17 00:46:02.025246 kernel: raid6: int64x1 xor() 2645 MB/s May 17 00:46:02.025258 kernel: raid6: using algorithm neonx8 gen() 13729 MB/s May 17 00:46:02.025267 kernel: raid6: .... xor() 10743 MB/s, rmw enabled May 17 00:46:02.029636 kernel: raid6: using neon recovery algorithm May 17 00:46:02.047631 kernel: xor: measuring software checksum speed May 17 00:46:02.051628 kernel: 8regs : 16174 MB/sec May 17 00:46:02.059289 kernel: 32regs : 19524 MB/sec May 17 00:46:02.059299 kernel: arm64_neon : 27644 MB/sec May 17 00:46:02.059308 kernel: xor: using function: arm64_neon (27644 MB/sec) May 17 00:46:02.121643 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no May 17 00:46:02.131875 systemd[1]: Finished dracut-pre-udev.service. May 17 00:46:02.136000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:02.140000 audit: BPF prog-id=7 op=LOAD May 17 00:46:02.140000 audit: BPF prog-id=8 op=LOAD May 17 00:46:02.141574 systemd[1]: Starting systemd-udevd.service... May 17 00:46:02.160702 systemd-udevd[475]: Using default interface naming scheme 'v252'. May 17 00:46:02.172000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:02.167727 systemd[1]: Started systemd-udevd.service. May 17 00:46:02.178929 systemd[1]: Starting dracut-pre-trigger.service... May 17 00:46:02.198261 dracut-pre-trigger[496]: rd.md=0: removing MD RAID activation May 17 00:46:02.229674 systemd[1]: Finished dracut-pre-trigger.service. May 17 00:46:02.234000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:02.235262 systemd[1]: Starting systemd-udev-trigger.service... May 17 00:46:02.282109 systemd[1]: Finished systemd-udev-trigger.service. May 17 00:46:02.291000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:02.338649 kernel: hv_vmbus: Vmbus version:5.3 May 17 00:46:02.354640 kernel: hv_vmbus: registering driver hid_hyperv May 17 00:46:02.354687 kernel: hv_vmbus: registering driver hv_storvsc May 17 00:46:02.354697 kernel: scsi host0: storvsc_host_t May 17 00:46:02.361840 kernel: scsi host1: storvsc_host_t May 17 00:46:02.369518 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 May 17 00:46:02.375635 kernel: hv_vmbus: registering driver hv_netvsc May 17 00:46:02.375685 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 May 17 00:46:02.383492 kernel: hv_vmbus: registering driver hyperv_keyboard May 17 00:46:02.393656 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input0 May 17 00:46:02.409642 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/MSFT1000:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input1 May 17 00:46:02.409698 kernel: hid-generic 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on May 17 00:46:02.439711 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) May 17 00:46:02.462822 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks May 17 00:46:02.462934 kernel: sd 0:0:0:0: [sda] Write Protect is off May 17 00:46:02.463029 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 May 17 00:46:02.463133 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA May 17 00:46:02.463229 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 17 00:46:02.463239 kernel: sd 0:0:0:0: [sda] Attached SCSI disk May 17 00:46:02.471985 kernel: sr 0:0:0:2: [sr0] scsi-1 drive May 17 00:46:02.479120 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 May 17 00:46:02.479168 kernel: hv_netvsc 002248bc-82d6-0022-48bc-82d6002248bc eth0: VF slot 1 added May 17 00:46:02.479532 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 May 17 00:46:02.486643 kernel: hv_vmbus: registering driver hv_pci May 17 00:46:02.497646 kernel: hv_pci 12f8fc0b-5bee-413b-ac9c-9e4cea96cd22: PCI VMBus probing: Using version 0x10004 May 17 00:46:02.617209 kernel: hv_pci 12f8fc0b-5bee-413b-ac9c-9e4cea96cd22: PCI host bridge to bus 5bee:00 May 17 00:46:02.617316 kernel: pci_bus 5bee:00: root bus resource [mem 0xfc0000000-0xfc00fffff window] May 17 00:46:02.617415 kernel: pci_bus 5bee:00: No busn resource found for root bus, will use [bus 00-ff] May 17 00:46:02.617487 kernel: pci 5bee:00:02.0: [15b3:1018] type 00 class 0x020000 May 17 00:46:02.617585 kernel: pci 5bee:00:02.0: reg 0x10: [mem 0xfc0000000-0xfc00fffff 64bit pref] May 17 00:46:02.617687 kernel: pci 5bee:00:02.0: enabling Extended Tags May 17 00:46:02.617782 kernel: pci 5bee:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at 5bee:00:02.0 (capable of 126.016 Gb/s with 8.0 GT/s PCIe x16 link) May 17 00:46:02.617862 kernel: pci_bus 5bee:00: busn_res: [bus 00-ff] end is updated to 00 May 17 00:46:02.617945 kernel: pci 5bee:00:02.0: BAR 0: assigned [mem 0xfc0000000-0xfc00fffff 64bit pref] May 17 00:46:02.656638 kernel: mlx5_core 5bee:00:02.0: firmware version: 16.30.1284 May 17 00:46:02.879424 kernel: mlx5_core 5bee:00:02.0: MLX5E: StrdRq(1) RqSz(8) StrdSz(2048) RxCqeCmprss(0) May 17 00:46:02.879542 kernel: hv_netvsc 002248bc-82d6-0022-48bc-82d6002248bc eth0: VF registering: eth1 May 17 00:46:02.879657 kernel: mlx5_core 5bee:00:02.0 eth1: joined to eth0 May 17 00:46:02.888639 kernel: mlx5_core 5bee:00:02.0 enP23534s1: renamed from eth1 May 17 00:46:02.966293 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 17 00:46:02.988640 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (539) May 17 00:46:03.002482 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 17 00:46:03.110461 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 17 00:46:03.116708 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 17 00:46:03.132787 systemd[1]: Starting disk-uuid.service... May 17 00:46:03.158420 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 17 00:46:03.167516 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 17 00:46:04.186641 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 17 00:46:04.187315 disk-uuid[604]: The operation has completed successfully. May 17 00:46:04.246965 systemd[1]: disk-uuid.service: Deactivated successfully. May 17 00:46:04.251780 systemd[1]: Finished disk-uuid.service. May 17 00:46:04.256000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:04.256000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:04.261056 systemd[1]: Starting verity-setup.service... May 17 00:46:04.303658 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" May 17 00:46:04.506127 systemd[1]: Found device dev-mapper-usr.device. May 17 00:46:04.517150 systemd[1]: Finished verity-setup.service. May 17 00:46:04.521000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:04.523189 systemd[1]: Mounting sysusr-usr.mount... May 17 00:46:04.585648 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 17 00:46:04.585447 systemd[1]: Mounted sysusr-usr.mount. May 17 00:46:04.589702 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 17 00:46:04.590542 systemd[1]: Starting ignition-setup.service... May 17 00:46:04.598177 systemd[1]: Starting parse-ip-for-networkd.service... May 17 00:46:04.640796 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm May 17 00:46:04.640821 kernel: BTRFS info (device sda6): using free space tree May 17 00:46:04.640830 kernel: BTRFS info (device sda6): has skinny extents May 17 00:46:04.704924 systemd[1]: Finished parse-ip-for-networkd.service. May 17 00:46:04.709000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:04.713000 audit: BPF prog-id=9 op=LOAD May 17 00:46:04.715081 systemd[1]: Starting systemd-networkd.service... May 17 00:46:04.735093 systemd[1]: mnt-oem.mount: Deactivated successfully. May 17 00:46:04.743827 systemd-networkd[845]: lo: Link UP May 17 00:46:04.746662 systemd-networkd[845]: lo: Gained carrier May 17 00:46:04.751000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:04.747514 systemd-networkd[845]: Enumeration completed May 17 00:46:04.747634 systemd[1]: Started systemd-networkd.service. May 17 00:46:04.752514 systemd[1]: Reached target network.target. May 17 00:46:04.782000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:04.756770 systemd-networkd[845]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 17 00:46:04.762990 systemd[1]: Starting iscsiuio.service... May 17 00:46:04.802600 iscsid[854]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 17 00:46:04.802600 iscsid[854]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log May 17 00:46:04.802600 iscsid[854]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 17 00:46:04.802600 iscsid[854]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 17 00:46:04.802600 iscsid[854]: If using hardware iscsi like qla4xxx this message can be ignored. May 17 00:46:04.802600 iscsid[854]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 17 00:46:04.802600 iscsid[854]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 17 00:46:04.806000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:04.877000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:04.778067 systemd[1]: Started iscsiuio.service. May 17 00:46:04.783375 systemd[1]: Starting iscsid.service... May 17 00:46:04.798832 systemd[1]: Started iscsid.service. May 17 00:46:04.807672 systemd[1]: Starting dracut-initqueue.service... May 17 00:46:04.866082 systemd[1]: Finished dracut-initqueue.service. May 17 00:46:04.931000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:04.878263 systemd[1]: Reached target remote-fs-pre.target. May 17 00:46:04.890721 systemd[1]: Reached target remote-cryptsetup.target. May 17 00:46:04.899664 systemd[1]: Reached target remote-fs.target. May 17 00:46:04.955000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:04.909053 systemd[1]: Starting dracut-pre-mount.service... May 17 00:46:04.922342 systemd[1]: Finished ignition-setup.service. May 17 00:46:04.933674 systemd[1]: Starting ignition-fetch-offline.service... May 17 00:46:04.979598 kernel: mlx5_core 5bee:00:02.0 enP23534s1: Link up May 17 00:46:04.947021 systemd[1]: Finished dracut-pre-mount.service. May 17 00:46:05.019631 kernel: hv_netvsc 002248bc-82d6-0022-48bc-82d6002248bc eth0: Data path switched to VF: enP23534s1 May 17 00:46:05.019875 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:46:05.020253 systemd-networkd[845]: enP23534s1: Link UP May 17 00:46:05.020354 systemd-networkd[845]: eth0: Link UP May 17 00:46:05.020492 systemd-networkd[845]: eth0: Gained carrier May 17 00:46:05.028789 systemd-networkd[845]: enP23534s1: Gained carrier May 17 00:46:05.043699 systemd-networkd[845]: eth0: DHCPv4 address 10.200.20.42/24, gateway 10.200.20.1 acquired from 168.63.129.16 May 17 00:46:06.256734 systemd-networkd[845]: eth0: Gained IPv6LL May 17 00:46:07.739739 ignition[869]: Ignition 2.14.0 May 17 00:46:07.739751 ignition[869]: Stage: fetch-offline May 17 00:46:07.739806 ignition[869]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:46:07.739831 ignition[869]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 17 00:46:07.799480 ignition[869]: no config dir at "/usr/lib/ignition/base.platform.d/azure" May 17 00:46:07.799610 ignition[869]: parsed url from cmdline: "" May 17 00:46:07.806073 systemd[1]: Finished ignition-fetch-offline.service. May 17 00:46:07.837929 kernel: kauditd_printk_skb: 18 callbacks suppressed May 17 00:46:07.837952 kernel: audit: type=1130 audit(1747442767.811:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:07.811000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:07.799613 ignition[869]: no config URL provided May 17 00:46:07.812635 systemd[1]: Starting ignition-fetch.service... May 17 00:46:07.799641 ignition[869]: reading system config file "/usr/lib/ignition/user.ign" May 17 00:46:07.799650 ignition[869]: no config at "/usr/lib/ignition/user.ign" May 17 00:46:07.799655 ignition[869]: failed to fetch config: resource requires networking May 17 00:46:07.799885 ignition[869]: Ignition finished successfully May 17 00:46:07.833689 ignition[875]: Ignition 2.14.0 May 17 00:46:07.833696 ignition[875]: Stage: fetch May 17 00:46:07.833808 ignition[875]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:46:07.833834 ignition[875]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 17 00:46:07.836799 ignition[875]: no config dir at "/usr/lib/ignition/base.platform.d/azure" May 17 00:46:07.836987 ignition[875]: parsed url from cmdline: "" May 17 00:46:07.836993 ignition[875]: no config URL provided May 17 00:46:07.836999 ignition[875]: reading system config file "/usr/lib/ignition/user.ign" May 17 00:46:07.837010 ignition[875]: no config at "/usr/lib/ignition/user.ign" May 17 00:46:07.837037 ignition[875]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 May 17 00:46:07.931169 ignition[875]: GET result: OK May 17 00:46:07.931287 ignition[875]: config has been read from IMDS userdata May 17 00:46:07.931342 ignition[875]: parsing config with SHA512: 85fb12e1a2395bafc8ae1f81ddf296f21c90041212ea0124e86a4001c74af6392b5ef8964e6fd9602c7830879ea042e30f42eafb1e38f191fa9a834e58d3aa3c May 17 00:46:07.934956 unknown[875]: fetched base config from "system" May 17 00:46:07.935492 ignition[875]: fetch: fetch complete May 17 00:46:07.950000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:07.934963 unknown[875]: fetched base config from "system" May 17 00:46:07.935497 ignition[875]: fetch: fetch passed May 17 00:46:07.934980 unknown[875]: fetched user config from "azure" May 17 00:46:07.985258 kernel: audit: type=1130 audit(1747442767.950:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:07.935539 ignition[875]: Ignition finished successfully May 17 00:46:07.941048 systemd[1]: Finished ignition-fetch.service. May 17 00:46:07.981090 ignition[881]: Ignition 2.14.0 May 17 00:46:08.023337 kernel: audit: type=1130 audit(1747442767.993:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:07.993000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:07.968840 systemd[1]: Starting ignition-kargs.service... May 17 00:46:07.981096 ignition[881]: Stage: kargs May 17 00:46:07.989506 systemd[1]: Finished ignition-kargs.service. May 17 00:46:07.981201 ignition[881]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:46:08.040000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:07.994947 systemd[1]: Starting ignition-disks.service... May 17 00:46:08.072592 kernel: audit: type=1130 audit(1747442768.040:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:07.981222 ignition[881]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 17 00:46:08.036060 systemd[1]: Finished ignition-disks.service. May 17 00:46:07.984045 ignition[881]: no config dir at "/usr/lib/ignition/base.platform.d/azure" May 17 00:46:08.061888 systemd[1]: Reached target initrd-root-device.target. May 17 00:46:07.986264 ignition[881]: kargs: kargs passed May 17 00:46:08.068515 systemd[1]: Reached target local-fs-pre.target. May 17 00:46:07.986320 ignition[881]: Ignition finished successfully May 17 00:46:08.077141 systemd[1]: Reached target local-fs.target. May 17 00:46:08.009766 ignition[887]: Ignition 2.14.0 May 17 00:46:08.085320 systemd[1]: Reached target sysinit.target. May 17 00:46:08.009772 ignition[887]: Stage: disks May 17 00:46:08.095433 systemd[1]: Reached target basic.target. May 17 00:46:08.009873 ignition[887]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:46:08.104879 systemd[1]: Starting systemd-fsck-root.service... May 17 00:46:08.009893 ignition[887]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 17 00:46:08.027110 ignition[887]: no config dir at "/usr/lib/ignition/base.platform.d/azure" May 17 00:46:08.035095 ignition[887]: disks: disks passed May 17 00:46:08.035163 ignition[887]: Ignition finished successfully May 17 00:46:08.172789 systemd-fsck[895]: ROOT: clean, 619/7326000 files, 481078/7359488 blocks May 17 00:46:08.184049 systemd[1]: Finished systemd-fsck-root.service. May 17 00:46:08.213078 kernel: audit: type=1130 audit(1747442768.188:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:08.188000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:08.189868 systemd[1]: Mounting sysroot.mount... May 17 00:46:08.235381 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 17 00:46:08.231524 systemd[1]: Mounted sysroot.mount. May 17 00:46:08.235718 systemd[1]: Reached target initrd-root-fs.target. May 17 00:46:08.273070 systemd[1]: Mounting sysroot-usr.mount... May 17 00:46:08.277725 systemd[1]: Starting flatcar-metadata-hostname.service... May 17 00:46:08.285535 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 17 00:46:08.285570 systemd[1]: Reached target ignition-diskful.target. May 17 00:46:08.291533 systemd[1]: Mounted sysroot-usr.mount. May 17 00:46:08.342977 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 17 00:46:08.348461 systemd[1]: Starting initrd-setup-root.service... May 17 00:46:08.375685 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (906) May 17 00:46:08.382547 initrd-setup-root[911]: cut: /sysroot/etc/passwd: No such file or directory May 17 00:46:08.398712 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm May 17 00:46:08.398735 kernel: BTRFS info (device sda6): using free space tree May 17 00:46:08.398744 kernel: BTRFS info (device sda6): has skinny extents May 17 00:46:08.403294 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 17 00:46:08.416165 initrd-setup-root[937]: cut: /sysroot/etc/group: No such file or directory May 17 00:46:08.440733 initrd-setup-root[945]: cut: /sysroot/etc/shadow: No such file or directory May 17 00:46:08.450366 initrd-setup-root[953]: cut: /sysroot/etc/gshadow: No such file or directory May 17 00:46:08.886852 systemd[1]: Finished initrd-setup-root.service. May 17 00:46:08.891000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:08.892594 systemd[1]: Starting ignition-mount.service... May 17 00:46:08.924359 kernel: audit: type=1130 audit(1747442768.891:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:08.915735 systemd[1]: Starting sysroot-boot.service... May 17 00:46:08.922357 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. May 17 00:46:08.922476 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. May 17 00:46:08.949437 ignition[973]: INFO : Ignition 2.14.0 May 17 00:46:08.949437 ignition[973]: INFO : Stage: mount May 17 00:46:08.959786 ignition[973]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:46:08.959786 ignition[973]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 17 00:46:08.959786 ignition[973]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" May 17 00:46:08.959786 ignition[973]: INFO : mount: mount passed May 17 00:46:08.959786 ignition[973]: INFO : Ignition finished successfully May 17 00:46:09.020913 kernel: audit: type=1130 audit(1747442768.963:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:08.963000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:08.959682 systemd[1]: Finished ignition-mount.service. May 17 00:46:09.025000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:09.020708 systemd[1]: Finished sysroot-boot.service. May 17 00:46:09.050688 kernel: audit: type=1130 audit(1747442769.025:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:09.560870 coreos-metadata[905]: May 17 00:46:09.560 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 May 17 00:46:09.570935 coreos-metadata[905]: May 17 00:46:09.570 INFO Fetch successful May 17 00:46:09.604254 coreos-metadata[905]: May 17 00:46:09.604 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 May 17 00:46:09.628295 coreos-metadata[905]: May 17 00:46:09.628 INFO Fetch successful May 17 00:46:09.644978 coreos-metadata[905]: May 17 00:46:09.644 INFO wrote hostname ci-3510.3.7-n-6523ff94dd to /sysroot/etc/hostname May 17 00:46:09.654376 systemd[1]: Finished flatcar-metadata-hostname.service. May 17 00:46:09.659000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:09.660544 systemd[1]: Starting ignition-files.service... May 17 00:46:09.687992 kernel: audit: type=1130 audit(1747442769.659:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:09.687009 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 17 00:46:09.704639 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (984) May 17 00:46:09.704672 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm May 17 00:46:09.716270 kernel: BTRFS info (device sda6): using free space tree May 17 00:46:09.721074 kernel: BTRFS info (device sda6): has skinny extents May 17 00:46:09.726170 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 17 00:46:09.741083 ignition[1003]: INFO : Ignition 2.14.0 May 17 00:46:09.745370 ignition[1003]: INFO : Stage: files May 17 00:46:09.745370 ignition[1003]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:46:09.745370 ignition[1003]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 17 00:46:09.770000 ignition[1003]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" May 17 00:46:09.770000 ignition[1003]: DEBUG : files: compiled without relabeling support, skipping May 17 00:46:09.770000 ignition[1003]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 17 00:46:09.770000 ignition[1003]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 17 00:46:09.826882 ignition[1003]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 17 00:46:09.834529 ignition[1003]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 17 00:46:09.841876 ignition[1003]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 17 00:46:09.841785 unknown[1003]: wrote ssh authorized keys file for user: core May 17 00:46:09.854409 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" May 17 00:46:09.854409 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-arm64.tar.gz: attempt #1 May 17 00:46:09.929815 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK May 17 00:46:10.135803 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" May 17 00:46:10.135803 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" May 17 00:46:10.160989 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" May 17 00:46:10.160989 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" May 17 00:46:10.160989 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" May 17 00:46:10.160989 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" May 17 00:46:10.160989 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" May 17 00:46:10.160989 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" May 17 00:46:10.160989 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" May 17 00:46:10.160989 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" May 17 00:46:10.160989 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 17 00:46:10.160989 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.8-arm64.raw" May 17 00:46:10.160989 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.8-arm64.raw" May 17 00:46:10.160989 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/waagent.service" May 17 00:46:10.160989 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition May 17 00:46:10.320077 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3423159664" May 17 00:46:10.320077 ignition[1003]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3423159664": device or resource busy May 17 00:46:10.320077 ignition[1003]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3423159664", trying btrfs: device or resource busy May 17 00:46:10.320077 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3423159664" May 17 00:46:10.320077 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3423159664" May 17 00:46:10.320077 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem3423159664" May 17 00:46:10.320077 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem3423159664" May 17 00:46:10.320077 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" May 17 00:46:10.320077 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" May 17 00:46:10.320077 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(e): oem config not found in "/usr/share/oem", looking on oem partition May 17 00:46:10.320077 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(f): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3411423275" May 17 00:46:10.320077 ignition[1003]: CRITICAL : files: createFilesystemsFiles: createFiles: op(e): op(f): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3411423275": device or resource busy May 17 00:46:10.320077 ignition[1003]: ERROR : files: createFilesystemsFiles: createFiles: op(e): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3411423275", trying btrfs: device or resource busy May 17 00:46:10.320077 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3411423275" May 17 00:46:10.176496 systemd[1]: mnt-oem3423159664.mount: Deactivated successfully. May 17 00:46:10.494833 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3411423275" May 17 00:46:10.494833 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [started] unmounting "/mnt/oem3411423275" May 17 00:46:10.494833 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [finished] unmounting "/mnt/oem3411423275" May 17 00:46:10.494833 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" May 17 00:46:10.494833 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(12): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.8-arm64.raw" May 17 00:46:10.494833 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(12): GET https://extensions.flatcar.org/extensions/kubernetes-v1.31.8-arm64.raw: attempt #1 May 17 00:46:10.985543 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(12): GET result: OK May 17 00:46:11.234641 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(12): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.8-arm64.raw" May 17 00:46:11.234641 ignition[1003]: INFO : files: op(13): [started] processing unit "waagent.service" May 17 00:46:11.234641 ignition[1003]: INFO : files: op(13): [finished] processing unit "waagent.service" May 17 00:46:11.234641 ignition[1003]: INFO : files: op(14): [started] processing unit "nvidia.service" May 17 00:46:11.234641 ignition[1003]: INFO : files: op(14): [finished] processing unit "nvidia.service" May 17 00:46:11.234641 ignition[1003]: INFO : files: op(15): [started] processing unit "prepare-helm.service" May 17 00:46:11.234641 ignition[1003]: INFO : files: op(15): op(16): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 17 00:46:11.234641 ignition[1003]: INFO : files: op(15): op(16): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 17 00:46:11.234641 ignition[1003]: INFO : files: op(15): [finished] processing unit "prepare-helm.service" May 17 00:46:11.234641 ignition[1003]: INFO : files: op(17): [started] setting preset to enabled for "waagent.service" May 17 00:46:11.234641 ignition[1003]: INFO : files: op(17): [finished] setting preset to enabled for "waagent.service" May 17 00:46:11.234641 ignition[1003]: INFO : files: op(18): [started] setting preset to enabled for "nvidia.service" May 17 00:46:11.234641 ignition[1003]: INFO : files: op(18): [finished] setting preset to enabled for "nvidia.service" May 17 00:46:11.234641 ignition[1003]: INFO : files: op(19): [started] setting preset to enabled for "prepare-helm.service" May 17 00:46:11.234641 ignition[1003]: INFO : files: op(19): [finished] setting preset to enabled for "prepare-helm.service" May 17 00:46:11.234641 ignition[1003]: INFO : files: createResultFile: createFiles: op(1a): [started] writing file "/sysroot/etc/.ignition-result.json" May 17 00:46:11.234641 ignition[1003]: INFO : files: createResultFile: createFiles: op(1a): [finished] writing file "/sysroot/etc/.ignition-result.json" May 17 00:46:11.234641 ignition[1003]: INFO : files: files passed May 17 00:46:11.234641 ignition[1003]: INFO : Ignition finished successfully May 17 00:46:11.469498 kernel: audit: type=1130 audit(1747442771.251:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:11.251000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:11.335000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:11.335000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:11.352000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:11.407000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:11.407000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:11.246986 systemd[1]: Finished ignition-files.service. May 17 00:46:11.277257 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 17 00:46:11.289850 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 17 00:46:11.485000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:11.501400 initrd-setup-root-after-ignition[1028]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 17 00:46:11.290750 systemd[1]: Starting ignition-quench.service... May 17 00:46:11.313968 systemd[1]: ignition-quench.service: Deactivated successfully. May 17 00:46:11.314150 systemd[1]: Finished ignition-quench.service. May 17 00:46:11.336665 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 17 00:46:11.353263 systemd[1]: Reached target ignition-complete.target. May 17 00:46:11.548000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:11.372413 systemd[1]: Starting initrd-parse-etc.service... May 17 00:46:11.398887 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 17 00:46:11.398995 systemd[1]: Finished initrd-parse-etc.service. May 17 00:46:11.408437 systemd[1]: Reached target initrd-fs.target. May 17 00:46:11.420691 systemd[1]: Reached target initrd.target. May 17 00:46:11.433429 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 17 00:46:11.434344 systemd[1]: Starting dracut-pre-pivot.service... May 17 00:46:11.475440 systemd[1]: Finished dracut-pre-pivot.service. May 17 00:46:11.486384 systemd[1]: Starting initrd-cleanup.service... May 17 00:46:11.513050 systemd[1]: Stopped target nss-lookup.target. May 17 00:46:11.520601 systemd[1]: Stopped target remote-cryptsetup.target. May 17 00:46:11.530760 systemd[1]: Stopped target timers.target. May 17 00:46:11.665000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:11.539330 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 17 00:46:11.539443 systemd[1]: Stopped dracut-pre-pivot.service. May 17 00:46:11.683000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:11.549398 systemd[1]: Stopped target initrd.target. May 17 00:46:11.693000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:11.557995 systemd[1]: Stopped target basic.target. May 17 00:46:11.701000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:11.566512 systemd[1]: Stopped target ignition-complete.target. May 17 00:46:11.711000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:11.576726 systemd[1]: Stopped target ignition-diskful.target. May 17 00:46:11.732893 iscsid[854]: iscsid shutting down. May 17 00:46:11.585683 systemd[1]: Stopped target initrd-root-device.target. May 17 00:46:11.754287 ignition[1041]: INFO : Ignition 2.14.0 May 17 00:46:11.754287 ignition[1041]: INFO : Stage: umount May 17 00:46:11.754287 ignition[1041]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:46:11.754287 ignition[1041]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 17 00:46:11.754287 ignition[1041]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" May 17 00:46:11.759000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:11.765000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:11.776000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:11.786000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:11.813000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:11.594555 systemd[1]: Stopped target remote-fs.target. May 17 00:46:11.826213 ignition[1041]: INFO : umount: umount passed May 17 00:46:11.826213 ignition[1041]: INFO : Ignition finished successfully May 17 00:46:11.830000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:11.602803 systemd[1]: Stopped target remote-fs-pre.target. May 17 00:46:11.845000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:11.620485 systemd[1]: Stopped target sysinit.target. May 17 00:46:11.856000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:11.629221 systemd[1]: Stopped target local-fs.target. May 17 00:46:11.638032 systemd[1]: Stopped target local-fs-pre.target. May 17 00:46:11.647517 systemd[1]: Stopped target swap.target. May 17 00:46:11.655921 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 17 00:46:11.656085 systemd[1]: Stopped dracut-pre-mount.service. May 17 00:46:11.665537 systemd[1]: Stopped target cryptsetup.target. May 17 00:46:11.673801 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 17 00:46:11.917000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:11.673956 systemd[1]: Stopped dracut-initqueue.service. May 17 00:46:11.684155 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 17 00:46:11.936000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:11.684303 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 17 00:46:11.693916 systemd[1]: ignition-files.service: Deactivated successfully. May 17 00:46:11.952000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:11.952000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:11.694059 systemd[1]: Stopped ignition-files.service. May 17 00:46:11.702438 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. May 17 00:46:11.702661 systemd[1]: Stopped flatcar-metadata-hostname.service. May 17 00:46:11.713082 systemd[1]: Stopping ignition-mount.service... May 17 00:46:11.721917 systemd[1]: Stopping iscsid.service... May 17 00:46:11.739037 systemd[1]: Stopping sysroot-boot.service... May 17 00:46:12.005000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:11.749731 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 17 00:46:12.016000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:12.016000 audit: BPF prog-id=6 op=UNLOAD May 17 00:46:11.749947 systemd[1]: Stopped systemd-udev-trigger.service. May 17 00:46:11.760400 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 17 00:46:11.760556 systemd[1]: Stopped dracut-pre-trigger.service. May 17 00:46:11.768484 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 17 00:46:12.056000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:11.769279 systemd[1]: iscsid.service: Deactivated successfully. May 17 00:46:12.065000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:11.769394 systemd[1]: Stopped iscsid.service. May 17 00:46:12.075000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:11.777412 systemd[1]: ignition-mount.service: Deactivated successfully. May 17 00:46:11.777508 systemd[1]: Stopped ignition-mount.service. May 17 00:46:12.095000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:11.786891 systemd[1]: ignition-disks.service: Deactivated successfully. May 17 00:46:12.104000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:11.787011 systemd[1]: Stopped ignition-disks.service. May 17 00:46:11.814226 systemd[1]: ignition-kargs.service: Deactivated successfully. May 17 00:46:12.127000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:11.814385 systemd[1]: Stopped ignition-kargs.service. May 17 00:46:12.139000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:11.830896 systemd[1]: ignition-fetch.service: Deactivated successfully. May 17 00:46:12.149000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:11.831043 systemd[1]: Stopped ignition-fetch.service. May 17 00:46:12.173885 kernel: hv_netvsc 002248bc-82d6-0022-48bc-82d6002248bc eth0: Data path switched from VF: enP23534s1 May 17 00:46:12.158000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:11.846476 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 17 00:46:11.846657 systemd[1]: Stopped ignition-fetch-offline.service. May 17 00:46:12.190000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:11.857438 systemd[1]: Stopped target paths.target. May 17 00:46:12.200000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:11.865850 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 17 00:46:12.209000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:11.874043 systemd[1]: Stopped systemd-ask-password-console.path. May 17 00:46:12.220000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:12.220000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:11.881836 systemd[1]: Stopped target slices.target. May 17 00:46:11.891922 systemd[1]: Stopped target sockets.target. May 17 00:46:11.901669 systemd[1]: iscsid.socket: Deactivated successfully. May 17 00:46:11.901815 systemd[1]: Closed iscsid.socket. May 17 00:46:11.909900 systemd[1]: ignition-setup.service: Deactivated successfully. May 17 00:46:11.910034 systemd[1]: Stopped ignition-setup.service. May 17 00:46:11.919091 systemd[1]: Stopping iscsiuio.service... May 17 00:46:11.929131 systemd[1]: iscsiuio.service: Deactivated successfully. May 17 00:46:11.929229 systemd[1]: Stopped iscsiuio.service. May 17 00:46:12.265000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:11.937842 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 17 00:46:11.937932 systemd[1]: Finished initrd-cleanup.service. May 17 00:46:11.954140 systemd[1]: Stopped target network.target. May 17 00:46:11.962831 systemd[1]: iscsiuio.socket: Deactivated successfully. May 17 00:46:11.962870 systemd[1]: Closed iscsiuio.socket. May 17 00:46:11.970697 systemd[1]: Stopping systemd-networkd.service... May 17 00:46:11.981676 systemd[1]: Stopping systemd-resolved.service... May 17 00:46:11.995634 systemd-networkd[845]: eth0: DHCPv6 lease lost May 17 00:46:12.308000 audit: BPF prog-id=9 op=UNLOAD May 17 00:46:11.997375 systemd[1]: systemd-networkd.service: Deactivated successfully. May 17 00:46:12.325697 systemd-journald[276]: Received SIGTERM from PID 1 (systemd). May 17 00:46:11.997512 systemd[1]: Stopped systemd-networkd.service. May 17 00:46:12.006662 systemd[1]: systemd-resolved.service: Deactivated successfully. May 17 00:46:12.006805 systemd[1]: Stopped systemd-resolved.service. May 17 00:46:12.017145 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 17 00:46:12.017188 systemd[1]: Closed systemd-networkd.socket. May 17 00:46:12.035299 systemd[1]: Stopping network-cleanup.service... May 17 00:46:12.047114 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 17 00:46:12.047208 systemd[1]: Stopped parse-ip-for-networkd.service. May 17 00:46:12.056955 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 17 00:46:12.057016 systemd[1]: Stopped systemd-sysctl.service. May 17 00:46:12.071251 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 17 00:46:12.071307 systemd[1]: Stopped systemd-modules-load.service. May 17 00:46:12.077227 systemd[1]: Stopping systemd-udevd.service... May 17 00:46:12.087364 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 17 00:46:12.087985 systemd[1]: systemd-udevd.service: Deactivated successfully. May 17 00:46:12.088119 systemd[1]: Stopped systemd-udevd.service. May 17 00:46:12.096633 systemd[1]: sysroot-boot.service: Deactivated successfully. May 17 00:46:12.096724 systemd[1]: Stopped sysroot-boot.service. May 17 00:46:12.105642 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 17 00:46:12.105700 systemd[1]: Closed systemd-udevd-control.socket. May 17 00:46:12.114923 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 17 00:46:12.114958 systemd[1]: Closed systemd-udevd-kernel.socket. May 17 00:46:12.119745 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 17 00:46:12.119818 systemd[1]: Stopped dracut-pre-udev.service. May 17 00:46:12.128359 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 17 00:46:12.128413 systemd[1]: Stopped dracut-cmdline.service. May 17 00:46:12.139741 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 17 00:46:12.139788 systemd[1]: Stopped dracut-cmdline-ask.service. May 17 00:46:12.149384 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 17 00:46:12.149435 systemd[1]: Stopped initrd-setup-root.service. May 17 00:46:12.167441 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 17 00:46:12.179291 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. May 17 00:46:12.179377 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. May 17 00:46:12.195675 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 17 00:46:12.195739 systemd[1]: Stopped kmod-static-nodes.service. May 17 00:46:12.201088 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 17 00:46:12.201134 systemd[1]: Stopped systemd-vconsole-setup.service. May 17 00:46:12.210792 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. May 17 00:46:12.211290 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 17 00:46:12.211386 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 17 00:46:12.257155 systemd[1]: network-cleanup.service: Deactivated successfully. May 17 00:46:12.257266 systemd[1]: Stopped network-cleanup.service. May 17 00:46:12.266299 systemd[1]: Reached target initrd-switch-root.target. May 17 00:46:12.275485 systemd[1]: Starting initrd-switch-root.service... May 17 00:46:12.295462 systemd[1]: Switching root. May 17 00:46:12.326880 systemd-journald[276]: Journal stopped May 17 00:46:23.375304 kernel: SELinux: Class mctp_socket not defined in policy. May 17 00:46:23.375325 kernel: SELinux: Class anon_inode not defined in policy. May 17 00:46:23.375335 kernel: SELinux: the above unknown classes and permissions will be allowed May 17 00:46:23.375346 kernel: SELinux: policy capability network_peer_controls=1 May 17 00:46:23.375354 kernel: SELinux: policy capability open_perms=1 May 17 00:46:23.375362 kernel: SELinux: policy capability extended_socket_class=1 May 17 00:46:23.375371 kernel: SELinux: policy capability always_check_network=0 May 17 00:46:23.375379 kernel: SELinux: policy capability cgroup_seclabel=1 May 17 00:46:23.375387 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 17 00:46:23.375395 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 17 00:46:23.375403 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 17 00:46:23.375412 kernel: kauditd_printk_skb: 43 callbacks suppressed May 17 00:46:23.375421 kernel: audit: type=1403 audit(1747442774.495:82): auid=4294967295 ses=4294967295 lsm=selinux res=1 May 17 00:46:23.375431 systemd[1]: Successfully loaded SELinux policy in 275.975ms. May 17 00:46:23.375442 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 24.509ms. May 17 00:46:23.375454 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 17 00:46:23.375464 systemd[1]: Detected virtualization microsoft. May 17 00:46:23.375472 systemd[1]: Detected architecture arm64. May 17 00:46:23.375481 systemd[1]: Detected first boot. May 17 00:46:23.375490 systemd[1]: Hostname set to . May 17 00:46:23.375500 systemd[1]: Initializing machine ID from random generator. May 17 00:46:23.375509 kernel: audit: type=1400 audit(1747442775.272:83): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 17 00:46:23.375521 kernel: audit: type=1400 audit(1747442775.272:84): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 17 00:46:23.375530 kernel: audit: type=1334 audit(1747442775.290:85): prog-id=10 op=LOAD May 17 00:46:23.375540 kernel: audit: type=1334 audit(1747442775.290:86): prog-id=10 op=UNLOAD May 17 00:46:23.375548 kernel: audit: type=1334 audit(1747442775.307:87): prog-id=11 op=LOAD May 17 00:46:23.375556 kernel: audit: type=1334 audit(1747442775.307:88): prog-id=11 op=UNLOAD May 17 00:46:23.375565 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 17 00:46:23.375575 kernel: audit: type=1400 audit(1747442776.534:89): avc: denied { associate } for pid=1075 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 17 00:46:23.375586 kernel: audit: type=1300 audit(1747442776.534:89): arch=c00000b7 syscall=5 success=yes exit=0 a0=40000222fc a1=40000283d8 a2=4000026840 a3=32 items=0 ppid=1058 pid=1075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:46:23.375596 kernel: audit: type=1327 audit(1747442776.534:89): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 17 00:46:23.375605 systemd[1]: Populated /etc with preset unit settings. May 17 00:46:23.375646 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:46:23.375659 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:46:23.375670 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:46:23.375681 kernel: kauditd_printk_skb: 6 callbacks suppressed May 17 00:46:23.375690 kernel: audit: type=1334 audit(1747442782.698:91): prog-id=12 op=LOAD May 17 00:46:23.375698 kernel: audit: type=1334 audit(1747442782.698:92): prog-id=3 op=UNLOAD May 17 00:46:23.375707 kernel: audit: type=1334 audit(1747442782.703:93): prog-id=13 op=LOAD May 17 00:46:23.375715 kernel: audit: type=1334 audit(1747442782.709:94): prog-id=14 op=LOAD May 17 00:46:23.375726 kernel: audit: type=1334 audit(1747442782.709:95): prog-id=4 op=UNLOAD May 17 00:46:23.375735 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 17 00:46:23.375744 kernel: audit: type=1334 audit(1747442782.709:96): prog-id=5 op=UNLOAD May 17 00:46:23.375752 kernel: audit: type=1334 audit(1747442782.715:97): prog-id=15 op=LOAD May 17 00:46:23.375762 kernel: audit: type=1334 audit(1747442782.716:98): prog-id=12 op=UNLOAD May 17 00:46:23.375773 systemd[1]: Stopped initrd-switch-root.service. May 17 00:46:23.375782 kernel: audit: type=1334 audit(1747442782.721:99): prog-id=16 op=LOAD May 17 00:46:23.375791 kernel: audit: type=1334 audit(1747442782.727:100): prog-id=17 op=LOAD May 17 00:46:23.375800 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 17 00:46:23.375809 systemd[1]: Created slice system-addon\x2dconfig.slice. May 17 00:46:23.375819 systemd[1]: Created slice system-addon\x2drun.slice. May 17 00:46:23.375829 systemd[1]: Created slice system-getty.slice. May 17 00:46:23.375839 systemd[1]: Created slice system-modprobe.slice. May 17 00:46:23.375848 systemd[1]: Created slice system-serial\x2dgetty.slice. May 17 00:46:23.375858 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 17 00:46:23.375867 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 17 00:46:23.375876 systemd[1]: Created slice user.slice. May 17 00:46:23.375885 systemd[1]: Started systemd-ask-password-console.path. May 17 00:46:23.375894 systemd[1]: Started systemd-ask-password-wall.path. May 17 00:46:23.375906 systemd[1]: Set up automount boot.automount. May 17 00:46:23.375917 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 17 00:46:23.375927 systemd[1]: Stopped target initrd-switch-root.target. May 17 00:46:23.375936 systemd[1]: Stopped target initrd-fs.target. May 17 00:46:23.375945 systemd[1]: Stopped target initrd-root-fs.target. May 17 00:46:23.375954 systemd[1]: Reached target integritysetup.target. May 17 00:46:23.375964 systemd[1]: Reached target remote-cryptsetup.target. May 17 00:46:23.375974 systemd[1]: Reached target remote-fs.target. May 17 00:46:23.375983 systemd[1]: Reached target slices.target. May 17 00:46:23.375994 systemd[1]: Reached target swap.target. May 17 00:46:23.376003 systemd[1]: Reached target torcx.target. May 17 00:46:23.376012 systemd[1]: Reached target veritysetup.target. May 17 00:46:23.376021 systemd[1]: Listening on systemd-coredump.socket. May 17 00:46:23.376031 systemd[1]: Listening on systemd-initctl.socket. May 17 00:46:23.376040 systemd[1]: Listening on systemd-networkd.socket. May 17 00:46:23.376051 systemd[1]: Listening on systemd-udevd-control.socket. May 17 00:46:23.376060 systemd[1]: Listening on systemd-udevd-kernel.socket. May 17 00:46:23.376070 systemd[1]: Listening on systemd-userdbd.socket. May 17 00:46:23.376079 systemd[1]: Mounting dev-hugepages.mount... May 17 00:46:23.376089 systemd[1]: Mounting dev-mqueue.mount... May 17 00:46:23.376098 systemd[1]: Mounting media.mount... May 17 00:46:23.376107 systemd[1]: Mounting sys-kernel-debug.mount... May 17 00:46:23.376117 systemd[1]: Mounting sys-kernel-tracing.mount... May 17 00:46:23.376127 systemd[1]: Mounting tmp.mount... May 17 00:46:23.376136 systemd[1]: Starting flatcar-tmpfiles.service... May 17 00:46:23.376146 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:46:23.376155 systemd[1]: Starting kmod-static-nodes.service... May 17 00:46:23.376165 systemd[1]: Starting modprobe@configfs.service... May 17 00:46:23.376175 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:46:23.376185 systemd[1]: Starting modprobe@drm.service... May 17 00:46:23.376194 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:46:23.376203 systemd[1]: Starting modprobe@fuse.service... May 17 00:46:23.376214 systemd[1]: Starting modprobe@loop.service... May 17 00:46:23.376224 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 17 00:46:23.376233 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 17 00:46:23.376243 systemd[1]: Stopped systemd-fsck-root.service. May 17 00:46:23.376253 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 17 00:46:23.376262 systemd[1]: Stopped systemd-fsck-usr.service. May 17 00:46:23.376271 systemd[1]: Stopped systemd-journald.service. May 17 00:46:23.376280 kernel: loop: module loaded May 17 00:46:23.376290 systemd[1]: systemd-journald.service: Consumed 3.006s CPU time. May 17 00:46:23.376300 systemd[1]: Starting systemd-journald.service... May 17 00:46:23.376309 kernel: fuse: init (API version 7.34) May 17 00:46:23.376318 systemd[1]: Starting systemd-modules-load.service... May 17 00:46:23.376327 systemd[1]: Starting systemd-network-generator.service... May 17 00:46:23.376337 systemd[1]: Starting systemd-remount-fs.service... May 17 00:46:23.376346 systemd[1]: Starting systemd-udev-trigger.service... May 17 00:46:23.376356 systemd[1]: verity-setup.service: Deactivated successfully. May 17 00:46:23.376365 systemd[1]: Stopped verity-setup.service. May 17 00:46:23.376377 systemd[1]: Mounted dev-hugepages.mount. May 17 00:46:23.376390 systemd-journald[1181]: Journal started May 17 00:46:23.376430 systemd-journald[1181]: Runtime Journal (/run/log/journal/d594bab85ae049ca8131c4abe1cbfdef) is 8.0M, max 78.5M, 70.5M free. May 17 00:46:14.495000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 17 00:46:15.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 17 00:46:15.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 17 00:46:15.290000 audit: BPF prog-id=10 op=LOAD May 17 00:46:15.290000 audit: BPF prog-id=10 op=UNLOAD May 17 00:46:15.307000 audit: BPF prog-id=11 op=LOAD May 17 00:46:15.307000 audit: BPF prog-id=11 op=UNLOAD May 17 00:46:16.534000 audit[1075]: AVC avc: denied { associate } for pid=1075 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 17 00:46:16.534000 audit[1075]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=40000222fc a1=40000283d8 a2=4000026840 a3=32 items=0 ppid=1058 pid=1075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:46:16.534000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 17 00:46:16.549000 audit[1075]: AVC avc: denied { associate } for pid=1075 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 17 00:46:16.549000 audit[1075]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=40001456b9 a2=1ed a3=0 items=2 ppid=1058 pid=1075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:46:16.549000 audit: CWD cwd="/" May 17 00:46:16.549000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:46:16.549000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:46:16.549000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 17 00:46:22.698000 audit: BPF prog-id=12 op=LOAD May 17 00:46:22.698000 audit: BPF prog-id=3 op=UNLOAD May 17 00:46:22.703000 audit: BPF prog-id=13 op=LOAD May 17 00:46:22.709000 audit: BPF prog-id=14 op=LOAD May 17 00:46:22.709000 audit: BPF prog-id=4 op=UNLOAD May 17 00:46:22.709000 audit: BPF prog-id=5 op=UNLOAD May 17 00:46:22.715000 audit: BPF prog-id=15 op=LOAD May 17 00:46:22.716000 audit: BPF prog-id=12 op=UNLOAD May 17 00:46:22.721000 audit: BPF prog-id=16 op=LOAD May 17 00:46:22.727000 audit: BPF prog-id=17 op=LOAD May 17 00:46:22.727000 audit: BPF prog-id=13 op=UNLOAD May 17 00:46:22.727000 audit: BPF prog-id=14 op=UNLOAD May 17 00:46:22.728000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:22.751000 audit: BPF prog-id=15 op=UNLOAD May 17 00:46:22.777000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:22.777000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:23.242000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:23.258000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:23.269000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:23.269000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:23.275000 audit: BPF prog-id=18 op=LOAD May 17 00:46:23.276000 audit: BPF prog-id=19 op=LOAD May 17 00:46:23.276000 audit: BPF prog-id=20 op=LOAD May 17 00:46:23.276000 audit: BPF prog-id=16 op=UNLOAD May 17 00:46:23.276000 audit: BPF prog-id=17 op=UNLOAD May 17 00:46:23.366000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:23.372000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 17 00:46:23.372000 audit[1181]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=6 a1=fffffb864e20 a2=4000 a3=1 items=0 ppid=1 pid=1181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:46:23.372000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 17 00:46:22.697115 systemd[1]: Queued start job for default target multi-user.target. May 17 00:46:16.467092 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2025-05-17T00:46:16Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:46:22.697127 systemd[1]: Unnecessary job was removed for dev-sda6.device. May 17 00:46:16.467417 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2025-05-17T00:46:16Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 17 00:46:22.728320 systemd[1]: systemd-journald.service: Deactivated successfully. May 17 00:46:16.467435 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2025-05-17T00:46:16Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 17 00:46:22.728771 systemd[1]: systemd-journald.service: Consumed 3.006s CPU time. May 17 00:46:16.467471 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2025-05-17T00:46:16Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 17 00:46:16.467481 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2025-05-17T00:46:16Z" level=debug msg="skipped missing lower profile" missing profile=oem May 17 00:46:16.467509 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2025-05-17T00:46:16Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 17 00:46:16.467521 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2025-05-17T00:46:16Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 17 00:46:16.467754 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2025-05-17T00:46:16Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 17 00:46:16.467788 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2025-05-17T00:46:16Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 17 00:46:16.467801 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2025-05-17T00:46:16Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 17 00:46:16.499794 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2025-05-17T00:46:16Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 17 00:46:16.499845 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2025-05-17T00:46:16Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 17 00:46:16.499870 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2025-05-17T00:46:16Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 17 00:46:16.499885 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2025-05-17T00:46:16Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 17 00:46:16.499911 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2025-05-17T00:46:16Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 17 00:46:16.499924 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2025-05-17T00:46:16Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 17 00:46:21.613804 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2025-05-17T00:46:21Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:46:21.614065 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2025-05-17T00:46:21Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:46:21.614161 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2025-05-17T00:46:21Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:46:21.614325 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2025-05-17T00:46:21Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:46:21.614379 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2025-05-17T00:46:21Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 17 00:46:21.614434 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2025-05-17T00:46:21Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 17 00:46:23.391218 systemd[1]: Started systemd-journald.service. May 17 00:46:23.390000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:23.392069 systemd[1]: Mounted dev-mqueue.mount. May 17 00:46:23.396309 systemd[1]: Mounted media.mount. May 17 00:46:23.400082 systemd[1]: Mounted sys-kernel-debug.mount. May 17 00:46:23.404607 systemd[1]: Mounted sys-kernel-tracing.mount. May 17 00:46:23.409976 systemd[1]: Mounted tmp.mount. May 17 00:46:23.414331 systemd[1]: Finished flatcar-tmpfiles.service. May 17 00:46:23.418000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:23.419957 systemd[1]: Finished kmod-static-nodes.service. May 17 00:46:23.424000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:23.425282 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 17 00:46:23.425425 systemd[1]: Finished modprobe@configfs.service. May 17 00:46:23.429000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:23.429000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:23.430359 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:46:23.430485 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:46:23.434000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:23.434000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:23.435346 systemd[1]: modprobe@drm.service: Deactivated successfully. May 17 00:46:23.435474 systemd[1]: Finished modprobe@drm.service. May 17 00:46:23.439000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:23.439000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:23.440056 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:46:23.440196 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:46:23.444000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:23.444000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:23.445264 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 17 00:46:23.445396 systemd[1]: Finished modprobe@fuse.service. May 17 00:46:23.449000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:23.449000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:23.450413 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:46:23.450543 systemd[1]: Finished modprobe@loop.service. May 17 00:46:23.454000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:23.454000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:23.455413 systemd[1]: Finished systemd-modules-load.service. May 17 00:46:23.459000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:23.460541 systemd[1]: Finished systemd-network-generator.service. May 17 00:46:23.465000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:23.466068 systemd[1]: Finished systemd-remount-fs.service. May 17 00:46:23.470000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:23.471496 systemd[1]: Reached target network-pre.target. May 17 00:46:23.478311 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 17 00:46:23.484426 systemd[1]: Mounting sys-kernel-config.mount... May 17 00:46:23.489060 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 17 00:46:23.526217 systemd[1]: Starting systemd-hwdb-update.service... May 17 00:46:23.531652 systemd[1]: Starting systemd-journal-flush.service... May 17 00:46:23.536032 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:46:23.537273 systemd[1]: Starting systemd-random-seed.service... May 17 00:46:23.541999 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:46:23.543309 systemd[1]: Starting systemd-sysctl.service... May 17 00:46:23.548924 systemd[1]: Starting systemd-sysusers.service... May 17 00:46:23.555158 systemd[1]: Finished systemd-udev-trigger.service. May 17 00:46:23.560000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:23.560854 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 17 00:46:23.566601 systemd[1]: Mounted sys-kernel-config.mount. May 17 00:46:23.572692 systemd[1]: Starting systemd-udev-settle.service... May 17 00:46:23.580885 udevadm[1196]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. May 17 00:46:23.586180 systemd-journald[1181]: Time spent on flushing to /var/log/journal/d594bab85ae049ca8131c4abe1cbfdef is 13.805ms for 1092 entries. May 17 00:46:23.586180 systemd-journald[1181]: System Journal (/var/log/journal/d594bab85ae049ca8131c4abe1cbfdef) is 8.0M, max 2.6G, 2.6G free. May 17 00:46:23.683886 systemd-journald[1181]: Received client request to flush runtime journal. May 17 00:46:23.604000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:23.641000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:23.599982 systemd[1]: Finished systemd-random-seed.service. May 17 00:46:23.604993 systemd[1]: Reached target first-boot-complete.target. May 17 00:46:23.636898 systemd[1]: Finished systemd-sysctl.service. May 17 00:46:23.684890 systemd[1]: Finished systemd-journal-flush.service. May 17 00:46:23.689000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:24.137950 systemd[1]: Finished systemd-sysusers.service. May 17 00:46:24.142000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:24.144006 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 17 00:46:24.528905 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 17 00:46:24.533000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:24.716581 systemd[1]: Finished systemd-hwdb-update.service. May 17 00:46:24.721000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:24.721000 audit: BPF prog-id=21 op=LOAD May 17 00:46:24.721000 audit: BPF prog-id=22 op=LOAD May 17 00:46:24.721000 audit: BPF prog-id=7 op=UNLOAD May 17 00:46:24.721000 audit: BPF prog-id=8 op=UNLOAD May 17 00:46:24.723022 systemd[1]: Starting systemd-udevd.service... May 17 00:46:24.741056 systemd-udevd[1201]: Using default interface naming scheme 'v252'. May 17 00:46:24.930758 systemd[1]: Started systemd-udevd.service. May 17 00:46:24.938000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:24.939000 audit: BPF prog-id=23 op=LOAD May 17 00:46:24.942456 systemd[1]: Starting systemd-networkd.service... May 17 00:46:24.967421 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. May 17 00:46:25.013000 audit: BPF prog-id=24 op=LOAD May 17 00:46:25.013000 audit: BPF prog-id=25 op=LOAD May 17 00:46:25.013000 audit: BPF prog-id=26 op=LOAD May 17 00:46:25.015155 systemd[1]: Starting systemd-userdbd.service... May 17 00:46:25.031673 kernel: mousedev: PS/2 mouse device common for all mice May 17 00:46:25.037000 audit[1204]: AVC avc: denied { confidentiality } for pid=1204 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 17 00:46:25.045777 kernel: hv_vmbus: registering driver hyperv_fb May 17 00:46:25.045871 kernel: hv_vmbus: registering driver hv_balloon May 17 00:46:25.055684 kernel: hyperv_fb: Synthvid Version major 3, minor 5 May 17 00:46:25.055786 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 May 17 00:46:25.055813 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 May 17 00:46:25.066658 kernel: hv_balloon: Memory hot add disabled on ARM64 May 17 00:46:25.071324 kernel: Console: switching to colour dummy device 80x25 May 17 00:46:25.078508 kernel: Console: switching to colour frame buffer device 128x48 May 17 00:46:25.037000 audit[1204]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaae7356fd0 a1=aa2c a2=ffff8caf24b0 a3=aaaae72b8010 items=12 ppid=1201 pid=1204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:46:25.037000 audit: CWD cwd="/" May 17 00:46:25.037000 audit: PATH item=0 name=(null) inode=6808 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:46:25.037000 audit: PATH item=1 name=(null) inode=11379 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:46:25.037000 audit: PATH item=2 name=(null) inode=11379 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:46:25.037000 audit: PATH item=3 name=(null) inode=11380 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:46:25.037000 audit: PATH item=4 name=(null) inode=11379 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:46:25.037000 audit: PATH item=5 name=(null) inode=11381 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:46:25.037000 audit: PATH item=6 name=(null) inode=11379 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:46:25.037000 audit: PATH item=7 name=(null) inode=11382 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:46:25.037000 audit: PATH item=8 name=(null) inode=11379 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:46:25.037000 audit: PATH item=9 name=(null) inode=11383 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:46:25.037000 audit: PATH item=10 name=(null) inode=11379 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:46:25.037000 audit: PATH item=11 name=(null) inode=11384 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:46:25.037000 audit: PROCTITLE proctitle="(udev-worker)" May 17 00:46:25.113783 kernel: hv_utils: Registering HyperV Utility Driver May 17 00:46:25.114009 kernel: hv_vmbus: registering driver hv_utils May 17 00:46:25.117788 kernel: hv_utils: Heartbeat IC version 3.0 May 17 00:46:25.117869 kernel: hv_utils: Shutdown IC version 3.2 May 17 00:46:25.125007 kernel: hv_utils: TimeSync IC version 4.0 May 17 00:46:25.327000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:25.324421 systemd[1]: Started systemd-userdbd.service. May 17 00:46:25.524135 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 17 00:46:25.530317 systemd[1]: Finished systemd-udev-settle.service. May 17 00:46:25.533000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:25.536462 systemd[1]: Starting lvm2-activation-early.service... May 17 00:46:25.545559 systemd-networkd[1222]: lo: Link UP May 17 00:46:25.545807 systemd-networkd[1222]: lo: Gained carrier May 17 00:46:25.546446 systemd-networkd[1222]: Enumeration completed May 17 00:46:25.546643 systemd[1]: Started systemd-networkd.service. May 17 00:46:25.549000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:25.552517 systemd[1]: Starting systemd-networkd-wait-online.service... May 17 00:46:25.575239 systemd-networkd[1222]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 17 00:46:25.624886 kernel: mlx5_core 5bee:00:02.0 enP23534s1: Link up May 17 00:46:25.650899 kernel: hv_netvsc 002248bc-82d6-0022-48bc-82d6002248bc eth0: Data path switched to VF: enP23534s1 May 17 00:46:25.651981 systemd-networkd[1222]: enP23534s1: Link UP May 17 00:46:25.652312 systemd-networkd[1222]: eth0: Link UP May 17 00:46:25.652324 systemd-networkd[1222]: eth0: Gained carrier May 17 00:46:25.655374 systemd-networkd[1222]: enP23534s1: Gained carrier May 17 00:46:25.666979 systemd-networkd[1222]: eth0: DHCPv4 address 10.200.20.42/24, gateway 10.200.20.1 acquired from 168.63.129.16 May 17 00:46:25.860351 lvm[1278]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 17 00:46:25.883879 systemd[1]: Finished lvm2-activation-early.service. May 17 00:46:25.887000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:25.889036 systemd[1]: Reached target cryptsetup.target. May 17 00:46:25.895112 systemd[1]: Starting lvm2-activation.service... May 17 00:46:25.899657 lvm[1280]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 17 00:46:25.922850 systemd[1]: Finished lvm2-activation.service. May 17 00:46:25.925000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:25.927651 systemd[1]: Reached target local-fs-pre.target. May 17 00:46:25.932370 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 17 00:46:25.932398 systemd[1]: Reached target local-fs.target. May 17 00:46:25.937070 systemd[1]: Reached target machines.target. May 17 00:46:25.943797 systemd[1]: Starting ldconfig.service... May 17 00:46:25.947848 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:46:25.947958 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:46:25.949311 systemd[1]: Starting systemd-boot-update.service... May 17 00:46:25.954958 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 17 00:46:25.961675 systemd[1]: Starting systemd-machine-id-commit.service... May 17 00:46:25.967543 systemd[1]: Starting systemd-sysext.service... May 17 00:46:26.010748 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1282 (bootctl) May 17 00:46:26.012228 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 17 00:46:26.131022 systemd[1]: Unmounting usr-share-oem.mount... May 17 00:46:26.226144 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 17 00:46:26.230000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:26.242255 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 17 00:46:26.242452 systemd[1]: Unmounted usr-share-oem.mount. May 17 00:46:26.347576 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 17 00:46:26.348541 systemd[1]: Finished systemd-machine-id-commit.service. May 17 00:46:26.356818 kernel: loop0: detected capacity change from 0 to 203944 May 17 00:46:26.355000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:26.450894 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 17 00:46:26.471915 kernel: loop1: detected capacity change from 0 to 203944 May 17 00:46:26.477020 (sd-sysext)[1294]: Using extensions 'kubernetes'. May 17 00:46:26.478801 (sd-sysext)[1294]: Merged extensions into '/usr'. May 17 00:46:26.501402 systemd[1]: Mounting usr-share-oem.mount... May 17 00:46:26.505618 systemd-fsck[1290]: fsck.fat 4.2 (2021-01-31) May 17 00:46:26.505618 systemd-fsck[1290]: /dev/sda1: 236 files, 117182/258078 clusters May 17 00:46:26.507286 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:46:26.508536 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:46:26.514359 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:46:26.522956 systemd[1]: Starting modprobe@loop.service... May 17 00:46:26.527437 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:46:26.527574 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:46:26.530078 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 17 00:46:26.535000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:26.537193 systemd[1]: Mounted usr-share-oem.mount. May 17 00:46:26.542152 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:46:26.542295 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:46:26.545000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:26.545000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:26.547914 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:46:26.548051 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:46:26.552000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:26.552000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:26.553970 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:46:26.554105 systemd[1]: Finished modprobe@loop.service. May 17 00:46:26.557000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:26.557000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:26.561195 systemd[1]: Finished systemd-sysext.service. May 17 00:46:26.564000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:26.568100 systemd[1]: Mounting boot.mount... May 17 00:46:26.572605 systemd[1]: Starting ensure-sysext.service... May 17 00:46:26.581230 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:46:26.581490 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:46:26.583053 systemd[1]: Starting systemd-tmpfiles-setup.service... May 17 00:46:26.591425 systemd[1]: Mounted boot.mount. May 17 00:46:26.597585 systemd[1]: Reloading. May 17 00:46:26.605328 systemd-tmpfiles[1305]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 17 00:46:26.626394 systemd-tmpfiles[1305]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 17 00:46:26.644104 systemd-tmpfiles[1305]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 17 00:46:26.645917 /usr/lib/systemd/system-generators/torcx-generator[1324]: time="2025-05-17T00:46:26Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:46:26.645945 /usr/lib/systemd/system-generators/torcx-generator[1324]: time="2025-05-17T00:46:26Z" level=info msg="torcx already run" May 17 00:46:26.724374 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:46:26.724394 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:46:26.739776 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:46:26.801000 audit: BPF prog-id=27 op=LOAD May 17 00:46:26.801000 audit: BPF prog-id=23 op=UNLOAD May 17 00:46:26.801000 audit: BPF prog-id=28 op=LOAD May 17 00:46:26.801000 audit: BPF prog-id=24 op=UNLOAD May 17 00:46:26.801000 audit: BPF prog-id=29 op=LOAD May 17 00:46:26.801000 audit: BPF prog-id=30 op=LOAD May 17 00:46:26.801000 audit: BPF prog-id=25 op=UNLOAD May 17 00:46:26.801000 audit: BPF prog-id=26 op=UNLOAD May 17 00:46:26.804000 audit: BPF prog-id=31 op=LOAD May 17 00:46:26.804000 audit: BPF prog-id=18 op=UNLOAD May 17 00:46:26.804000 audit: BPF prog-id=32 op=LOAD May 17 00:46:26.804000 audit: BPF prog-id=33 op=LOAD May 17 00:46:26.804000 audit: BPF prog-id=19 op=UNLOAD May 17 00:46:26.804000 audit: BPF prog-id=20 op=UNLOAD May 17 00:46:26.804000 audit: BPF prog-id=34 op=LOAD May 17 00:46:26.804000 audit: BPF prog-id=35 op=LOAD May 17 00:46:26.804000 audit: BPF prog-id=21 op=UNLOAD May 17 00:46:26.804000 audit: BPF prog-id=22 op=UNLOAD May 17 00:46:26.809294 systemd[1]: Finished systemd-boot-update.service. May 17 00:46:26.812000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:26.823035 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:46:26.824365 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:46:26.829971 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:46:26.835627 systemd[1]: Starting modprobe@loop.service... May 17 00:46:26.840031 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:46:26.840159 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:46:26.841020 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:46:26.841178 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:46:26.844000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:26.844000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:26.846311 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:46:26.846435 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:46:26.849000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:26.849000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:26.851812 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:46:26.852113 systemd[1]: Finished modprobe@loop.service. May 17 00:46:26.856000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:26.856000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:26.859338 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:46:26.860679 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:46:26.866517 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:46:26.872665 systemd[1]: Starting modprobe@loop.service... May 17 00:46:26.876963 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:46:26.877103 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:46:26.877969 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:46:26.878124 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:46:26.882000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:26.882000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:26.883481 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:46:26.883614 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:46:26.887000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:26.887000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:26.889262 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:46:26.889396 systemd[1]: Finished modprobe@loop.service. May 17 00:46:26.892000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:26.892000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:26.894350 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:46:26.894451 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:46:26.896812 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:46:26.898212 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:46:26.903706 systemd[1]: Starting modprobe@drm.service... May 17 00:46:26.908972 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:46:26.914579 systemd[1]: Starting modprobe@loop.service... May 17 00:46:26.918811 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:46:26.918965 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:46:26.919960 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:46:26.920103 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:46:26.923000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:26.923000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:26.925250 systemd[1]: modprobe@drm.service: Deactivated successfully. May 17 00:46:26.925380 systemd[1]: Finished modprobe@drm.service. May 17 00:46:26.928000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:26.928000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:26.930237 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:46:26.930365 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:46:26.933000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:26.933000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:26.936026 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:46:26.936153 systemd[1]: Finished modprobe@loop.service. May 17 00:46:26.939000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:26.939000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:26.941320 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:46:26.941393 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:46:26.942560 systemd[1]: Finished ensure-sysext.service. May 17 00:46:26.945000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:27.061027 systemd-networkd[1222]: eth0: Gained IPv6LL May 17 00:46:27.064022 systemd[1]: Finished systemd-networkd-wait-online.service. May 17 00:46:27.068000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:27.242450 systemd[1]: Finished systemd-tmpfiles-setup.service. May 17 00:46:27.245000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:27.249269 systemd[1]: Starting audit-rules.service... May 17 00:46:27.254692 systemd[1]: Starting clean-ca-certificates.service... May 17 00:46:27.260588 systemd[1]: Starting systemd-journal-catalog-update.service... May 17 00:46:27.265000 audit: BPF prog-id=36 op=LOAD May 17 00:46:27.268112 systemd[1]: Starting systemd-resolved.service... May 17 00:46:27.272000 audit: BPF prog-id=37 op=LOAD May 17 00:46:27.274748 systemd[1]: Starting systemd-timesyncd.service... May 17 00:46:27.280129 systemd[1]: Starting systemd-update-utmp.service... May 17 00:46:27.320000 audit[1401]: SYSTEM_BOOT pid=1401 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 17 00:46:27.325093 systemd[1]: Finished systemd-update-utmp.service. May 17 00:46:27.328000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:27.352412 systemd[1]: Finished clean-ca-certificates.service. May 17 00:46:27.356000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:27.358806 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 17 00:46:27.364315 systemd[1]: Started systemd-timesyncd.service. May 17 00:46:27.367000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:27.369401 systemd[1]: Reached target time-set.target. May 17 00:46:27.412061 systemd-resolved[1398]: Positive Trust Anchors: May 17 00:46:27.412347 systemd-resolved[1398]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 17 00:46:27.412427 systemd-resolved[1398]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 17 00:46:27.437802 systemd[1]: Finished systemd-journal-catalog-update.service. May 17 00:46:27.441000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:27.528216 systemd-resolved[1398]: Using system hostname 'ci-3510.3.7-n-6523ff94dd'. May 17 00:46:27.529916 systemd[1]: Started systemd-resolved.service. May 17 00:46:27.533000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:27.535325 systemd[1]: Reached target network.target. May 17 00:46:27.539888 systemd[1]: Reached target network-online.target. May 17 00:46:27.545233 systemd[1]: Reached target nss-lookup.target. May 17 00:46:27.575301 systemd-timesyncd[1400]: Contacted time server 45.79.82.45:123 (0.flatcar.pool.ntp.org). May 17 00:46:27.575714 systemd-timesyncd[1400]: Initial clock synchronization to Sat 2025-05-17 00:46:27.574816 UTC. May 17 00:46:27.580000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 17 00:46:27.580000 audit[1416]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffc8705660 a2=420 a3=0 items=0 ppid=1395 pid=1416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:46:27.580000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 17 00:46:27.583073 augenrules[1416]: No rules May 17 00:46:27.584034 systemd[1]: Finished audit-rules.service. May 17 00:46:33.564593 ldconfig[1281]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 17 00:46:33.580200 systemd[1]: Finished ldconfig.service. May 17 00:46:33.586407 systemd[1]: Starting systemd-update-done.service... May 17 00:46:33.611988 systemd[1]: Finished systemd-update-done.service. May 17 00:46:33.617015 systemd[1]: Reached target sysinit.target. May 17 00:46:33.621713 systemd[1]: Started motdgen.path. May 17 00:46:33.625648 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 17 00:46:33.632204 systemd[1]: Started logrotate.timer. May 17 00:46:33.636342 systemd[1]: Started mdadm.timer. May 17 00:46:33.640195 systemd[1]: Started systemd-tmpfiles-clean.timer. May 17 00:46:33.644961 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 17 00:46:33.644991 systemd[1]: Reached target paths.target. May 17 00:46:33.649158 systemd[1]: Reached target timers.target. May 17 00:46:33.654356 systemd[1]: Listening on dbus.socket. May 17 00:46:33.659699 systemd[1]: Starting docker.socket... May 17 00:46:33.695627 systemd[1]: Listening on sshd.socket. May 17 00:46:33.699902 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:46:33.700425 systemd[1]: Listening on docker.socket. May 17 00:46:33.704643 systemd[1]: Reached target sockets.target. May 17 00:46:33.708973 systemd[1]: Reached target basic.target. May 17 00:46:33.713212 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 17 00:46:33.713246 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 17 00:46:33.714500 systemd[1]: Starting containerd.service... May 17 00:46:33.719332 systemd[1]: Starting dbus.service... May 17 00:46:33.723738 systemd[1]: Starting enable-oem-cloudinit.service... May 17 00:46:33.729322 systemd[1]: Starting extend-filesystems.service... May 17 00:46:33.736629 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 17 00:46:33.739909 systemd[1]: Starting kubelet.service... May 17 00:46:33.744650 systemd[1]: Starting motdgen.service... May 17 00:46:33.749745 systemd[1]: Started nvidia.service. May 17 00:46:33.755771 systemd[1]: Starting prepare-helm.service... May 17 00:46:33.761217 systemd[1]: Starting ssh-key-proc-cmdline.service... May 17 00:46:33.767748 systemd[1]: Starting sshd-keygen.service... May 17 00:46:33.774567 systemd[1]: Starting systemd-logind.service... May 17 00:46:33.781197 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:46:33.781292 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 17 00:46:33.781822 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 17 00:46:33.782704 systemd[1]: Starting update-engine.service... May 17 00:46:33.788201 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 17 00:46:33.801059 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 17 00:46:33.801251 systemd[1]: Finished ssh-key-proc-cmdline.service. May 17 00:46:33.809334 jq[1426]: false May 17 00:46:33.811627 jq[1444]: true May 17 00:46:33.818518 extend-filesystems[1427]: Found loop1 May 17 00:46:33.823882 extend-filesystems[1427]: Found sda May 17 00:46:33.823882 extend-filesystems[1427]: Found sda1 May 17 00:46:33.823882 extend-filesystems[1427]: Found sda2 May 17 00:46:33.823882 extend-filesystems[1427]: Found sda3 May 17 00:46:33.823882 extend-filesystems[1427]: Found usr May 17 00:46:33.823882 extend-filesystems[1427]: Found sda4 May 17 00:46:33.823882 extend-filesystems[1427]: Found sda6 May 17 00:46:33.823882 extend-filesystems[1427]: Found sda7 May 17 00:46:33.823882 extend-filesystems[1427]: Found sda9 May 17 00:46:33.823882 extend-filesystems[1427]: Checking size of /dev/sda9 May 17 00:46:33.829267 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 17 00:46:33.829462 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 17 00:46:33.862334 systemd[1]: motdgen.service: Deactivated successfully. May 17 00:46:33.862522 systemd[1]: Finished motdgen.service. May 17 00:46:33.883745 jq[1450]: true May 17 00:46:33.933432 systemd-logind[1439]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard) May 17 00:46:33.933976 systemd-logind[1439]: New seat seat0. May 17 00:46:33.936732 extend-filesystems[1427]: Old size kept for /dev/sda9 May 17 00:46:33.954518 extend-filesystems[1427]: Found sr0 May 17 00:46:33.938431 systemd[1]: extend-filesystems.service: Deactivated successfully. May 17 00:46:33.938634 systemd[1]: Finished extend-filesystems.service. May 17 00:46:34.006130 tar[1447]: linux-arm64/helm May 17 00:46:34.020360 env[1452]: time="2025-05-17T00:46:34.020296316Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 17 00:46:34.053430 bash[1476]: Updated "/home/core/.ssh/authorized_keys" May 17 00:46:34.054439 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 17 00:46:34.083491 dbus-daemon[1425]: [system] SELinux support is enabled May 17 00:46:34.083693 systemd[1]: Started dbus.service. May 17 00:46:34.096851 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 17 00:46:34.097426 dbus-daemon[1425]: [system] Successfully activated service 'org.freedesktop.systemd1' May 17 00:46:34.096892 systemd[1]: Reached target system-config.target. May 17 00:46:34.104146 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 17 00:46:34.104167 systemd[1]: Reached target user-config.target. May 17 00:46:34.112362 systemd[1]: Started systemd-logind.service. May 17 00:46:34.147645 systemd[1]: nvidia.service: Deactivated successfully. May 17 00:46:34.152650 env[1452]: time="2025-05-17T00:46:34.152592718Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 17 00:46:34.152786 env[1452]: time="2025-05-17T00:46:34.152762716Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 17 00:46:34.155195 env[1452]: time="2025-05-17T00:46:34.155144243Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.182-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 17 00:46:34.155195 env[1452]: time="2025-05-17T00:46:34.155183562Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 17 00:46:34.155460 env[1452]: time="2025-05-17T00:46:34.155424839Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 17 00:46:34.155460 env[1452]: time="2025-05-17T00:46:34.155451639Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 17 00:46:34.155520 env[1452]: time="2025-05-17T00:46:34.155465319Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 17 00:46:34.155520 env[1452]: time="2025-05-17T00:46:34.155475358Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 17 00:46:34.155566 env[1452]: time="2025-05-17T00:46:34.155551997Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 17 00:46:34.155806 env[1452]: time="2025-05-17T00:46:34.155775754Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 17 00:46:34.155976 env[1452]: time="2025-05-17T00:46:34.155949192Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 17 00:46:34.155976 env[1452]: time="2025-05-17T00:46:34.155972632Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 17 00:46:34.156057 env[1452]: time="2025-05-17T00:46:34.156035311Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 17 00:46:34.156057 env[1452]: time="2025-05-17T00:46:34.156053390Z" level=info msg="metadata content store policy set" policy=shared May 17 00:46:34.188000 env[1452]: time="2025-05-17T00:46:34.187939827Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 17 00:46:34.188000 env[1452]: time="2025-05-17T00:46:34.187999227Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 17 00:46:34.188162 env[1452]: time="2025-05-17T00:46:34.188013386Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 17 00:46:34.188162 env[1452]: time="2025-05-17T00:46:34.188060066Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 17 00:46:34.188162 env[1452]: time="2025-05-17T00:46:34.188077426Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 17 00:46:34.188162 env[1452]: time="2025-05-17T00:46:34.188091825Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 17 00:46:34.188248 env[1452]: time="2025-05-17T00:46:34.188104585Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 17 00:46:34.188553 env[1452]: time="2025-05-17T00:46:34.188525219Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 17 00:46:34.188587 env[1452]: time="2025-05-17T00:46:34.188551659Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 17 00:46:34.188587 env[1452]: time="2025-05-17T00:46:34.188565139Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 17 00:46:34.188587 env[1452]: time="2025-05-17T00:46:34.188577019Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 17 00:46:34.188650 env[1452]: time="2025-05-17T00:46:34.188590618Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 17 00:46:34.188775 env[1452]: time="2025-05-17T00:46:34.188748216Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 17 00:46:34.188867 env[1452]: time="2025-05-17T00:46:34.188837055Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 17 00:46:34.189166 env[1452]: time="2025-05-17T00:46:34.189141651Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 17 00:46:34.189198 env[1452]: time="2025-05-17T00:46:34.189188850Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 17 00:46:34.189221 env[1452]: time="2025-05-17T00:46:34.189204850Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 17 00:46:34.189278 env[1452]: time="2025-05-17T00:46:34.189259529Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 17 00:46:34.189315 env[1452]: time="2025-05-17T00:46:34.189278329Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 17 00:46:34.189315 env[1452]: time="2025-05-17T00:46:34.189292769Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 17 00:46:34.189392 env[1452]: time="2025-05-17T00:46:34.189304689Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 17 00:46:34.189392 env[1452]: time="2025-05-17T00:46:34.189391287Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 17 00:46:34.189453 env[1452]: time="2025-05-17T00:46:34.189404967Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 17 00:46:34.189453 env[1452]: time="2025-05-17T00:46:34.189416327Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 17 00:46:34.189453 env[1452]: time="2025-05-17T00:46:34.189428967Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 17 00:46:34.189453 env[1452]: time="2025-05-17T00:46:34.189443687Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 17 00:46:34.189612 env[1452]: time="2025-05-17T00:46:34.189586365Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 17 00:46:34.189651 env[1452]: time="2025-05-17T00:46:34.189611564Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 17 00:46:34.189651 env[1452]: time="2025-05-17T00:46:34.189625764Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 17 00:46:34.189651 env[1452]: time="2025-05-17T00:46:34.189638924Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 17 00:46:34.189714 env[1452]: time="2025-05-17T00:46:34.189653604Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 17 00:46:34.189714 env[1452]: time="2025-05-17T00:46:34.189683843Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 17 00:46:34.189714 env[1452]: time="2025-05-17T00:46:34.189703123Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 17 00:46:34.189771 env[1452]: time="2025-05-17T00:46:34.189739802Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 17 00:46:34.190001 env[1452]: time="2025-05-17T00:46:34.189953719Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 17 00:46:34.209461 env[1452]: time="2025-05-17T00:46:34.190016039Z" level=info msg="Connect containerd service" May 17 00:46:34.209461 env[1452]: time="2025-05-17T00:46:34.190047798Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 17 00:46:34.209461 env[1452]: time="2025-05-17T00:46:34.190994825Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 17 00:46:34.209461 env[1452]: time="2025-05-17T00:46:34.191184942Z" level=info msg="Start subscribing containerd event" May 17 00:46:34.209461 env[1452]: time="2025-05-17T00:46:34.191225262Z" level=info msg="Start recovering state" May 17 00:46:34.209461 env[1452]: time="2025-05-17T00:46:34.191293301Z" level=info msg="Start event monitor" May 17 00:46:34.209461 env[1452]: time="2025-05-17T00:46:34.191313981Z" level=info msg="Start snapshots syncer" May 17 00:46:34.209461 env[1452]: time="2025-05-17T00:46:34.191336300Z" level=info msg="Start cni network conf syncer for default" May 17 00:46:34.209461 env[1452]: time="2025-05-17T00:46:34.191344940Z" level=info msg="Start streaming server" May 17 00:46:34.209461 env[1452]: time="2025-05-17T00:46:34.191671656Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 17 00:46:34.209461 env[1452]: time="2025-05-17T00:46:34.191752175Z" level=info msg=serving... address=/run/containerd/containerd.sock May 17 00:46:34.191901 systemd[1]: Started containerd.service. May 17 00:46:34.212393 env[1452]: time="2025-05-17T00:46:34.211441101Z" level=info msg="containerd successfully booted in 0.193475s" May 17 00:46:34.522599 update_engine[1443]: I0517 00:46:34.506158 1443 main.cc:92] Flatcar Update Engine starting May 17 00:46:34.588768 systemd[1]: Started update-engine.service. May 17 00:46:34.601747 update_engine[1443]: I0517 00:46:34.588806 1443 update_check_scheduler.cc:74] Next update check in 8m28s May 17 00:46:34.597193 systemd[1]: Started locksmithd.service. May 17 00:46:34.733307 tar[1447]: linux-arm64/LICENSE May 17 00:46:34.733440 tar[1447]: linux-arm64/README.md May 17 00:46:34.738915 systemd[1]: Finished prepare-helm.service. May 17 00:46:34.876745 systemd[1]: Started kubelet.service. May 17 00:46:35.280519 kubelet[1534]: E0517 00:46:35.280474 1534 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:46:35.282327 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:46:35.282454 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:46:35.902468 sshd_keygen[1442]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 17 00:46:35.921139 systemd[1]: Finished sshd-keygen.service. May 17 00:46:35.927532 systemd[1]: Starting issuegen.service... May 17 00:46:35.932949 systemd[1]: Started waagent.service. May 17 00:46:35.937619 systemd[1]: issuegen.service: Deactivated successfully. May 17 00:46:35.937807 systemd[1]: Finished issuegen.service. May 17 00:46:35.944055 systemd[1]: Starting systemd-user-sessions.service... May 17 00:46:35.999749 systemd[1]: Finished systemd-user-sessions.service. May 17 00:46:36.006557 systemd[1]: Started getty@tty1.service. May 17 00:46:36.012610 systemd[1]: Started serial-getty@ttyAMA0.service. May 17 00:46:36.017772 systemd[1]: Reached target getty.target. May 17 00:46:36.022186 systemd[1]: Reached target multi-user.target. May 17 00:46:36.028341 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 17 00:46:36.043624 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 17 00:46:36.043800 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 17 00:46:36.049731 systemd[1]: Startup finished in 761ms (kernel) + 13.350s (initrd) + 21.852s (userspace) = 35.964s. May 17 00:46:36.345183 locksmithd[1530]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 17 00:46:37.213146 login[1556]: pam_lastlog(login:session): file /var/log/lastlog is locked/write May 17 00:46:37.215043 login[1557]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) May 17 00:46:37.285725 systemd[1]: Created slice user-500.slice. May 17 00:46:37.286925 systemd[1]: Starting user-runtime-dir@500.service... May 17 00:46:37.289211 systemd-logind[1439]: New session 2 of user core. May 17 00:46:37.343946 systemd[1]: Finished user-runtime-dir@500.service. May 17 00:46:37.345335 systemd[1]: Starting user@500.service... May 17 00:46:37.379252 (systemd)[1561]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 17 00:46:37.561035 systemd[1561]: Queued start job for default target default.target. May 17 00:46:37.561841 systemd[1561]: Reached target paths.target. May 17 00:46:37.561989 systemd[1561]: Reached target sockets.target. May 17 00:46:37.562157 systemd[1561]: Reached target timers.target. May 17 00:46:37.562240 systemd[1561]: Reached target basic.target. May 17 00:46:37.562388 systemd[1]: Started user@500.service. May 17 00:46:37.563257 systemd[1]: Started session-2.scope. May 17 00:46:37.563814 systemd[1561]: Reached target default.target. May 17 00:46:37.564166 systemd[1561]: Startup finished in 178ms. May 17 00:46:38.213470 login[1556]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) May 17 00:46:38.217502 systemd-logind[1439]: New session 1 of user core. May 17 00:46:38.217779 systemd[1]: Started session-1.scope. May 17 00:46:43.129841 waagent[1553]: 2025-05-17T00:46:43.129713Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 May 17 00:46:43.151281 waagent[1553]: 2025-05-17T00:46:43.151180Z INFO Daemon Daemon OS: flatcar 3510.3.7 May 17 00:46:43.156343 waagent[1553]: 2025-05-17T00:46:43.156259Z INFO Daemon Daemon Python: 3.9.16 May 17 00:46:43.161413 waagent[1553]: 2025-05-17T00:46:43.161305Z INFO Daemon Daemon Run daemon May 17 00:46:43.166394 waagent[1553]: 2025-05-17T00:46:43.166316Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.7' May 17 00:46:43.188113 waagent[1553]: 2025-05-17T00:46:43.187969Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. May 17 00:46:43.204648 waagent[1553]: 2025-05-17T00:46:43.204504Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' May 17 00:46:43.215616 waagent[1553]: 2025-05-17T00:46:43.215520Z INFO Daemon Daemon cloud-init is enabled: False May 17 00:46:43.221172 waagent[1553]: 2025-05-17T00:46:43.221060Z INFO Daemon Daemon Using waagent for provisioning May 17 00:46:43.227894 waagent[1553]: 2025-05-17T00:46:43.227767Z INFO Daemon Daemon Activate resource disk May 17 00:46:43.233448 waagent[1553]: 2025-05-17T00:46:43.233355Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb May 17 00:46:43.248664 waagent[1553]: 2025-05-17T00:46:43.248568Z INFO Daemon Daemon Found device: None May 17 00:46:43.253757 waagent[1553]: 2025-05-17T00:46:43.253666Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology May 17 00:46:43.263044 waagent[1553]: 2025-05-17T00:46:43.262948Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 May 17 00:46:43.276218 waagent[1553]: 2025-05-17T00:46:43.276140Z INFO Daemon Daemon Clean protocol and wireserver endpoint May 17 00:46:43.282655 waagent[1553]: 2025-05-17T00:46:43.282562Z INFO Daemon Daemon Running default provisioning handler May 17 00:46:43.296949 waagent[1553]: 2025-05-17T00:46:43.296773Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. May 17 00:46:43.313946 waagent[1553]: 2025-05-17T00:46:43.313779Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' May 17 00:46:43.324177 waagent[1553]: 2025-05-17T00:46:43.324075Z INFO Daemon Daemon cloud-init is enabled: False May 17 00:46:43.329657 waagent[1553]: 2025-05-17T00:46:43.329551Z INFO Daemon Daemon Copying ovf-env.xml May 17 00:46:43.427097 waagent[1553]: 2025-05-17T00:46:43.425298Z INFO Daemon Daemon Successfully mounted dvd May 17 00:46:43.503587 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. May 17 00:46:43.540075 waagent[1553]: 2025-05-17T00:46:43.539920Z INFO Daemon Daemon Detect protocol endpoint May 17 00:46:43.545359 waagent[1553]: 2025-05-17T00:46:43.545270Z INFO Daemon Daemon Clean protocol and wireserver endpoint May 17 00:46:43.551425 waagent[1553]: 2025-05-17T00:46:43.551346Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler May 17 00:46:43.558367 waagent[1553]: 2025-05-17T00:46:43.558294Z INFO Daemon Daemon Test for route to 168.63.129.16 May 17 00:46:43.564124 waagent[1553]: 2025-05-17T00:46:43.564056Z INFO Daemon Daemon Route to 168.63.129.16 exists May 17 00:46:43.569921 waagent[1553]: 2025-05-17T00:46:43.569834Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 May 17 00:46:43.724920 waagent[1553]: 2025-05-17T00:46:43.724823Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 May 17 00:46:43.732263 waagent[1553]: 2025-05-17T00:46:43.732212Z INFO Daemon Daemon Wire protocol version:2012-11-30 May 17 00:46:43.737763 waagent[1553]: 2025-05-17T00:46:43.737685Z INFO Daemon Daemon Server preferred version:2015-04-05 May 17 00:46:44.446187 waagent[1553]: 2025-05-17T00:46:44.446034Z INFO Daemon Daemon Initializing goal state during protocol detection May 17 00:46:44.462771 waagent[1553]: 2025-05-17T00:46:44.462679Z INFO Daemon Daemon Forcing an update of the goal state.. May 17 00:46:44.470389 waagent[1553]: 2025-05-17T00:46:44.470303Z INFO Daemon Daemon Fetching goal state [incarnation 1] May 17 00:46:44.567701 waagent[1553]: 2025-05-17T00:46:44.567553Z INFO Daemon Daemon Found private key matching thumbprint 63FA20198F5DAF8E94FB638B3D38CB71AB4DC776 May 17 00:46:44.576444 waagent[1553]: 2025-05-17T00:46:44.576351Z INFO Daemon Daemon Certificate with thumbprint 308CFBDD16ACFCEC02C9FA6298A437F264EE07CC has no matching private key. May 17 00:46:44.586622 waagent[1553]: 2025-05-17T00:46:44.586539Z INFO Daemon Daemon Fetch goal state completed May 17 00:46:44.642122 waagent[1553]: 2025-05-17T00:46:44.642055Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: 07094161-7543-4759-8476-afe73f3d19ca New eTag: 5384948063678469870] May 17 00:46:44.653100 waagent[1553]: 2025-05-17T00:46:44.653015Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob May 17 00:46:44.709010 waagent[1553]: 2025-05-17T00:46:44.708914Z INFO Daemon Daemon Starting provisioning May 17 00:46:44.714214 waagent[1553]: 2025-05-17T00:46:44.714125Z INFO Daemon Daemon Handle ovf-env.xml. May 17 00:46:44.718973 waagent[1553]: 2025-05-17T00:46:44.718897Z INFO Daemon Daemon Set hostname [ci-3510.3.7-n-6523ff94dd] May 17 00:46:44.758539 waagent[1553]: 2025-05-17T00:46:44.758399Z INFO Daemon Daemon Publish hostname [ci-3510.3.7-n-6523ff94dd] May 17 00:46:44.765832 waagent[1553]: 2025-05-17T00:46:44.765739Z INFO Daemon Daemon Examine /proc/net/route for primary interface May 17 00:46:44.773126 waagent[1553]: 2025-05-17T00:46:44.773042Z INFO Daemon Daemon Primary interface is [eth0] May 17 00:46:44.791533 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. May 17 00:46:44.791703 systemd[1]: Stopped systemd-networkd-wait-online.service. May 17 00:46:44.791764 systemd[1]: Stopping systemd-networkd-wait-online.service... May 17 00:46:44.792027 systemd[1]: Stopping systemd-networkd.service... May 17 00:46:44.797934 systemd-networkd[1222]: eth0: DHCPv6 lease lost May 17 00:46:44.800360 systemd[1]: systemd-networkd.service: Deactivated successfully. May 17 00:46:44.800534 systemd[1]: Stopped systemd-networkd.service. May 17 00:46:44.802688 systemd[1]: Starting systemd-networkd.service... May 17 00:46:44.831152 systemd-networkd[1609]: enP23534s1: Link UP May 17 00:46:44.831166 systemd-networkd[1609]: enP23534s1: Gained carrier May 17 00:46:44.832044 systemd-networkd[1609]: eth0: Link UP May 17 00:46:44.832055 systemd-networkd[1609]: eth0: Gained carrier May 17 00:46:44.832353 systemd-networkd[1609]: lo: Link UP May 17 00:46:44.832363 systemd-networkd[1609]: lo: Gained carrier May 17 00:46:44.832583 systemd-networkd[1609]: eth0: Gained IPv6LL May 17 00:46:44.832804 systemd-networkd[1609]: Enumeration completed May 17 00:46:44.832928 systemd[1]: Started systemd-networkd.service. May 17 00:46:44.834682 systemd[1]: Starting systemd-networkd-wait-online.service... May 17 00:46:44.835681 systemd-networkd[1609]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 17 00:46:44.843501 waagent[1553]: 2025-05-17T00:46:44.838684Z INFO Daemon Daemon Create user account if not exists May 17 00:46:44.845182 waagent[1553]: 2025-05-17T00:46:44.844962Z INFO Daemon Daemon User core already exists, skip useradd May 17 00:46:44.853483 waagent[1553]: 2025-05-17T00:46:44.853018Z INFO Daemon Daemon Configure sudoer May 17 00:46:44.860545 waagent[1553]: 2025-05-17T00:46:44.860434Z INFO Daemon Daemon Configure sshd May 17 00:46:44.867260 waagent[1553]: 2025-05-17T00:46:44.867122Z INFO Daemon Daemon Deploy ssh public key. May 17 00:46:44.873938 systemd-networkd[1609]: eth0: DHCPv4 address 10.200.20.42/24, gateway 10.200.20.1 acquired from 168.63.129.16 May 17 00:46:44.877666 systemd[1]: Finished systemd-networkd-wait-online.service. May 17 00:46:45.457614 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 17 00:46:45.457779 systemd[1]: Stopped kubelet.service. May 17 00:46:45.459262 systemd[1]: Starting kubelet.service... May 17 00:46:45.555587 systemd[1]: Started kubelet.service. May 17 00:46:45.687565 kubelet[1622]: E0517 00:46:45.687520 1622 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:46:45.690429 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:46:45.690553 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:46:46.053133 waagent[1553]: 2025-05-17T00:46:46.053037Z INFO Daemon Daemon Provisioning complete May 17 00:46:46.074966 waagent[1553]: 2025-05-17T00:46:46.074885Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping May 17 00:46:46.082164 waagent[1553]: 2025-05-17T00:46:46.082065Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. May 17 00:46:46.093914 waagent[1553]: 2025-05-17T00:46:46.093786Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent May 17 00:46:46.419793 waagent[1628]: 2025-05-17T00:46:46.419629Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent May 17 00:46:46.421058 waagent[1628]: 2025-05-17T00:46:46.420989Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file May 17 00:46:46.421323 waagent[1628]: 2025-05-17T00:46:46.421268Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 May 17 00:46:46.434799 waagent[1628]: 2025-05-17T00:46:46.434695Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. May 17 00:46:46.435228 waagent[1628]: 2025-05-17T00:46:46.435166Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] May 17 00:46:46.510824 waagent[1628]: 2025-05-17T00:46:46.510679Z INFO ExtHandler ExtHandler Found private key matching thumbprint 63FA20198F5DAF8E94FB638B3D38CB71AB4DC776 May 17 00:46:46.511286 waagent[1628]: 2025-05-17T00:46:46.511224Z INFO ExtHandler ExtHandler Certificate with thumbprint 308CFBDD16ACFCEC02C9FA6298A437F264EE07CC has no matching private key. May 17 00:46:46.511626 waagent[1628]: 2025-05-17T00:46:46.511570Z INFO ExtHandler ExtHandler Fetch goal state completed May 17 00:46:46.530049 waagent[1628]: 2025-05-17T00:46:46.529980Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: f5002220-7eda-46f3-b28b-1ca0c7eaaedc New eTag: 5384948063678469870] May 17 00:46:46.530911 waagent[1628]: 2025-05-17T00:46:46.530811Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob May 17 00:46:46.626439 waagent[1628]: 2025-05-17T00:46:46.626282Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.7; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; May 17 00:46:46.680761 waagent[1628]: 2025-05-17T00:46:46.680614Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1628 May 17 00:46:46.684908 waagent[1628]: 2025-05-17T00:46:46.684812Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.7', '', 'Flatcar Container Linux by Kinvolk'] May 17 00:46:46.686422 waagent[1628]: 2025-05-17T00:46:46.686357Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules May 17 00:46:46.797421 waagent[1628]: 2025-05-17T00:46:46.797353Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service May 17 00:46:46.798311 waagent[1628]: 2025-05-17T00:46:46.798093Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup May 17 00:46:46.807421 waagent[1628]: 2025-05-17T00:46:46.807351Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now May 17 00:46:46.808036 waagent[1628]: 2025-05-17T00:46:46.807972Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' May 17 00:46:46.809281 waagent[1628]: 2025-05-17T00:46:46.809207Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] May 17 00:46:46.810783 waagent[1628]: 2025-05-17T00:46:46.810700Z INFO ExtHandler ExtHandler Starting env monitor service. May 17 00:46:46.811533 waagent[1628]: 2025-05-17T00:46:46.811465Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file May 17 00:46:46.811823 waagent[1628]: 2025-05-17T00:46:46.811765Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 May 17 00:46:46.812582 waagent[1628]: 2025-05-17T00:46:46.812512Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. May 17 00:46:46.813075 waagent[1628]: 2025-05-17T00:46:46.813004Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: May 17 00:46:46.813075 waagent[1628]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT May 17 00:46:46.813075 waagent[1628]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 May 17 00:46:46.813075 waagent[1628]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 May 17 00:46:46.813075 waagent[1628]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 May 17 00:46:46.813075 waagent[1628]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 May 17 00:46:46.813075 waagent[1628]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 May 17 00:46:46.815934 waagent[1628]: 2025-05-17T00:46:46.815718Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. May 17 00:46:46.817195 waagent[1628]: 2025-05-17T00:46:46.817120Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file May 17 00:46:46.817484 waagent[1628]: 2025-05-17T00:46:46.817424Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 May 17 00:46:46.818247 waagent[1628]: 2025-05-17T00:46:46.818159Z INFO EnvHandler ExtHandler Configure routes May 17 00:46:46.818458 waagent[1628]: 2025-05-17T00:46:46.818404Z INFO ExtHandler ExtHandler Start Extension Telemetry service. May 17 00:46:46.818579 waagent[1628]: 2025-05-17T00:46:46.818313Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread May 17 00:46:46.819221 waagent[1628]: 2025-05-17T00:46:46.819095Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True May 17 00:46:46.819337 waagent[1628]: 2025-05-17T00:46:46.819266Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. May 17 00:46:46.819941 waagent[1628]: 2025-05-17T00:46:46.819842Z INFO EnvHandler ExtHandler Gateway:None May 17 00:46:46.821511 waagent[1628]: 2025-05-17T00:46:46.821437Z INFO EnvHandler ExtHandler Routes:None May 17 00:46:46.823077 waagent[1628]: 2025-05-17T00:46:46.823015Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread May 17 00:46:46.832228 waagent[1628]: 2025-05-17T00:46:46.832135Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) May 17 00:46:46.834022 waagent[1628]: 2025-05-17T00:46:46.833943Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required May 17 00:46:46.837682 waagent[1628]: 2025-05-17T00:46:46.837591Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' May 17 00:46:46.859785 waagent[1628]: 2025-05-17T00:46:46.859694Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1609' May 17 00:46:46.912364 waagent[1628]: 2025-05-17T00:46:46.912281Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. May 17 00:46:46.954310 waagent[1628]: 2025-05-17T00:46:46.954114Z INFO MonitorHandler ExtHandler Network interfaces: May 17 00:46:46.954310 waagent[1628]: Executing ['ip', '-a', '-o', 'link']: May 17 00:46:46.954310 waagent[1628]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 May 17 00:46:46.954310 waagent[1628]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:bc:82:d6 brd ff:ff:ff:ff:ff:ff May 17 00:46:46.954310 waagent[1628]: 3: enP23534s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:bc:82:d6 brd ff:ff:ff:ff:ff:ff\ altname enP23534p0s2 May 17 00:46:46.954310 waagent[1628]: Executing ['ip', '-4', '-a', '-o', 'address']: May 17 00:46:46.954310 waagent[1628]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever May 17 00:46:46.954310 waagent[1628]: 2: eth0 inet 10.200.20.42/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever May 17 00:46:46.954310 waagent[1628]: Executing ['ip', '-6', '-a', '-o', 'address']: May 17 00:46:46.954310 waagent[1628]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever May 17 00:46:46.954310 waagent[1628]: 2: eth0 inet6 fe80::222:48ff:febc:82d6/64 scope link \ valid_lft forever preferred_lft forever May 17 00:46:47.238556 waagent[1628]: 2025-05-17T00:46:47.238483Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.13.1.1 -- exiting May 17 00:46:48.099091 waagent[1553]: 2025-05-17T00:46:48.098956Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running May 17 00:46:48.103806 waagent[1553]: 2025-05-17T00:46:48.103746Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.13.1.1 to be the latest agent May 17 00:46:49.367516 waagent[1666]: 2025-05-17T00:46:49.367418Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.13.1.1) May 17 00:46:49.369398 waagent[1666]: 2025-05-17T00:46:49.369336Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.7 May 17 00:46:49.369648 waagent[1666]: 2025-05-17T00:46:49.369597Z INFO ExtHandler ExtHandler Python: 3.9.16 May 17 00:46:49.369893 waagent[1666]: 2025-05-17T00:46:49.369824Z INFO ExtHandler ExtHandler CPU Arch: aarch64 May 17 00:46:49.385061 waagent[1666]: 2025-05-17T00:46:49.384939Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.7; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; Arch: aarch64; systemd: True; systemd_version: systemd 252 (252); LISDrivers: Absent; logrotate: logrotate 3.20.1; May 17 00:46:49.385636 waagent[1666]: 2025-05-17T00:46:49.385577Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file May 17 00:46:49.385920 waagent[1666]: 2025-05-17T00:46:49.385844Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 May 17 00:46:49.386243 waagent[1666]: 2025-05-17T00:46:49.386189Z INFO ExtHandler ExtHandler Initializing the goal state... May 17 00:46:49.400253 waagent[1666]: 2025-05-17T00:46:49.400177Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] May 17 00:46:49.412288 waagent[1666]: 2025-05-17T00:46:49.412231Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.164 May 17 00:46:49.413525 waagent[1666]: 2025-05-17T00:46:49.413463Z INFO ExtHandler May 17 00:46:49.413784 waagent[1666]: 2025-05-17T00:46:49.413732Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: 1c11f8a3-7749-4b7e-bb54-7566ce484e3d eTag: 5384948063678469870 source: Fabric] May 17 00:46:49.414674 waagent[1666]: 2025-05-17T00:46:49.414615Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. May 17 00:46:49.416101 waagent[1666]: 2025-05-17T00:46:49.416040Z INFO ExtHandler May 17 00:46:49.416345 waagent[1666]: 2025-05-17T00:46:49.416294Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] May 17 00:46:49.423561 waagent[1666]: 2025-05-17T00:46:49.423508Z INFO ExtHandler ExtHandler Downloading artifacts profile blob May 17 00:46:49.424163 waagent[1666]: 2025-05-17T00:46:49.424112Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required May 17 00:46:49.444525 waagent[1666]: 2025-05-17T00:46:49.444459Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. May 17 00:46:49.523491 waagent[1666]: 2025-05-17T00:46:49.523317Z INFO ExtHandler Downloaded certificate {'thumbprint': '63FA20198F5DAF8E94FB638B3D38CB71AB4DC776', 'hasPrivateKey': True} May 17 00:46:49.524734 waagent[1666]: 2025-05-17T00:46:49.524664Z INFO ExtHandler Downloaded certificate {'thumbprint': '308CFBDD16ACFCEC02C9FA6298A437F264EE07CC', 'hasPrivateKey': False} May 17 00:46:49.525847 waagent[1666]: 2025-05-17T00:46:49.525779Z INFO ExtHandler Fetch goal state from WireServer completed May 17 00:46:49.526779 waagent[1666]: 2025-05-17T00:46:49.526711Z INFO ExtHandler ExtHandler Goal state initialization completed. May 17 00:46:49.549358 waagent[1666]: 2025-05-17T00:46:49.549232Z INFO ExtHandler ExtHandler OpenSSL version: OpenSSL 3.0.15 3 Sep 2024 (Library: OpenSSL 3.0.15 3 Sep 2024) May 17 00:46:49.558441 waagent[1666]: 2025-05-17T00:46:49.558306Z INFO ExtHandler ExtHandler Using iptables [version 1.8.8] to manage firewall rules May 17 00:46:49.562783 waagent[1666]: 2025-05-17T00:46:49.562649Z INFO ExtHandler ExtHandler Did not find a legacy firewall rule: ['iptables', '-w', '-t', 'security', '-C', 'OUTPUT', '-d', '168.63.129.16', '-p', 'tcp', '-m', 'conntrack', '--ctstate', 'INVALID,NEW', '-j', 'ACCEPT'] May 17 00:46:49.563029 waagent[1666]: 2025-05-17T00:46:49.562975Z INFO ExtHandler ExtHandler Checking state of the firewall May 17 00:46:49.606093 waagent[1666]: 2025-05-17T00:46:49.605951Z WARNING ExtHandler ExtHandler The firewall rules for Azure Fabric are not setup correctly (the environment thread will fix it): The following rules are missing: ['ACCEPT DNS', 'DROP'] due to: ['iptables: Bad rule (does a matching rule exist in that chain?).\n', 'iptables: Bad rule (does a matching rule exist in that chain?).\n']. Current state: May 17 00:46:49.606093 waagent[1666]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) May 17 00:46:49.606093 waagent[1666]: pkts bytes target prot opt in out source destination May 17 00:46:49.606093 waagent[1666]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) May 17 00:46:49.606093 waagent[1666]: pkts bytes target prot opt in out source destination May 17 00:46:49.606093 waagent[1666]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) May 17 00:46:49.606093 waagent[1666]: pkts bytes target prot opt in out source destination May 17 00:46:49.606093 waagent[1666]: 55 7859 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 May 17 00:46:49.607252 waagent[1666]: 2025-05-17T00:46:49.607186Z INFO ExtHandler ExtHandler Setting up persistent firewall rules May 17 00:46:49.610510 waagent[1666]: 2025-05-17T00:46:49.610381Z INFO ExtHandler ExtHandler The firewalld service is not present on the system May 17 00:46:49.610787 waagent[1666]: 2025-05-17T00:46:49.610732Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service May 17 00:46:49.611210 waagent[1666]: 2025-05-17T00:46:49.611150Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup May 17 00:46:49.619548 waagent[1666]: 2025-05-17T00:46:49.619450Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now May 17 00:46:49.620218 waagent[1666]: 2025-05-17T00:46:49.620157Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' May 17 00:46:49.628708 waagent[1666]: 2025-05-17T00:46:49.628640Z INFO ExtHandler ExtHandler WALinuxAgent-2.13.1.1 running as process 1666 May 17 00:46:49.632269 waagent[1666]: 2025-05-17T00:46:49.632185Z INFO ExtHandler ExtHandler [CGI] Cgroups is not currently supported on ['flatcar', '3510.3.7', '', 'Flatcar Container Linux by Kinvolk'] May 17 00:46:49.633297 waagent[1666]: 2025-05-17T00:46:49.633229Z INFO ExtHandler ExtHandler [CGI] Agent will reset the quotas in case cgroup usage went from enabled to disabled May 17 00:46:49.634383 waagent[1666]: 2025-05-17T00:46:49.634316Z INFO ExtHandler ExtHandler [CGI] Agent cgroups enabled: False May 17 00:46:49.637429 waagent[1666]: 2025-05-17T00:46:49.637350Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: 1. configuration enabled [True], 2. cgroups v1 enabled [False] OR cgroups v2 is in use and v2 resource limiting configuration enabled [False], 3. python supported: [True] May 17 00:46:49.639057 waagent[1666]: 2025-05-17T00:46:49.638979Z INFO ExtHandler ExtHandler Starting env monitor service. May 17 00:46:49.639311 waagent[1666]: 2025-05-17T00:46:49.639235Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file May 17 00:46:49.639739 waagent[1666]: 2025-05-17T00:46:49.639679Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 May 17 00:46:49.640580 waagent[1666]: 2025-05-17T00:46:49.640507Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. May 17 00:46:49.640903 waagent[1666]: 2025-05-17T00:46:49.640824Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: May 17 00:46:49.640903 waagent[1666]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT May 17 00:46:49.640903 waagent[1666]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 May 17 00:46:49.640903 waagent[1666]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 May 17 00:46:49.640903 waagent[1666]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 May 17 00:46:49.640903 waagent[1666]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 May 17 00:46:49.640903 waagent[1666]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 May 17 00:46:49.643485 waagent[1666]: 2025-05-17T00:46:49.643366Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. May 17 00:46:49.643915 waagent[1666]: 2025-05-17T00:46:49.643810Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file May 17 00:46:49.644689 waagent[1666]: 2025-05-17T00:46:49.644616Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 May 17 00:46:49.645905 waagent[1666]: 2025-05-17T00:46:49.645085Z INFO EnvHandler ExtHandler Configure routes May 17 00:46:49.647375 waagent[1666]: 2025-05-17T00:46:49.647233Z INFO EnvHandler ExtHandler Gateway:None May 17 00:46:49.647683 waagent[1666]: 2025-05-17T00:46:49.647614Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread May 17 00:46:49.647924 waagent[1666]: 2025-05-17T00:46:49.647826Z INFO ExtHandler ExtHandler Start Extension Telemetry service. May 17 00:46:49.648639 waagent[1666]: 2025-05-17T00:46:49.648557Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True May 17 00:46:49.649203 waagent[1666]: 2025-05-17T00:46:49.649124Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. May 17 00:46:49.649455 waagent[1666]: 2025-05-17T00:46:49.649387Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread May 17 00:46:49.650050 waagent[1666]: 2025-05-17T00:46:49.649981Z INFO EnvHandler ExtHandler Routes:None May 17 00:46:49.661223 waagent[1666]: 2025-05-17T00:46:49.661133Z INFO MonitorHandler ExtHandler Network interfaces: May 17 00:46:49.661223 waagent[1666]: Executing ['ip', '-a', '-o', 'link']: May 17 00:46:49.661223 waagent[1666]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 May 17 00:46:49.661223 waagent[1666]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:bc:82:d6 brd ff:ff:ff:ff:ff:ff May 17 00:46:49.661223 waagent[1666]: 3: enP23534s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:bc:82:d6 brd ff:ff:ff:ff:ff:ff\ altname enP23534p0s2 May 17 00:46:49.661223 waagent[1666]: Executing ['ip', '-4', '-a', '-o', 'address']: May 17 00:46:49.661223 waagent[1666]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever May 17 00:46:49.661223 waagent[1666]: 2: eth0 inet 10.200.20.42/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever May 17 00:46:49.661223 waagent[1666]: Executing ['ip', '-6', '-a', '-o', 'address']: May 17 00:46:49.661223 waagent[1666]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever May 17 00:46:49.661223 waagent[1666]: 2: eth0 inet6 fe80::222:48ff:febc:82d6/64 scope link \ valid_lft forever preferred_lft forever May 17 00:46:49.679032 waagent[1666]: 2025-05-17T00:46:49.678939Z INFO ExtHandler ExtHandler Downloading agent manifest May 17 00:46:49.714018 waagent[1666]: 2025-05-17T00:46:49.713943Z INFO ExtHandler ExtHandler May 17 00:46:49.714532 waagent[1666]: 2025-05-17T00:46:49.714471Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: 9fffa0c7-03a4-4228-8f58-fc867d717c2d correlation 82846bfa-5f0f-43a1-81c2-efaa30089b95 created: 2025-05-17T00:45:13.560692Z] May 17 00:46:49.715655 waagent[1666]: 2025-05-17T00:46:49.715589Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. May 17 00:46:49.717855 waagent[1666]: 2025-05-17T00:46:49.717790Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 3 ms] May 17 00:46:49.727397 waagent[1666]: 2025-05-17T00:46:49.727289Z INFO EnvHandler ExtHandler Using iptables [version 1.8.8] to manage firewall rules May 17 00:46:49.750040 waagent[1666]: 2025-05-17T00:46:49.749948Z INFO ExtHandler ExtHandler Looking for existing remote access users. May 17 00:46:49.754316 waagent[1666]: 2025-05-17T00:46:49.754237Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.13.1.1 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: 86D14149-88D2-4554-BB90-066451D233AE;UpdateGSErrors: 0;AutoUpdate: 1;UpdateMode: SelfUpdate;] May 17 00:46:49.754970 waagent[1666]: 2025-05-17T00:46:49.754897Z WARNING EnvHandler ExtHandler The firewall is not configured correctly. The following rules are missing: ['ACCEPT DNS', 'DROP'] due to: ['iptables: Bad rule (does a matching rule exist in that chain?).\n', 'iptables: Bad rule (does a matching rule exist in that chain?).\n']. Will reset it. Current state: May 17 00:46:49.754970 waagent[1666]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) May 17 00:46:49.754970 waagent[1666]: pkts bytes target prot opt in out source destination May 17 00:46:49.754970 waagent[1666]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) May 17 00:46:49.754970 waagent[1666]: pkts bytes target prot opt in out source destination May 17 00:46:49.754970 waagent[1666]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) May 17 00:46:49.754970 waagent[1666]: pkts bytes target prot opt in out source destination May 17 00:46:49.754970 waagent[1666]: 89 14808 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 May 17 00:46:49.800855 waagent[1666]: 2025-05-17T00:46:49.800726Z INFO EnvHandler ExtHandler The firewall was setup successfully: May 17 00:46:49.800855 waagent[1666]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) May 17 00:46:49.800855 waagent[1666]: pkts bytes target prot opt in out source destination May 17 00:46:49.800855 waagent[1666]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) May 17 00:46:49.800855 waagent[1666]: pkts bytes target prot opt in out source destination May 17 00:46:49.800855 waagent[1666]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) May 17 00:46:49.800855 waagent[1666]: pkts bytes target prot opt in out source destination May 17 00:46:49.800855 waagent[1666]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 May 17 00:46:49.800855 waagent[1666]: 4 595 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 May 17 00:46:49.800855 waagent[1666]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW May 17 00:46:49.803533 waagent[1666]: 2025-05-17T00:46:49.803457Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 May 17 00:46:55.707550 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. May 17 00:46:55.707717 systemd[1]: Stopped kubelet.service. May 17 00:46:55.709133 systemd[1]: Starting kubelet.service... May 17 00:46:55.805117 systemd[1]: Started kubelet.service. May 17 00:46:55.945349 kubelet[1716]: E0517 00:46:55.945302 1716 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:46:55.947557 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:46:55.947687 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:47:00.440818 systemd[1]: Created slice system-sshd.slice. May 17 00:47:00.442526 systemd[1]: Started sshd@0-10.200.20.42:22-10.200.16.10:34908.service. May 17 00:47:01.113844 sshd[1723]: Accepted publickey for core from 10.200.16.10 port 34908 ssh2: RSA SHA256:kTalk4vvVOHJD+odK+kI4Z4CxTmNI3TSVyFiPn8PnHg May 17 00:47:01.132455 sshd[1723]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:47:01.136844 systemd-logind[1439]: New session 3 of user core. May 17 00:47:01.137318 systemd[1]: Started session-3.scope. May 17 00:47:01.551050 systemd[1]: Started sshd@1-10.200.20.42:22-10.200.16.10:34916.service. May 17 00:47:02.040466 sshd[1728]: Accepted publickey for core from 10.200.16.10 port 34916 ssh2: RSA SHA256:kTalk4vvVOHJD+odK+kI4Z4CxTmNI3TSVyFiPn8PnHg May 17 00:47:02.041721 sshd[1728]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:47:02.045614 systemd-logind[1439]: New session 4 of user core. May 17 00:47:02.046046 systemd[1]: Started session-4.scope. May 17 00:47:02.411235 sshd[1728]: pam_unix(sshd:session): session closed for user core May 17 00:47:02.414403 systemd[1]: sshd@1-10.200.20.42:22-10.200.16.10:34916.service: Deactivated successfully. May 17 00:47:02.415144 systemd[1]: session-4.scope: Deactivated successfully. May 17 00:47:02.415682 systemd-logind[1439]: Session 4 logged out. Waiting for processes to exit. May 17 00:47:02.416490 systemd-logind[1439]: Removed session 4. May 17 00:47:02.486206 systemd[1]: Started sshd@2-10.200.20.42:22-10.200.16.10:34920.service. May 17 00:47:02.945472 sshd[1734]: Accepted publickey for core from 10.200.16.10 port 34920 ssh2: RSA SHA256:kTalk4vvVOHJD+odK+kI4Z4CxTmNI3TSVyFiPn8PnHg May 17 00:47:02.947104 sshd[1734]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:47:02.951711 systemd[1]: Started session-5.scope. May 17 00:47:02.952753 systemd-logind[1439]: New session 5 of user core. May 17 00:47:03.284486 sshd[1734]: pam_unix(sshd:session): session closed for user core May 17 00:47:03.287370 systemd[1]: sshd@2-10.200.20.42:22-10.200.16.10:34920.service: Deactivated successfully. May 17 00:47:03.288069 systemd[1]: session-5.scope: Deactivated successfully. May 17 00:47:03.288576 systemd-logind[1439]: Session 5 logged out. Waiting for processes to exit. May 17 00:47:03.289416 systemd-logind[1439]: Removed session 5. May 17 00:47:03.363310 systemd[1]: Started sshd@3-10.200.20.42:22-10.200.16.10:34934.service. May 17 00:47:03.847062 sshd[1740]: Accepted publickey for core from 10.200.16.10 port 34934 ssh2: RSA SHA256:kTalk4vvVOHJD+odK+kI4Z4CxTmNI3TSVyFiPn8PnHg May 17 00:47:03.848327 sshd[1740]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:47:03.852179 systemd-logind[1439]: New session 6 of user core. May 17 00:47:03.852635 systemd[1]: Started session-6.scope. May 17 00:47:04.194702 sshd[1740]: pam_unix(sshd:session): session closed for user core May 17 00:47:04.197974 systemd[1]: sshd@3-10.200.20.42:22-10.200.16.10:34934.service: Deactivated successfully. May 17 00:47:04.199003 systemd[1]: session-6.scope: Deactivated successfully. May 17 00:47:04.199733 systemd-logind[1439]: Session 6 logged out. Waiting for processes to exit. May 17 00:47:04.200827 systemd-logind[1439]: Removed session 6. May 17 00:47:04.275278 systemd[1]: Started sshd@4-10.200.20.42:22-10.200.16.10:34936.service. May 17 00:47:04.758412 sshd[1746]: Accepted publickey for core from 10.200.16.10 port 34936 ssh2: RSA SHA256:kTalk4vvVOHJD+odK+kI4Z4CxTmNI3TSVyFiPn8PnHg May 17 00:47:04.759676 sshd[1746]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:47:04.763893 systemd[1]: Started session-7.scope. May 17 00:47:04.764186 systemd-logind[1439]: New session 7 of user core. May 17 00:47:05.373112 sudo[1749]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 17 00:47:05.373698 sudo[1749]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:47:05.418057 dbus-daemon[1425]: avc: received setenforce notice (enforcing=1) May 17 00:47:05.419949 sudo[1749]: pam_unix(sudo:session): session closed for user root May 17 00:47:05.543447 sshd[1746]: pam_unix(sshd:session): session closed for user core May 17 00:47:05.546910 systemd-logind[1439]: Session 7 logged out. Waiting for processes to exit. May 17 00:47:05.546917 systemd[1]: sshd@4-10.200.20.42:22-10.200.16.10:34936.service: Deactivated successfully. May 17 00:47:05.547714 systemd[1]: session-7.scope: Deactivated successfully. May 17 00:47:05.548561 systemd-logind[1439]: Removed session 7. May 17 00:47:05.620555 systemd[1]: Started sshd@5-10.200.20.42:22-10.200.16.10:34946.service. May 17 00:47:05.957580 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. May 17 00:47:05.957766 systemd[1]: Stopped kubelet.service. May 17 00:47:05.959286 systemd[1]: Starting kubelet.service... May 17 00:47:06.111293 sshd[1753]: Accepted publickey for core from 10.200.16.10 port 34946 ssh2: RSA SHA256:kTalk4vvVOHJD+odK+kI4Z4CxTmNI3TSVyFiPn8PnHg May 17 00:47:06.112706 sshd[1753]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:47:06.117220 systemd[1]: Started session-8.scope. May 17 00:47:06.117738 systemd-logind[1439]: New session 8 of user core. May 17 00:47:06.126919 systemd[1]: Started kubelet.service. May 17 00:47:06.186973 kubelet[1760]: E0517 00:47:06.186935 1760 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:47:06.189092 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:47:06.189212 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:47:06.380216 sudo[1766]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 17 00:47:06.380434 sudo[1766]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:47:06.383387 sudo[1766]: pam_unix(sudo:session): session closed for user root May 17 00:47:06.388061 sudo[1765]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 17 00:47:06.388278 sudo[1765]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:47:06.397214 systemd[1]: Stopping audit-rules.service... May 17 00:47:06.397000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 17 00:47:06.402353 kernel: kauditd_printk_skb: 137 callbacks suppressed May 17 00:47:06.402435 kernel: audit: type=1305 audit(1747442826.397:219): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 17 00:47:06.402684 auditctl[1769]: No rules May 17 00:47:06.403195 systemd[1]: audit-rules.service: Deactivated successfully. May 17 00:47:06.403384 systemd[1]: Stopped audit-rules.service. May 17 00:47:06.397000 audit[1769]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffe5d8bea0 a2=420 a3=0 items=0 ppid=1 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:06.415494 systemd[1]: Starting audit-rules.service... May 17 00:47:06.436905 kernel: audit: type=1300 audit(1747442826.397:219): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffe5d8bea0 a2=420 a3=0 items=0 ppid=1 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:06.397000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 17 00:47:06.444920 kernel: audit: type=1327 audit(1747442826.397:219): proctitle=2F7362696E2F617564697463746C002D44 May 17 00:47:06.402000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:06.461838 kernel: audit: type=1131 audit(1747442826.402:220): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:06.465669 augenrules[1786]: No rules May 17 00:47:06.467523 sudo[1765]: pam_unix(sudo:session): session closed for user root May 17 00:47:06.466458 systemd[1]: Finished audit-rules.service. May 17 00:47:06.465000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:06.466000 audit[1765]: USER_END pid=1765 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:47:06.505601 kernel: audit: type=1130 audit(1747442826.465:221): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:06.505683 kernel: audit: type=1106 audit(1747442826.466:222): pid=1765 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:47:06.466000 audit[1765]: CRED_DISP pid=1765 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:47:06.523048 kernel: audit: type=1104 audit(1747442826.466:223): pid=1765 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:47:06.564092 sshd[1753]: pam_unix(sshd:session): session closed for user core May 17 00:47:06.564000 audit[1753]: USER_END pid=1753 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:47:06.566443 systemd[1]: session-8.scope: Deactivated successfully. May 17 00:47:06.567036 systemd[1]: sshd@5-10.200.20.42:22-10.200.16.10:34946.service: Deactivated successfully. May 17 00:47:06.564000 audit[1753]: CRED_DISP pid=1753 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:47:06.607927 kernel: audit: type=1106 audit(1747442826.564:224): pid=1753 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:47:06.608009 kernel: audit: type=1104 audit(1747442826.564:225): pid=1753 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:47:06.564000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.42:22-10.200.16.10:34946 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:06.608178 systemd-logind[1439]: Session 8 logged out. Waiting for processes to exit. May 17 00:47:06.626226 kernel: audit: type=1131 audit(1747442826.564:226): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.42:22-10.200.16.10:34946 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:06.626791 systemd-logind[1439]: Removed session 8. May 17 00:47:06.662000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.42:22-10.200.16.10:34950 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:06.663183 systemd[1]: Started sshd@6-10.200.20.42:22-10.200.16.10:34950.service. May 17 00:47:07.116000 audit[1792]: USER_ACCT pid=1792 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:47:07.117189 sshd[1792]: Accepted publickey for core from 10.200.16.10 port 34950 ssh2: RSA SHA256:kTalk4vvVOHJD+odK+kI4Z4CxTmNI3TSVyFiPn8PnHg May 17 00:47:07.117000 audit[1792]: CRED_ACQ pid=1792 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:47:07.117000 audit[1792]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffeaf08090 a2=3 a3=1 items=0 ppid=1 pid=1792 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:07.117000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:47:07.118794 sshd[1792]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:47:07.122823 systemd-logind[1439]: New session 9 of user core. May 17 00:47:07.123284 systemd[1]: Started session-9.scope. May 17 00:47:07.126000 audit[1792]: USER_START pid=1792 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:47:07.128000 audit[1794]: CRED_ACQ pid=1794 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:47:07.370000 audit[1795]: USER_ACCT pid=1795 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:47:07.371793 sudo[1795]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 17 00:47:07.371000 audit[1795]: CRED_REFR pid=1795 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:47:07.372358 sudo[1795]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:47:07.373000 audit[1795]: USER_START pid=1795 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:47:07.395023 systemd[1]: Starting docker.service... May 17 00:47:07.429488 env[1806]: time="2025-05-17T00:47:07.429433749Z" level=info msg="Starting up" May 17 00:47:07.430992 env[1806]: time="2025-05-17T00:47:07.430958666Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 17 00:47:07.430992 env[1806]: time="2025-05-17T00:47:07.430984466Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 17 00:47:07.431128 env[1806]: time="2025-05-17T00:47:07.431005666Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 17 00:47:07.431128 env[1806]: time="2025-05-17T00:47:07.431015866Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 17 00:47:07.432813 env[1806]: time="2025-05-17T00:47:07.432781663Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 17 00:47:07.432813 env[1806]: time="2025-05-17T00:47:07.432806943Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 17 00:47:07.432955 env[1806]: time="2025-05-17T00:47:07.432822903Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 17 00:47:07.432955 env[1806]: time="2025-05-17T00:47:07.432833143Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 17 00:47:07.536445 env[1806]: time="2025-05-17T00:47:07.535819493Z" level=info msg="Loading containers: start." May 17 00:47:07.675000 audit[1834]: NETFILTER_CFG table=nat:7 family=2 entries=2 op=nft_register_chain pid=1834 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:07.675000 audit[1834]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=116 a0=3 a1=fffffee2d3f0 a2=0 a3=1 items=0 ppid=1806 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:07.675000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 May 17 00:47:07.677000 audit[1836]: NETFILTER_CFG table=filter:8 family=2 entries=2 op=nft_register_chain pid=1836 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:07.677000 audit[1836]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=ffffcd227750 a2=0 a3=1 items=0 ppid=1806 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:07.677000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 May 17 00:47:07.679000 audit[1838]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_chain pid=1838 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:07.679000 audit[1838]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffd4e2e290 a2=0 a3=1 items=0 ppid=1806 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:07.679000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 17 00:47:07.682000 audit[1840]: NETFILTER_CFG table=filter:10 family=2 entries=1 op=nft_register_chain pid=1840 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:07.682000 audit[1840]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffcb4e6b10 a2=0 a3=1 items=0 ppid=1806 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:07.682000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 17 00:47:07.684000 audit[1842]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_rule pid=1842 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:07.684000 audit[1842]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffdd96a650 a2=0 a3=1 items=0 ppid=1806 pid=1842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:07.684000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E May 17 00:47:07.686000 audit[1844]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1844 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:07.686000 audit[1844]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffdc110490 a2=0 a3=1 items=0 ppid=1806 pid=1844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:07.686000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E May 17 00:47:07.715000 audit[1846]: NETFILTER_CFG table=filter:13 family=2 entries=1 op=nft_register_chain pid=1846 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:07.715000 audit[1846]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffc06307d0 a2=0 a3=1 items=0 ppid=1806 pid=1846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:07.715000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 May 17 00:47:07.717000 audit[1848]: NETFILTER_CFG table=filter:14 family=2 entries=1 op=nft_register_rule pid=1848 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:07.717000 audit[1848]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=212 a0=3 a1=ffffc69507e0 a2=0 a3=1 items=0 ppid=1806 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:07.717000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E May 17 00:47:07.719000 audit[1850]: NETFILTER_CFG table=filter:15 family=2 entries=2 op=nft_register_chain pid=1850 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:07.719000 audit[1850]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=308 a0=3 a1=ffffe2a3a2a0 a2=0 a3=1 items=0 ppid=1806 pid=1850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:07.719000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 17 00:47:07.740000 audit[1854]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_unregister_rule pid=1854 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:07.740000 audit[1854]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffc3239150 a2=0 a3=1 items=0 ppid=1806 pid=1854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:07.740000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 17 00:47:07.752000 audit[1855]: NETFILTER_CFG table=filter:17 family=2 entries=1 op=nft_register_rule pid=1855 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:07.752000 audit[1855]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=fffffd7d79f0 a2=0 a3=1 items=0 ppid=1806 pid=1855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:07.752000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 17 00:47:07.792912 kernel: Initializing XFRM netlink socket May 17 00:47:07.829995 env[1806]: time="2025-05-17T00:47:07.829955208Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" May 17 00:47:07.954000 audit[1863]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1863 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:07.954000 audit[1863]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=492 a0=3 a1=ffffe4e0d290 a2=0 a3=1 items=0 ppid=1806 pid=1863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:07.954000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 May 17 00:47:07.979000 audit[1866]: NETFILTER_CFG table=nat:19 family=2 entries=1 op=nft_register_rule pid=1866 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:07.979000 audit[1866]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=288 a0=3 a1=fffffed9adb0 a2=0 a3=1 items=0 ppid=1806 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:07.979000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E May 17 00:47:07.982000 audit[1869]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1869 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:07.982000 audit[1869]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffc7d99110 a2=0 a3=1 items=0 ppid=1806 pid=1869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:07.982000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 May 17 00:47:07.984000 audit[1871]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1871 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:07.984000 audit[1871]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffcbdcf010 a2=0 a3=1 items=0 ppid=1806 pid=1871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:07.984000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 May 17 00:47:07.987000 audit[1873]: NETFILTER_CFG table=nat:22 family=2 entries=2 op=nft_register_chain pid=1873 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:07.987000 audit[1873]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=356 a0=3 a1=fffffdbbd130 a2=0 a3=1 items=0 ppid=1806 pid=1873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:07.987000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 May 17 00:47:07.989000 audit[1875]: NETFILTER_CFG table=nat:23 family=2 entries=2 op=nft_register_chain pid=1875 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:07.989000 audit[1875]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=444 a0=3 a1=ffffe7a16f00 a2=0 a3=1 items=0 ppid=1806 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:07.989000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 May 17 00:47:07.991000 audit[1877]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1877 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:07.991000 audit[1877]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=ffffca4a5cb0 a2=0 a3=1 items=0 ppid=1806 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:07.991000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 May 17 00:47:07.993000 audit[1879]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1879 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:07.993000 audit[1879]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=508 a0=3 a1=fffff96def60 a2=0 a3=1 items=0 ppid=1806 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:07.993000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 May 17 00:47:07.995000 audit[1881]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1881 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:07.995000 audit[1881]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=240 a0=3 a1=ffffcd2b72b0 a2=0 a3=1 items=0 ppid=1806 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:07.995000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 17 00:47:07.997000 audit[1883]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1883 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:07.997000 audit[1883]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=428 a0=3 a1=ffffefa285e0 a2=0 a3=1 items=0 ppid=1806 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:07.997000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 17 00:47:07.999000 audit[1885]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_rule pid=1885 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:07.999000 audit[1885]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffe4f03460 a2=0 a3=1 items=0 ppid=1806 pid=1885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:07.999000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 May 17 00:47:08.001466 systemd-networkd[1609]: docker0: Link UP May 17 00:47:08.026000 audit[1889]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_unregister_rule pid=1889 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:08.026000 audit[1889]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffc8201930 a2=0 a3=1 items=0 ppid=1806 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:08.026000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 17 00:47:08.029000 audit[1890]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1890 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:08.029000 audit[1890]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffc6a41260 a2=0 a3=1 items=0 ppid=1806 pid=1890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:08.029000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 17 00:47:08.031360 env[1806]: time="2025-05-17T00:47:08.031320318Z" level=info msg="Loading containers: done." May 17 00:47:08.040736 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck287393659-merged.mount: Deactivated successfully. May 17 00:47:08.084458 env[1806]: time="2025-05-17T00:47:08.084407516Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 May 17 00:47:08.084660 env[1806]: time="2025-05-17T00:47:08.084612916Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 May 17 00:47:08.084758 env[1806]: time="2025-05-17T00:47:08.084733076Z" level=info msg="Daemon has completed initialization" May 17 00:47:08.135000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:08.136135 systemd[1]: Started docker.service. May 17 00:47:08.141344 env[1806]: time="2025-05-17T00:47:08.141277708Z" level=info msg="API listen on /run/docker.sock" May 17 00:47:09.307271 env[1452]: time="2025-05-17T00:47:09.307219533Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.9\"" May 17 00:47:10.305960 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1632609847.mount: Deactivated successfully. May 17 00:47:12.382917 env[1452]: time="2025-05-17T00:47:12.382836834Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.31.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:47:12.390102 env[1452]: time="2025-05-17T00:47:12.390041185Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:90d52158b7646075e7e560c1bd670904ba3f4f4c8c199106bf96ee0944663d61,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:47:12.394440 env[1452]: time="2025-05-17T00:47:12.394398340Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.31.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:47:12.400102 env[1452]: time="2025-05-17T00:47:12.400067253Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:5b68f0df22013422dc8fb9ddfcff513eb6fc92f9dbf8aae41555c895efef5a20,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:47:12.400830 env[1452]: time="2025-05-17T00:47:12.400796852Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.9\" returns image reference \"sha256:90d52158b7646075e7e560c1bd670904ba3f4f4c8c199106bf96ee0944663d61\"" May 17 00:47:12.402103 env[1452]: time="2025-05-17T00:47:12.402066131Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.9\"" May 17 00:47:13.373888 kernel: hv_balloon: Max. dynamic memory size: 4096 MB May 17 00:47:14.636786 env[1452]: time="2025-05-17T00:47:14.636735425Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.31.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:47:14.643953 env[1452]: time="2025-05-17T00:47:14.643907057Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2d03fe540daca1d9520c403342787715eab3b05fb6773ea41153572716c82dba,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:47:14.649813 env[1452]: time="2025-05-17T00:47:14.649772891Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.31.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:47:14.655556 env[1452]: time="2025-05-17T00:47:14.655521685Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:be9e7987d323b38a12e28436cff6d6ec6fc31ffdd3ea11eaa9d74852e9d31248,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:47:14.656328 env[1452]: time="2025-05-17T00:47:14.656295884Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.9\" returns image reference \"sha256:2d03fe540daca1d9520c403342787715eab3b05fb6773ea41153572716c82dba\"" May 17 00:47:14.657597 env[1452]: time="2025-05-17T00:47:14.657565203Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.9\"" May 17 00:47:16.207595 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. May 17 00:47:16.228444 kernel: kauditd_printk_skb: 84 callbacks suppressed May 17 00:47:16.228487 kernel: audit: type=1130 audit(1747442836.206:261): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:16.206000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:16.207769 systemd[1]: Stopped kubelet.service. May 17 00:47:16.209239 systemd[1]: Starting kubelet.service... May 17 00:47:16.206000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:16.259498 kernel: audit: type=1131 audit(1747442836.206:262): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:16.325000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:16.326471 systemd[1]: Started kubelet.service. May 17 00:47:16.344887 kernel: audit: type=1130 audit(1747442836.325:263): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:16.392705 kubelet[1928]: E0517 00:47:16.392642 1928 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:47:16.393000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 17 00:47:16.394146 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:47:16.394263 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:47:16.412906 kernel: audit: type=1131 audit(1747442836.393:264): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 17 00:47:16.744684 env[1452]: time="2025-05-17T00:47:16.744637010Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.31.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:47:16.753653 env[1452]: time="2025-05-17T00:47:16.753604362Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b333fec06af219faaf48f1784baa0b7274945b2e5be5bd2fca2681f7d1baff5f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:47:16.763599 env[1452]: time="2025-05-17T00:47:16.763548513Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.31.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:47:16.770211 env[1452]: time="2025-05-17T00:47:16.770165626Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:eb358c7346bb17ab2c639c3ff8ab76a147dec7ae609f5c0c2800233e42253ed1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:47:16.770755 env[1452]: time="2025-05-17T00:47:16.770724346Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.9\" returns image reference \"sha256:b333fec06af219faaf48f1784baa0b7274945b2e5be5bd2fca2681f7d1baff5f\"" May 17 00:47:16.771231 env[1452]: time="2025-05-17T00:47:16.771201745Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.9\"" May 17 00:47:18.220967 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2874355172.mount: Deactivated successfully. May 17 00:47:18.802419 env[1452]: time="2025-05-17T00:47:18.802356537Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.31.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:47:18.809795 env[1452]: time="2025-05-17T00:47:18.809744451Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbfba5e6542fe387b24d9e73bf5a054a6b07b95af1392268fd82b6f449ef1c27,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:47:18.814603 env[1452]: time="2025-05-17T00:47:18.814555927Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.31.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:47:18.822855 env[1452]: time="2025-05-17T00:47:18.822806400Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:fdf026cf2434537e499e9c739d189ca8fc57101d929ac5ccd8e24f979a9738c1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:47:18.823258 env[1452]: time="2025-05-17T00:47:18.823221880Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.9\" returns image reference \"sha256:cbfba5e6542fe387b24d9e73bf5a054a6b07b95af1392268fd82b6f449ef1c27\"" May 17 00:47:18.823981 env[1452]: time="2025-05-17T00:47:18.823955039Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\"" May 17 00:47:19.463259 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2266929320.mount: Deactivated successfully. May 17 00:47:20.098362 update_engine[1443]: I0517 00:47:20.097956 1443 update_attempter.cc:509] Updating boot flags... May 17 00:47:21.346321 env[1452]: time="2025-05-17T00:47:21.346267950Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:47:21.354651 env[1452]: time="2025-05-17T00:47:21.354604584Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2f6c962e7b8311337352d9fdea917da2184d9919f4da7695bc2a6517cf392fe4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:47:21.359450 env[1452]: time="2025-05-17T00:47:21.359409181Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:47:21.370777 env[1452]: time="2025-05-17T00:47:21.370728054Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:9caabbf6238b189a65d0d6e6ac138de60d6a1c419e5a341fbbb7c78382559c6e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:47:21.371710 env[1452]: time="2025-05-17T00:47:21.371680533Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\" returns image reference \"sha256:2f6c962e7b8311337352d9fdea917da2184d9919f4da7695bc2a6517cf392fe4\"" May 17 00:47:21.372363 env[1452]: time="2025-05-17T00:47:21.372336173Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" May 17 00:47:22.119175 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount768949620.mount: Deactivated successfully. May 17 00:47:22.163494 env[1452]: time="2025-05-17T00:47:22.163429770Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:47:22.174148 env[1452]: time="2025-05-17T00:47:22.174100523Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:afb61768ce381961ca0beff95337601f29dc70ff3ed14e5e4b3e5699057e6aa8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:47:22.178943 env[1452]: time="2025-05-17T00:47:22.178912760Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:47:22.185919 env[1452]: time="2025-05-17T00:47:22.185881636Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:47:22.186502 env[1452]: time="2025-05-17T00:47:22.186473836Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:afb61768ce381961ca0beff95337601f29dc70ff3ed14e5e4b3e5699057e6aa8\"" May 17 00:47:22.187010 env[1452]: time="2025-05-17T00:47:22.186979395Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\"" May 17 00:47:22.947294 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3121731160.mount: Deactivated successfully. May 17 00:47:26.457585 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 5. May 17 00:47:26.457783 systemd[1]: Stopped kubelet.service. May 17 00:47:26.456000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:26.459409 systemd[1]: Starting kubelet.service... May 17 00:47:26.456000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:26.499367 kernel: audit: type=1130 audit(1747442846.456:265): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:26.499473 kernel: audit: type=1131 audit(1747442846.456:266): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:27.589000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:27.590106 systemd[1]: Started kubelet.service. May 17 00:47:27.608911 kernel: audit: type=1130 audit(1747442847.589:267): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:27.648242 kubelet[2035]: E0517 00:47:27.648175 2035 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:47:27.650106 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:47:27.650241 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:47:27.649000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 17 00:47:27.669886 kernel: audit: type=1131 audit(1747442847.649:268): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 17 00:47:28.139465 env[1452]: time="2025-05-17T00:47:28.139390431Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:47:28.149961 env[1452]: time="2025-05-17T00:47:28.149914427Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:27e3830e1402783674d8b594038967deea9d51f0d91b34c93c8f39d2f68af7da,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:47:28.157252 env[1452]: time="2025-05-17T00:47:28.157217784Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:47:28.170125 env[1452]: time="2025-05-17T00:47:28.170074258Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:a6dc63e6e8cfa0307d7851762fa6b629afb18f28d8aa3fab5a6e91b4af60026a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:47:28.171204 env[1452]: time="2025-05-17T00:47:28.171169898Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\" returns image reference \"sha256:27e3830e1402783674d8b594038967deea9d51f0d91b34c93c8f39d2f68af7da\"" May 17 00:47:32.358099 systemd[1]: Stopped kubelet.service. May 17 00:47:32.358000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:32.377703 systemd[1]: Starting kubelet.service... May 17 00:47:32.358000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:32.396906 kernel: audit: type=1130 audit(1747442852.358:269): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:32.397136 kernel: audit: type=1131 audit(1747442852.358:270): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:32.424325 systemd[1]: Reloading. May 17 00:47:32.514225 /usr/lib/systemd/system-generators/torcx-generator[2085]: time="2025-05-17T00:47:32Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:47:32.514572 /usr/lib/systemd/system-generators/torcx-generator[2085]: time="2025-05-17T00:47:32Z" level=info msg="torcx already run" May 17 00:47:32.589919 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:47:32.590098 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:47:32.605671 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:47:32.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.718617 kernel: audit: type=1400 audit(1747442852.680:271): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.718706 kernel: audit: type=1400 audit(1747442852.680:272): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.736921 kernel: audit: type=1400 audit(1747442852.680:273): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.737012 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 17 00:47:32.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.761494 kernel: audit: type=1400 audit(1747442852.680:274): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.761604 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 May 17 00:47:32.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.789802 kernel: audit: type=1400 audit(1747442852.680:275): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.789931 kernel: audit: backlog limit exceeded May 17 00:47:32.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.697000 audit: BPF prog-id=44 op=LOAD May 17 00:47:32.697000 audit: BPF prog-id=43 op=UNLOAD May 17 00:47:32.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.698000 audit: BPF prog-id=45 op=LOAD May 17 00:47:32.698000 audit: BPF prog-id=28 op=UNLOAD May 17 00:47:32.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.698000 audit: BPF prog-id=46 op=LOAD May 17 00:47:32.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.698000 audit: BPF prog-id=47 op=LOAD May 17 00:47:32.698000 audit: BPF prog-id=29 op=UNLOAD May 17 00:47:32.698000 audit: BPF prog-id=30 op=UNLOAD May 17 00:47:32.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.718000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.718000 audit: BPF prog-id=48 op=LOAD May 17 00:47:32.718000 audit: BPF prog-id=37 op=UNLOAD May 17 00:47:32.718000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.718000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.718000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.718000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.718000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.718000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.718000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.718000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.718000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.767000 audit: BPF prog-id=31 op=UNLOAD May 17 00:47:32.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.789000 audit: BPF prog-id=51 op=LOAD May 17 00:47:32.789000 audit: BPF prog-id=32 op=UNLOAD May 17 00:47:32.789000 audit: BPF prog-id=33 op=UNLOAD May 17 00:47:32.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.790000 audit: BPF prog-id=52 op=LOAD May 17 00:47:32.790000 audit: BPF prog-id=38 op=UNLOAD May 17 00:47:32.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.790000 audit: BPF prog-id=53 op=LOAD May 17 00:47:32.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.790000 audit: BPF prog-id=54 op=LOAD May 17 00:47:32.790000 audit: BPF prog-id=39 op=UNLOAD May 17 00:47:32.790000 audit: BPF prog-id=40 op=UNLOAD May 17 00:47:32.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.790000 audit: BPF prog-id=55 op=LOAD May 17 00:47:32.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.791000 audit: BPF prog-id=56 op=LOAD May 17 00:47:32.791000 audit: BPF prog-id=34 op=UNLOAD May 17 00:47:32.791000 audit: BPF prog-id=35 op=UNLOAD May 17 00:47:32.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.791000 audit: BPF prog-id=57 op=LOAD May 17 00:47:32.791000 audit: BPF prog-id=41 op=UNLOAD May 17 00:47:32.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:32.794000 audit: BPF prog-id=58 op=LOAD May 17 00:47:32.794000 audit: BPF prog-id=36 op=UNLOAD May 17 00:47:32.806000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:32.807493 systemd[1]: Started kubelet.service. May 17 00:47:32.815544 systemd[1]: Stopping kubelet.service... May 17 00:47:32.815924 systemd[1]: kubelet.service: Deactivated successfully. May 17 00:47:32.816115 systemd[1]: Stopped kubelet.service. May 17 00:47:32.815000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:32.817813 systemd[1]: Starting kubelet.service... May 17 00:47:36.723000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:36.724117 systemd[1]: Started kubelet.service. May 17 00:47:36.767382 kubelet[2156]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:47:36.767771 kubelet[2156]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 17 00:47:36.767821 kubelet[2156]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:47:36.767984 kubelet[2156]: I0517 00:47:36.767948 2156 server.go:211] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 17 00:47:37.117569 kubelet[2156]: I0517 00:47:37.117258 2156 server.go:491] "Kubelet version" kubeletVersion="v1.31.8" May 17 00:47:37.117693 kubelet[2156]: I0517 00:47:37.117678 2156 server.go:493] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 17 00:47:37.118033 kubelet[2156]: I0517 00:47:37.118016 2156 server.go:934] "Client rotation is on, will bootstrap in background" May 17 00:47:37.133294 kubelet[2156]: E0517 00:47:37.133236 2156 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://10.200.20.42:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.200.20.42:6443: connect: connection refused" logger="UnhandledError" May 17 00:47:37.134555 kubelet[2156]: I0517 00:47:37.134520 2156 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 17 00:47:37.145287 kubelet[2156]: E0517 00:47:37.145252 2156 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 17 00:47:37.145504 kubelet[2156]: I0517 00:47:37.145491 2156 server.go:1408] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 17 00:47:37.149687 kubelet[2156]: I0517 00:47:37.149662 2156 server.go:749] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 17 00:47:37.150588 kubelet[2156]: I0517 00:47:37.150563 2156 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" May 17 00:47:37.150901 kubelet[2156]: I0517 00:47:37.150846 2156 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 17 00:47:37.151167 kubelet[2156]: I0517 00:47:37.150971 2156 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510.3.7-n-6523ff94dd","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 17 00:47:37.151321 kubelet[2156]: I0517 00:47:37.151307 2156 topology_manager.go:138] "Creating topology manager with none policy" May 17 00:47:37.151383 kubelet[2156]: I0517 00:47:37.151373 2156 container_manager_linux.go:300] "Creating device plugin manager" May 17 00:47:37.151544 kubelet[2156]: I0517 00:47:37.151530 2156 state_mem.go:36] "Initialized new in-memory state store" May 17 00:47:37.158272 kubelet[2156]: I0517 00:47:37.158242 2156 kubelet.go:408] "Attempting to sync node with API server" May 17 00:47:37.158440 kubelet[2156]: I0517 00:47:37.158426 2156 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" May 17 00:47:37.158559 kubelet[2156]: I0517 00:47:37.158548 2156 kubelet.go:314] "Adding apiserver pod source" May 17 00:47:37.158622 kubelet[2156]: I0517 00:47:37.158613 2156 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 17 00:47:37.161680 kubelet[2156]: W0517 00:47:37.161626 2156 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.200.20.42:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.7-n-6523ff94dd&limit=500&resourceVersion=0": dial tcp 10.200.20.42:6443: connect: connection refused May 17 00:47:37.161766 kubelet[2156]: E0517 00:47:37.161690 2156 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.200.20.42:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.7-n-6523ff94dd&limit=500&resourceVersion=0\": dial tcp 10.200.20.42:6443: connect: connection refused" logger="UnhandledError" May 17 00:47:37.164613 kubelet[2156]: I0517 00:47:37.164575 2156 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 17 00:47:37.165189 kubelet[2156]: I0517 00:47:37.165171 2156 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 17 00:47:37.165318 kubelet[2156]: W0517 00:47:37.165306 2156 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 17 00:47:37.165966 kubelet[2156]: I0517 00:47:37.165947 2156 server.go:1274] "Started kubelet" May 17 00:47:37.166205 kubelet[2156]: W0517 00:47:37.166167 2156 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.200.20.42:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.200.20.42:6443: connect: connection refused May 17 00:47:37.166306 kubelet[2156]: E0517 00:47:37.166286 2156 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.200.20.42:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.200.20.42:6443: connect: connection refused" logger="UnhandledError" May 17 00:47:37.168797 kubelet[2156]: I0517 00:47:37.168756 2156 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 17 00:47:37.169655 kubelet[2156]: I0517 00:47:37.169626 2156 server.go:449] "Adding debug handlers to kubelet server" May 17 00:47:37.170626 kubelet[2156]: I0517 00:47:37.170572 2156 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 17 00:47:37.171007 kubelet[2156]: I0517 00:47:37.170991 2156 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 17 00:47:37.171000 audit[2156]: AVC avc: denied { mac_admin } for pid=2156 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:37.171000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:47:37.171000 audit[2156]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40008bfda0 a1=40008decc0 a2=40008bfd70 a3=25 items=0 ppid=1 pid=2156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:37.171000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:47:37.171000 audit[2156]: AVC avc: denied { mac_admin } for pid=2156 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:37.171000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:47:37.171000 audit[2156]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40009c0520 a1=40008decd8 a2=40008bfe30 a3=25 items=0 ppid=1 pid=2156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:37.171000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:47:37.172744 kubelet[2156]: I0517 00:47:37.172397 2156 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 17 00:47:37.172744 kubelet[2156]: I0517 00:47:37.172443 2156 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 17 00:47:37.172744 kubelet[2156]: I0517 00:47:37.172502 2156 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 17 00:47:37.173418 kubelet[2156]: E0517 00:47:37.171791 2156 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.200.20.42:6443/api/v1/namespaces/default/events\": dial tcp 10.200.20.42:6443: connect: connection refused" event="&Event{ObjectMeta:{ci-3510.3.7-n-6523ff94dd.18402a052eab2e4d default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510.3.7-n-6523ff94dd,UID:ci-3510.3.7-n-6523ff94dd,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510.3.7-n-6523ff94dd,},FirstTimestamp:2025-05-17 00:47:37.165925965 +0000 UTC m=+0.436854548,LastTimestamp:2025-05-17 00:47:37.165925965 +0000 UTC m=+0.436854548,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510.3.7-n-6523ff94dd,}" May 17 00:47:37.174000 audit[2167]: NETFILTER_CFG table=mangle:31 family=2 entries=2 op=nft_register_chain pid=2167 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:37.174000 audit[2167]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffdb076b60 a2=0 a3=1 items=0 ppid=2156 pid=2167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:37.174000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 17 00:47:37.176404 kubelet[2156]: I0517 00:47:37.176367 2156 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 17 00:47:37.175000 audit[2168]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_chain pid=2168 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:37.175000 audit[2168]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffa482060 a2=0 a3=1 items=0 ppid=2156 pid=2168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:37.175000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 17 00:47:37.177501 kubelet[2156]: I0517 00:47:37.177470 2156 volume_manager.go:289] "Starting Kubelet Volume Manager" May 17 00:47:37.177710 kubelet[2156]: E0517 00:47:37.177682 2156 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-6523ff94dd\" not found" May 17 00:47:37.178767 kubelet[2156]: E0517 00:47:37.178733 2156 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.42:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.7-n-6523ff94dd?timeout=10s\": dial tcp 10.200.20.42:6443: connect: connection refused" interval="200ms" May 17 00:47:37.179087 kubelet[2156]: I0517 00:47:37.179067 2156 factory.go:221] Registration of the systemd container factory successfully May 17 00:47:37.178000 audit[2170]: NETFILTER_CFG table=filter:33 family=2 entries=2 op=nft_register_chain pid=2170 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:37.178000 audit[2170]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffd8279670 a2=0 a3=1 items=0 ppid=2156 pid=2170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:37.178000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:47:37.179390 kubelet[2156]: I0517 00:47:37.179371 2156 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 17 00:47:37.179735 kubelet[2156]: E0517 00:47:37.179718 2156 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 17 00:47:37.180379 kubelet[2156]: I0517 00:47:37.180345 2156 desired_state_of_world_populator.go:147] "Desired state populator starts to run" May 17 00:47:37.180471 kubelet[2156]: I0517 00:47:37.180427 2156 reconciler.go:26] "Reconciler: start to sync state" May 17 00:47:37.180000 audit[2172]: NETFILTER_CFG table=filter:34 family=2 entries=2 op=nft_register_chain pid=2172 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:37.180000 audit[2172]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffe8a6cfb0 a2=0 a3=1 items=0 ppid=2156 pid=2172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:37.180000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:47:37.182410 kubelet[2156]: I0517 00:47:37.182387 2156 factory.go:221] Registration of the containerd container factory successfully May 17 00:47:37.187283 kubelet[2156]: W0517 00:47:37.187220 2156 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.200.20.42:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.42:6443: connect: connection refused May 17 00:47:37.187452 kubelet[2156]: E0517 00:47:37.187428 2156 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.200.20.42:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.200.20.42:6443: connect: connection refused" logger="UnhandledError" May 17 00:47:37.278441 kubelet[2156]: E0517 00:47:37.278397 2156 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-6523ff94dd\" not found" May 17 00:47:37.295965 kubelet[2156]: I0517 00:47:37.295921 2156 cpu_manager.go:214] "Starting CPU manager" policy="none" May 17 00:47:37.295965 kubelet[2156]: I0517 00:47:37.295952 2156 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 17 00:47:37.295965 kubelet[2156]: I0517 00:47:37.295970 2156 state_mem.go:36] "Initialized new in-memory state store" May 17 00:47:37.381344 kubelet[2156]: E0517 00:47:37.379278 2156 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-6523ff94dd\" not found" May 17 00:47:37.381964 kubelet[2156]: E0517 00:47:37.380095 2156 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.42:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.7-n-6523ff94dd?timeout=10s\": dial tcp 10.200.20.42:6443: connect: connection refused" interval="400ms" May 17 00:47:37.482255 kubelet[2156]: E0517 00:47:37.482210 2156 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-6523ff94dd\" not found" May 17 00:47:37.582582 kubelet[2156]: E0517 00:47:37.582543 2156 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-6523ff94dd\" not found" May 17 00:47:37.683663 kubelet[2156]: E0517 00:47:37.683378 2156 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-6523ff94dd\" not found" May 17 00:47:37.783492 kubelet[2156]: E0517 00:47:37.783441 2156 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.42:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.7-n-6523ff94dd?timeout=10s\": dial tcp 10.200.20.42:6443: connect: connection refused" interval="800ms" May 17 00:47:37.784489 kubelet[2156]: E0517 00:47:37.784467 2156 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-6523ff94dd\" not found" May 17 00:47:37.884972 kubelet[2156]: E0517 00:47:37.884935 2156 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-6523ff94dd\" not found" May 17 00:47:37.985427 kubelet[2156]: E0517 00:47:37.985387 2156 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-6523ff94dd\" not found" May 17 00:47:38.085921 kubelet[2156]: E0517 00:47:38.085878 2156 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-6523ff94dd\" not found" May 17 00:47:38.186393 kubelet[2156]: E0517 00:47:38.186356 2156 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-6523ff94dd\" not found" May 17 00:47:38.287066 kubelet[2156]: E0517 00:47:38.286800 2156 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-6523ff94dd\" not found" May 17 00:47:38.305433 kubelet[2156]: W0517 00:47:38.305372 2156 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.200.20.42:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.200.20.42:6443: connect: connection refused May 17 00:47:38.305541 kubelet[2156]: E0517 00:47:38.305444 2156 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.200.20.42:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.200.20.42:6443: connect: connection refused" logger="UnhandledError" May 17 00:47:38.381353 kubelet[2156]: W0517 00:47:38.381308 2156 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.200.20.42:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.42:6443: connect: connection refused May 17 00:47:38.381487 kubelet[2156]: E0517 00:47:38.381360 2156 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.200.20.42:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.200.20.42:6443: connect: connection refused" logger="UnhandledError" May 17 00:47:38.386935 kubelet[2156]: E0517 00:47:38.386899 2156 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-6523ff94dd\" not found" May 17 00:47:38.487453 kubelet[2156]: E0517 00:47:38.487412 2156 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-6523ff94dd\" not found" May 17 00:47:38.565407 kubelet[2156]: W0517 00:47:38.565071 2156 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.200.20.42:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.7-n-6523ff94dd&limit=500&resourceVersion=0": dial tcp 10.200.20.42:6443: connect: connection refused May 17 00:47:38.565576 kubelet[2156]: E0517 00:47:38.565553 2156 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.200.20.42:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.7-n-6523ff94dd&limit=500&resourceVersion=0\": dial tcp 10.200.20.42:6443: connect: connection refused" logger="UnhandledError" May 17 00:47:38.584443 kubelet[2156]: E0517 00:47:38.584402 2156 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.42:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.7-n-6523ff94dd?timeout=10s\": dial tcp 10.200.20.42:6443: connect: connection refused" interval="1.6s" May 17 00:47:38.587824 kubelet[2156]: E0517 00:47:38.587804 2156 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-6523ff94dd\" not found" May 17 00:47:38.688756 kubelet[2156]: E0517 00:47:38.688727 2156 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-6523ff94dd\" not found" May 17 00:47:38.789222 kubelet[2156]: E0517 00:47:38.789180 2156 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-6523ff94dd\" not found" May 17 00:47:38.889882 kubelet[2156]: E0517 00:47:38.889576 2156 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-6523ff94dd\" not found" May 17 00:47:38.990054 kubelet[2156]: E0517 00:47:38.990023 2156 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-6523ff94dd\" not found" May 17 00:47:39.090543 kubelet[2156]: E0517 00:47:39.090514 2156 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-6523ff94dd\" not found" May 17 00:47:39.180037 kubelet[2156]: E0517 00:47:39.179776 2156 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://10.200.20.42:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.200.20.42:6443: connect: connection refused" logger="UnhandledError" May 17 00:47:39.191155 kubelet[2156]: E0517 00:47:39.191114 2156 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-6523ff94dd\" not found" May 17 00:47:39.291580 kubelet[2156]: E0517 00:47:39.291541 2156 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-6523ff94dd\" not found" May 17 00:47:39.392011 kubelet[2156]: E0517 00:47:39.391980 2156 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-6523ff94dd\" not found" May 17 00:47:39.509014 kubelet[2156]: E0517 00:47:39.492426 2156 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-6523ff94dd\" not found" May 17 00:47:39.592940 kubelet[2156]: E0517 00:47:39.592900 2156 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-6523ff94dd\" not found" May 17 00:47:39.613680 kubelet[2156]: I0517 00:47:39.613660 2156 policy_none.go:49] "None policy: Start" May 17 00:47:39.614497 kubelet[2156]: I0517 00:47:39.614475 2156 memory_manager.go:170] "Starting memorymanager" policy="None" May 17 00:47:39.614574 kubelet[2156]: I0517 00:47:39.614505 2156 state_mem.go:35] "Initializing new in-memory state store" May 17 00:47:39.675000 audit[2180]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_rule pid=2180 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:39.681782 kernel: kauditd_printk_skb: 223 callbacks suppressed May 17 00:47:39.681865 kernel: audit: type=1325 audit(1747442859.675:434): table=filter:35 family=2 entries=1 op=nft_register_rule pid=2180 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:39.682108 kubelet[2156]: I0517 00:47:39.682058 2156 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 17 00:47:39.683663 kubelet[2156]: I0517 00:47:39.683634 2156 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 17 00:47:39.683774 kubelet[2156]: I0517 00:47:39.683764 2156 status_manager.go:217] "Starting to sync pod status with apiserver" May 17 00:47:39.683847 kubelet[2156]: I0517 00:47:39.683838 2156 kubelet.go:2321] "Starting kubelet main sync loop" May 17 00:47:39.683989 kubelet[2156]: E0517 00:47:39.683954 2156 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 17 00:47:39.675000 audit[2180]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=fffff32c7480 a2=0 a3=1 items=0 ppid=2156 pid=2180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:39.696743 kubelet[2156]: E0517 00:47:39.696714 2156 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-6523ff94dd\" not found" May 17 00:47:39.697697 kubelet[2156]: W0517 00:47:39.697651 2156 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.200.20.42:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.42:6443: connect: connection refused May 17 00:47:39.697809 kubelet[2156]: E0517 00:47:39.697792 2156 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.200.20.42:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.200.20.42:6443: connect: connection refused" logger="UnhandledError" May 17 00:47:39.675000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 17 00:47:39.789532 kernel: audit: type=1300 audit(1747442859.675:434): arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=fffff32c7480 a2=0 a3=1 items=0 ppid=2156 pid=2180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:39.789627 kernel: audit: type=1327 audit(1747442859.675:434): proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 17 00:47:39.789648 kernel: audit: type=1325 audit(1747442859.680:435): table=mangle:36 family=10 entries=2 op=nft_register_chain pid=2182 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:47:39.789666 kernel: audit: type=1300 audit(1747442859.680:435): arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=fffffde54cd0 a2=0 a3=1 items=0 ppid=2156 pid=2182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:39.680000 audit[2182]: NETFILTER_CFG table=mangle:36 family=10 entries=2 op=nft_register_chain pid=2182 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:47:39.680000 audit[2182]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=fffffde54cd0 a2=0 a3=1 items=0 ppid=2156 pid=2182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:39.789929 kubelet[2156]: E0517 00:47:39.789226 2156 kubelet.go:2345] "Skipping pod synchronization" err="container runtime status check may not have completed yet" May 17 00:47:39.805159 kernel: audit: type=1327 audit(1747442859.680:435): proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 17 00:47:39.680000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 17 00:47:39.805280 kubelet[2156]: E0517 00:47:39.804268 2156 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-6523ff94dd\" not found" May 17 00:47:39.680000 audit[2183]: NETFILTER_CFG table=mangle:37 family=2 entries=1 op=nft_register_chain pid=2183 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:39.819072 kernel: audit: type=1325 audit(1747442859.680:436): table=mangle:37 family=2 entries=1 op=nft_register_chain pid=2183 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:39.680000 audit[2183]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe8e23fa0 a2=0 a3=1 items=0 ppid=2156 pid=2183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:39.846632 kernel: audit: type=1300 audit(1747442859.680:436): arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe8e23fa0 a2=0 a3=1 items=0 ppid=2156 pid=2183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:39.847509 kernel: audit: type=1327 audit(1747442859.680:436): proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 17 00:47:39.680000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 17 00:47:39.849712 systemd[1]: Created slice kubepods.slice. May 17 00:47:39.863171 kernel: audit: type=1325 audit(1747442859.685:437): table=mangle:38 family=10 entries=1 op=nft_register_chain pid=2184 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:47:39.685000 audit[2184]: NETFILTER_CFG table=mangle:38 family=10 entries=1 op=nft_register_chain pid=2184 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:47:39.868341 systemd[1]: Created slice kubepods-burstable.slice. May 17 00:47:39.872052 systemd[1]: Created slice kubepods-besteffort.slice. May 17 00:47:39.685000 audit[2184]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff56b8660 a2=0 a3=1 items=0 ppid=2156 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:39.685000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 17 00:47:39.695000 audit[2185]: NETFILTER_CFG table=nat:39 family=10 entries=2 op=nft_register_chain pid=2185 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:47:39.695000 audit[2185]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=fffff3b8e6c0 a2=0 a3=1 items=0 ppid=2156 pid=2185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:39.695000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 17 00:47:39.696000 audit[2186]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2186 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:39.696000 audit[2186]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd6478cf0 a2=0 a3=1 items=0 ppid=2156 pid=2186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:39.696000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 17 00:47:39.696000 audit[2187]: NETFILTER_CFG table=filter:41 family=2 entries=1 op=nft_register_chain pid=2187 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:39.696000 audit[2187]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffee9ec080 a2=0 a3=1 items=0 ppid=2156 pid=2187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:39.696000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 17 00:47:39.722000 audit[2188]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=2188 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:47:39.722000 audit[2188]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffcfc83e20 a2=0 a3=1 items=0 ppid=2156 pid=2188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:39.722000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 17 00:47:39.884042 kubelet[2156]: I0517 00:47:39.884006 2156 manager.go:513] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 17 00:47:39.883000 audit[2156]: AVC avc: denied { mac_admin } for pid=2156 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:39.883000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:47:39.883000 audit[2156]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40008be7e0 a1=40008933b0 a2=40008be7b0 a3=25 items=0 ppid=1 pid=2156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:39.883000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:47:39.922039 kubelet[2156]: I0517 00:47:39.884073 2156 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 17 00:47:39.922039 kubelet[2156]: I0517 00:47:39.884207 2156 eviction_manager.go:189] "Eviction manager: starting control loop" May 17 00:47:39.922039 kubelet[2156]: I0517 00:47:39.884218 2156 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 17 00:47:39.922039 kubelet[2156]: I0517 00:47:39.884703 2156 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 17 00:47:39.922039 kubelet[2156]: E0517 00:47:39.886947 2156 eviction_manager.go:285] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.7-n-6523ff94dd\" not found" May 17 00:47:39.986446 kubelet[2156]: I0517 00:47:39.986400 2156 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510.3.7-n-6523ff94dd" May 17 00:47:39.986793 kubelet[2156]: E0517 00:47:39.986761 2156 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.200.20.42:6443/api/v1/nodes\": dial tcp 10.200.20.42:6443: connect: connection refused" node="ci-3510.3.7-n-6523ff94dd" May 17 00:47:39.999314 systemd[1]: Created slice kubepods-burstable-pod5f0b632494b14a40e629230dd894eae4.slice. May 17 00:47:40.010001 systemd[1]: Created slice kubepods-burstable-podae4a62a3be31fc80e05efb4b4cea69c0.slice. May 17 00:47:40.021361 systemd[1]: Created slice kubepods-burstable-pod914d127ca78ae9aa41cb21283de2b336.slice. May 17 00:47:40.105575 kubelet[2156]: I0517 00:47:40.105539 2156 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/5f0b632494b14a40e629230dd894eae4-ca-certs\") pod \"kube-apiserver-ci-3510.3.7-n-6523ff94dd\" (UID: \"5f0b632494b14a40e629230dd894eae4\") " pod="kube-system/kube-apiserver-ci-3510.3.7-n-6523ff94dd" May 17 00:47:40.105634 kubelet[2156]: I0517 00:47:40.105593 2156 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/5f0b632494b14a40e629230dd894eae4-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.7-n-6523ff94dd\" (UID: \"5f0b632494b14a40e629230dd894eae4\") " pod="kube-system/kube-apiserver-ci-3510.3.7-n-6523ff94dd" May 17 00:47:40.105634 kubelet[2156]: I0517 00:47:40.105616 2156 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/ae4a62a3be31fc80e05efb4b4cea69c0-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.7-n-6523ff94dd\" (UID: \"ae4a62a3be31fc80e05efb4b4cea69c0\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-6523ff94dd" May 17 00:47:40.105690 kubelet[2156]: I0517 00:47:40.105633 2156 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/ae4a62a3be31fc80e05efb4b4cea69c0-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.7-n-6523ff94dd\" (UID: \"ae4a62a3be31fc80e05efb4b4cea69c0\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-6523ff94dd" May 17 00:47:40.105690 kubelet[2156]: I0517 00:47:40.105663 2156 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/ae4a62a3be31fc80e05efb4b4cea69c0-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.7-n-6523ff94dd\" (UID: \"ae4a62a3be31fc80e05efb4b4cea69c0\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-6523ff94dd" May 17 00:47:40.105690 kubelet[2156]: I0517 00:47:40.105683 2156 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/914d127ca78ae9aa41cb21283de2b336-kubeconfig\") pod \"kube-scheduler-ci-3510.3.7-n-6523ff94dd\" (UID: \"914d127ca78ae9aa41cb21283de2b336\") " pod="kube-system/kube-scheduler-ci-3510.3.7-n-6523ff94dd" May 17 00:47:40.105759 kubelet[2156]: I0517 00:47:40.105699 2156 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/5f0b632494b14a40e629230dd894eae4-k8s-certs\") pod \"kube-apiserver-ci-3510.3.7-n-6523ff94dd\" (UID: \"5f0b632494b14a40e629230dd894eae4\") " pod="kube-system/kube-apiserver-ci-3510.3.7-n-6523ff94dd" May 17 00:47:40.105759 kubelet[2156]: I0517 00:47:40.105714 2156 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/ae4a62a3be31fc80e05efb4b4cea69c0-ca-certs\") pod \"kube-controller-manager-ci-3510.3.7-n-6523ff94dd\" (UID: \"ae4a62a3be31fc80e05efb4b4cea69c0\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-6523ff94dd" May 17 00:47:40.105759 kubelet[2156]: I0517 00:47:40.105747 2156 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/ae4a62a3be31fc80e05efb4b4cea69c0-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.7-n-6523ff94dd\" (UID: \"ae4a62a3be31fc80e05efb4b4cea69c0\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-6523ff94dd" May 17 00:47:40.185337 kubelet[2156]: E0517 00:47:40.185292 2156 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.42:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.7-n-6523ff94dd?timeout=10s\": dial tcp 10.200.20.42:6443: connect: connection refused" interval="3.2s" May 17 00:47:40.188767 kubelet[2156]: I0517 00:47:40.188745 2156 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510.3.7-n-6523ff94dd" May 17 00:47:40.189245 kubelet[2156]: E0517 00:47:40.189209 2156 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.200.20.42:6443/api/v1/nodes\": dial tcp 10.200.20.42:6443: connect: connection refused" node="ci-3510.3.7-n-6523ff94dd" May 17 00:47:40.308304 env[1452]: time="2025-05-17T00:47:40.308257986Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.7-n-6523ff94dd,Uid:5f0b632494b14a40e629230dd894eae4,Namespace:kube-system,Attempt:0,}" May 17 00:47:40.313433 env[1452]: time="2025-05-17T00:47:40.313394212Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.7-n-6523ff94dd,Uid:ae4a62a3be31fc80e05efb4b4cea69c0,Namespace:kube-system,Attempt:0,}" May 17 00:47:40.325327 env[1452]: time="2025-05-17T00:47:40.325289073Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.7-n-6523ff94dd,Uid:914d127ca78ae9aa41cb21283de2b336,Namespace:kube-system,Attempt:0,}" May 17 00:47:40.456425 kubelet[2156]: W0517 00:47:40.456326 2156 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.200.20.42:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.200.20.42:6443: connect: connection refused May 17 00:47:40.456605 kubelet[2156]: E0517 00:47:40.456585 2156 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.200.20.42:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.200.20.42:6443: connect: connection refused" logger="UnhandledError" May 17 00:47:40.590775 kubelet[2156]: I0517 00:47:40.590749 2156 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510.3.7-n-6523ff94dd" May 17 00:47:40.591242 kubelet[2156]: E0517 00:47:40.591217 2156 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.200.20.42:6443/api/v1/nodes\": dial tcp 10.200.20.42:6443: connect: connection refused" node="ci-3510.3.7-n-6523ff94dd" May 17 00:47:40.970926 kubelet[2156]: W0517 00:47:40.970852 2156 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.200.20.42:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.42:6443: connect: connection refused May 17 00:47:40.970926 kubelet[2156]: E0517 00:47:40.970930 2156 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.200.20.42:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.200.20.42:6443: connect: connection refused" logger="UnhandledError" May 17 00:47:41.160950 kubelet[2156]: W0517 00:47:41.160908 2156 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.200.20.42:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.7-n-6523ff94dd&limit=500&resourceVersion=0": dial tcp 10.200.20.42:6443: connect: connection refused May 17 00:47:41.161153 kubelet[2156]: E0517 00:47:41.161131 2156 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.200.20.42:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.7-n-6523ff94dd&limit=500&resourceVersion=0\": dial tcp 10.200.20.42:6443: connect: connection refused" logger="UnhandledError" May 17 00:47:41.393059 kubelet[2156]: I0517 00:47:41.392953 2156 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510.3.7-n-6523ff94dd" May 17 00:47:41.393518 kubelet[2156]: E0517 00:47:41.393483 2156 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.200.20.42:6443/api/v1/nodes\": dial tcp 10.200.20.42:6443: connect: connection refused" node="ci-3510.3.7-n-6523ff94dd" May 17 00:47:41.573795 kubelet[2156]: W0517 00:47:41.573749 2156 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.200.20.42:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.42:6443: connect: connection refused May 17 00:47:41.573946 kubelet[2156]: E0517 00:47:41.573802 2156 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.200.20.42:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.200.20.42:6443: connect: connection refused" logger="UnhandledError" May 17 00:47:42.835017 kubelet[2156]: W0517 00:47:42.834975 2156 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.200.20.42:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.42:6443: connect: connection refused May 17 00:47:42.835371 kubelet[2156]: E0517 00:47:42.835022 2156 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.200.20.42:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.200.20.42:6443: connect: connection refused" logger="UnhandledError" May 17 00:47:42.995397 kubelet[2156]: I0517 00:47:42.995360 2156 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510.3.7-n-6523ff94dd" May 17 00:47:42.995734 kubelet[2156]: E0517 00:47:42.995706 2156 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.200.20.42:6443/api/v1/nodes\": dial tcp 10.200.20.42:6443: connect: connection refused" node="ci-3510.3.7-n-6523ff94dd" May 17 00:47:43.385873 kubelet[2156]: E0517 00:47:43.385808 2156 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.42:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.7-n-6523ff94dd?timeout=10s\": dial tcp 10.200.20.42:6443: connect: connection refused" interval="6.4s" May 17 00:47:43.567578 kubelet[2156]: E0517 00:47:43.567526 2156 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://10.200.20.42:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.200.20.42:6443: connect: connection refused" logger="UnhandledError" May 17 00:47:44.024852 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1896478689.mount: Deactivated successfully. May 17 00:47:44.357181 env[1452]: time="2025-05-17T00:47:44.357063063Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:47:44.417650 env[1452]: time="2025-05-17T00:47:44.417588303Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:47:44.469026 env[1452]: time="2025-05-17T00:47:44.468971253Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:47:44.517842 env[1452]: time="2025-05-17T00:47:44.517769527Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:47:44.610053 env[1452]: time="2025-05-17T00:47:44.609951683Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:47:44.655523 env[1452]: time="2025-05-17T00:47:44.655479491Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:47:44.718950 env[1452]: time="2025-05-17T00:47:44.718899922Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:47:44.767521 env[1452]: time="2025-05-17T00:47:44.767467320Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:47:44.781686 env[1452]: time="2025-05-17T00:47:44.781638125Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:47:44.795647 env[1452]: time="2025-05-17T00:47:44.795589255Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:47:44.801770 env[1452]: time="2025-05-17T00:47:44.801726633Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:47:44.819356 env[1452]: time="2025-05-17T00:47:44.819310023Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:47:44.878074 env[1452]: time="2025-05-17T00:47:44.877785816Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:47:44.878074 env[1452]: time="2025-05-17T00:47:44.877824935Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:47:44.878074 env[1452]: time="2025-05-17T00:47:44.877834935Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:47:44.878491 env[1452]: time="2025-05-17T00:47:44.878031972Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c791fb3c6b253d73af60ad5fdd2958f75cd7fd379be70f5f1e701381b2df8c15 pid=2196 runtime=io.containerd.runc.v2 May 17 00:47:44.892543 systemd[1]: Started cri-containerd-c791fb3c6b253d73af60ad5fdd2958f75cd7fd379be70f5f1e701381b2df8c15.scope. May 17 00:47:44.917819 kernel: kauditd_printk_skb: 18 callbacks suppressed May 17 00:47:44.918107 kernel: audit: type=1400 audit(1747442864.911:443): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:44.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:44.937420 env[1452]: time="2025-05-17T00:47:44.937339472Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:47:44.937594 env[1452]: time="2025-05-17T00:47:44.937387471Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:47:44.937594 env[1452]: time="2025-05-17T00:47:44.937398631Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:47:44.937594 env[1452]: time="2025-05-17T00:47:44.937514469Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a26d40417e89fe564a14104125d45ae7b637629488c87b78a599a4b6cc59a58f pid=2229 runtime=io.containerd.runc.v2 May 17 00:47:44.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:44.956030 env[1452]: time="2025-05-17T00:47:44.955950244Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:47:44.956461 env[1452]: time="2025-05-17T00:47:44.956415556Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:47:44.958424 env[1452]: time="2025-05-17T00:47:44.958380524Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:47:44.961991 env[1452]: time="2025-05-17T00:47:44.961927825Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6cfca91da937ccb13174dd26f44ecc1c9709a42d96685088259fc366f0df5313 pid=2244 runtime=io.containerd.runc.v2 May 17 00:47:44.962612 kernel: audit: type=1400 audit(1747442864.911:444): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:44.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:44.982185 kernel: audit: type=1400 audit(1747442864.911:445): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:44.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:44.985092 systemd[1]: Started cri-containerd-a26d40417e89fe564a14104125d45ae7b637629488c87b78a599a4b6cc59a58f.scope. May 17 00:47:45.002648 kernel: audit: type=1400 audit(1747442864.911:446): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:44.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.018415 systemd[1]: run-containerd-runc-k8s.io-c791fb3c6b253d73af60ad5fdd2958f75cd7fd379be70f5f1e701381b2df8c15-runc.v6OOJl.mount: Deactivated successfully. May 17 00:47:45.021511 kernel: audit: type=1400 audit(1747442864.911:447): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.030889 kernel: audit: type=1400 audit(1747442864.911:448): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:44.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.033026 systemd[1]: Started cri-containerd-6cfca91da937ccb13174dd26f44ecc1c9709a42d96685088259fc366f0df5313.scope. May 17 00:47:45.042959 env[1452]: time="2025-05-17T00:47:45.042916784Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.7-n-6523ff94dd,Uid:5f0b632494b14a40e629230dd894eae4,Namespace:kube-system,Attempt:0,} returns sandbox id \"c791fb3c6b253d73af60ad5fdd2958f75cd7fd379be70f5f1e701381b2df8c15\"" May 17 00:47:45.046782 env[1452]: time="2025-05-17T00:47:45.046735403Z" level=info msg="CreateContainer within sandbox \"c791fb3c6b253d73af60ad5fdd2958f75cd7fd379be70f5f1e701381b2df8c15\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" May 17 00:47:45.056750 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 17 00:47:45.056874 kernel: audit: type=1400 audit(1747442864.911:449): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:44.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.083850 kernel: audit: audit_lost=19 audit_rate_limit=0 audit_backlog_limit=64 May 17 00:47:45.083970 kernel: audit: type=1400 audit(1747442864.911:450): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:44.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:44.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:44.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:44.917000 audit: BPF prog-id=59 op=LOAD May 17 00:47:44.917000 audit[2206]: AVC avc: denied { bpf } for pid=2206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:44.917000 audit[2206]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2196 pid=2206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:44.917000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337393166623363366232353364373361663630616435666464323935 May 17 00:47:44.917000 audit[2206]: AVC avc: denied { perfmon } for pid=2206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:44.917000 audit[2206]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2196 pid=2206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:44.917000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337393166623363366232353364373361663630616435666464323935 May 17 00:47:44.917000 audit[2206]: AVC avc: denied { bpf } for pid=2206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:44.917000 audit[2206]: AVC avc: denied { bpf } for pid=2206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:44.917000 audit[2206]: AVC avc: denied { bpf } for pid=2206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:44.917000 audit[2206]: AVC avc: denied { perfmon } for pid=2206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:44.917000 audit[2206]: AVC avc: denied { perfmon } for pid=2206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:44.917000 audit[2206]: AVC avc: denied { perfmon } for pid=2206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:44.917000 audit[2206]: AVC avc: denied { perfmon } for pid=2206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:44.917000 audit[2206]: AVC avc: denied { perfmon } for pid=2206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:44.917000 audit[2206]: AVC avc: denied { bpf } for pid=2206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:44.917000 audit[2206]: AVC avc: denied { bpf } for pid=2206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:44.917000 audit: BPF prog-id=60 op=LOAD May 17 00:47:44.917000 audit[2206]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2196 pid=2206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:44.917000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337393166623363366232353364373361663630616435666464323935 May 17 00:47:44.935000 audit[2206]: AVC avc: denied { bpf } for pid=2206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:44.935000 audit[2206]: AVC avc: denied { bpf } for pid=2206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:44.935000 audit[2206]: AVC avc: denied { perfmon } for pid=2206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:44.935000 audit[2206]: AVC avc: denied { perfmon } for pid=2206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:44.935000 audit[2206]: AVC avc: denied { perfmon } for pid=2206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:44.935000 audit[2206]: AVC avc: denied { perfmon } for pid=2206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:44.935000 audit[2206]: AVC avc: denied { perfmon } for pid=2206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:44.935000 audit[2206]: AVC avc: denied { bpf } for pid=2206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:44.935000 audit[2206]: AVC avc: denied { bpf } for pid=2206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:44.935000 audit: BPF prog-id=61 op=LOAD May 17 00:47:44.935000 audit[2206]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2196 pid=2206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:44.935000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337393166623363366232353364373361663630616435666464323935 May 17 00:47:44.935000 audit: BPF prog-id=61 op=UNLOAD May 17 00:47:44.935000 audit: BPF prog-id=60 op=UNLOAD May 17 00:47:44.935000 audit[2206]: AVC avc: denied { bpf } for pid=2206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:44.935000 audit[2206]: AVC avc: denied { bpf } for pid=2206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:44.935000 audit[2206]: AVC avc: denied { bpf } for pid=2206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:44.935000 audit[2206]: AVC avc: denied { perfmon } for pid=2206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:44.935000 audit[2206]: AVC avc: denied { perfmon } for pid=2206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:44.935000 audit[2206]: AVC avc: denied { perfmon } for pid=2206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:44.935000 audit[2206]: AVC avc: denied { perfmon } for pid=2206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:44.935000 audit[2206]: AVC avc: denied { perfmon } for pid=2206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:44.935000 audit[2206]: AVC avc: denied { bpf } for pid=2206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:44.935000 audit[2206]: AVC avc: denied { bpf } for pid=2206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:44.935000 audit: BPF prog-id=62 op=LOAD May 17 00:47:44.935000 audit[2206]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2196 pid=2206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:44.935000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337393166623363366232353364373361663630616435666464323935 May 17 00:47:45.050000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.050000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.050000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.050000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.050000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.050000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.050000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.050000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.050000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.083000 audit: BPF prog-id=63 op=LOAD May 17 00:47:45.083000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.083000 audit[2238]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2229 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:45.083000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132366434303431376538396665353634613134313034313235643435 May 17 00:47:45.108000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.108000 audit[2238]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2229 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:45.108000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132366434303431376538396665353634613134313034313235643435 May 17 00:47:45.109000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.109000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.109000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.109000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.109000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.109000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.109000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.109000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.109000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.109000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.109000 audit: BPF prog-id=64 op=LOAD May 17 00:47:45.109000 audit[2238]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2229 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:45.109000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132366434303431376538396665353634613134313034313235643435 May 17 00:47:45.109000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.109000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.109000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.109000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.109000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.109000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.109000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.109000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.109000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.109000 audit: BPF prog-id=65 op=LOAD May 17 00:47:45.109000 audit[2238]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2229 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:45.109000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132366434303431376538396665353634613134313034313235643435 May 17 00:47:45.110000 audit: BPF prog-id=65 op=UNLOAD May 17 00:47:45.110000 audit: BPF prog-id=64 op=UNLOAD May 17 00:47:45.110000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.110000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.110000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.110000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.110000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.110000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.110000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.110000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.110000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.110000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.110000 audit: BPF prog-id=66 op=LOAD May 17 00:47:45.110000 audit[2238]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2229 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:45.110000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132366434303431376538396665353634613134313034313235643435 May 17 00:47:45.113000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.113000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.113000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.113000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.113000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.113000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.113000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.113000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.113000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.114000 audit: BPF prog-id=67 op=LOAD May 17 00:47:45.114000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.114000 audit[2264]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2244 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:45.114000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663666361393164613933376363623133313734646432366634346563 May 17 00:47:45.114000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.114000 audit[2264]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2244 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:45.114000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663666361393164613933376363623133313734646432366634346563 May 17 00:47:45.114000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.114000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.114000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.114000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.114000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.114000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.114000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.114000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.114000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.114000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.114000 audit: BPF prog-id=68 op=LOAD May 17 00:47:45.114000 audit[2264]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2244 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:45.114000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663666361393164613933376363623133313734646432366634346563 May 17 00:47:45.114000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.114000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.114000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.114000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.114000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.114000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.114000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.114000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.114000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.114000 audit: BPF prog-id=69 op=LOAD May 17 00:47:45.114000 audit[2264]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2244 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:45.114000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663666361393164613933376363623133313734646432366634346563 May 17 00:47:45.114000 audit: BPF prog-id=69 op=UNLOAD May 17 00:47:45.114000 audit: BPF prog-id=68 op=UNLOAD May 17 00:47:45.114000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.114000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.114000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.114000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.114000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.114000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.114000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.114000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.114000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.114000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.114000 audit: BPF prog-id=70 op=LOAD May 17 00:47:45.114000 audit[2264]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2244 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:45.114000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663666361393164613933376363623133313734646432366634346563 May 17 00:47:45.132363 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount663950290.mount: Deactivated successfully. May 17 00:47:45.154186 env[1452]: time="2025-05-17T00:47:45.154144794Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.7-n-6523ff94dd,Uid:914d127ca78ae9aa41cb21283de2b336,Namespace:kube-system,Attempt:0,} returns sandbox id \"6cfca91da937ccb13174dd26f44ecc1c9709a42d96685088259fc366f0df5313\"" May 17 00:47:45.163026 env[1452]: time="2025-05-17T00:47:45.162984612Z" level=info msg="CreateContainer within sandbox \"6cfca91da937ccb13174dd26f44ecc1c9709a42d96685088259fc366f0df5313\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" May 17 00:47:45.168458 env[1452]: time="2025-05-17T00:47:45.168410045Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.7-n-6523ff94dd,Uid:ae4a62a3be31fc80e05efb4b4cea69c0,Namespace:kube-system,Attempt:0,} returns sandbox id \"a26d40417e89fe564a14104125d45ae7b637629488c87b78a599a4b6cc59a58f\"" May 17 00:47:45.171607 env[1452]: time="2025-05-17T00:47:45.171573594Z" level=info msg="CreateContainer within sandbox \"a26d40417e89fe564a14104125d45ae7b637629488c87b78a599a4b6cc59a58f\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" May 17 00:47:45.171891 env[1452]: time="2025-05-17T00:47:45.171834150Z" level=info msg="CreateContainer within sandbox \"c791fb3c6b253d73af60ad5fdd2958f75cd7fd379be70f5f1e701381b2df8c15\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"fa49b661744df8ac50f447969e7b7870f1952b2bc1165d46b7f50b27ce232ea9\"" May 17 00:47:45.172726 env[1452]: time="2025-05-17T00:47:45.172692496Z" level=info msg="StartContainer for \"fa49b661744df8ac50f447969e7b7870f1952b2bc1165d46b7f50b27ce232ea9\"" May 17 00:47:45.195013 systemd[1]: Started cri-containerd-fa49b661744df8ac50f447969e7b7870f1952b2bc1165d46b7f50b27ce232ea9.scope. May 17 00:47:45.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.210000 audit: BPF prog-id=71 op=LOAD May 17 00:47:45.211000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.211000 audit[2322]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2196 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:45.211000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661343962363631373434646638616335306634343739363965376237 May 17 00:47:45.211000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.211000 audit[2322]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2196 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:45.211000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661343962363631373434646638616335306634343739363965376237 May 17 00:47:45.211000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.211000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.211000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.211000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.211000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.211000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.211000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.211000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.211000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.211000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.211000 audit: BPF prog-id=72 op=LOAD May 17 00:47:45.211000 audit[2322]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2196 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:45.211000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661343962363631373434646638616335306634343739363965376237 May 17 00:47:45.211000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.211000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.211000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.211000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.211000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.211000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.211000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.211000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.211000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.211000 audit: BPF prog-id=73 op=LOAD May 17 00:47:45.211000 audit[2322]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2196 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:45.211000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661343962363631373434646638616335306634343739363965376237 May 17 00:47:45.211000 audit: BPF prog-id=73 op=UNLOAD May 17 00:47:45.211000 audit: BPF prog-id=72 op=UNLOAD May 17 00:47:45.211000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.211000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.211000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.211000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.211000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.211000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.211000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.211000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.211000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.211000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.211000 audit: BPF prog-id=74 op=LOAD May 17 00:47:45.211000 audit[2322]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2196 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:45.211000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661343962363631373434646638616335306634343739363965376237 May 17 00:47:45.237778 env[1452]: time="2025-05-17T00:47:45.237694690Z" level=info msg="CreateContainer within sandbox \"6cfca91da937ccb13174dd26f44ecc1c9709a42d96685088259fc366f0df5313\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"2c27557534d96ccace0e4b1ad9c2ba69f448dfe66d2d3d2c359caad314ce9cc2\"" May 17 00:47:45.238436 env[1452]: time="2025-05-17T00:47:45.238409398Z" level=info msg="StartContainer for \"2c27557534d96ccace0e4b1ad9c2ba69f448dfe66d2d3d2c359caad314ce9cc2\"" May 17 00:47:45.243707 env[1452]: time="2025-05-17T00:47:45.243663234Z" level=info msg="StartContainer for \"fa49b661744df8ac50f447969e7b7870f1952b2bc1165d46b7f50b27ce232ea9\" returns successfully" May 17 00:47:45.261908 systemd[1]: Started cri-containerd-2c27557534d96ccace0e4b1ad9c2ba69f448dfe66d2d3d2c359caad314ce9cc2.scope. May 17 00:47:45.269500 env[1452]: time="2025-05-17T00:47:45.269443619Z" level=info msg="CreateContainer within sandbox \"a26d40417e89fe564a14104125d45ae7b637629488c87b78a599a4b6cc59a58f\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"a04cfd0540c494df9251cf24cf39c44209e0289bd69bb24215046010095d6ca3\"" May 17 00:47:45.270207 env[1452]: time="2025-05-17T00:47:45.270141168Z" level=info msg="StartContainer for \"a04cfd0540c494df9251cf24cf39c44209e0289bd69bb24215046010095d6ca3\"" May 17 00:47:45.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.278000 audit: BPF prog-id=75 op=LOAD May 17 00:47:45.280000 audit[2358]: AVC avc: denied { bpf } for pid=2358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.280000 audit[2358]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014db38 a2=10 a3=0 items=0 ppid=2244 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:45.280000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263323735353735333464393663636163653065346231616439633262 May 17 00:47:45.280000 audit[2358]: AVC avc: denied { perfmon } for pid=2358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.280000 audit[2358]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=2244 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:45.280000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263323735353735333464393663636163653065346231616439633262 May 17 00:47:45.280000 audit[2358]: AVC avc: denied { bpf } for pid=2358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.280000 audit[2358]: AVC avc: denied { bpf } for pid=2358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.280000 audit[2358]: AVC avc: denied { bpf } for pid=2358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.280000 audit[2358]: AVC avc: denied { perfmon } for pid=2358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.280000 audit[2358]: AVC avc: denied { perfmon } for pid=2358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.280000 audit[2358]: AVC avc: denied { perfmon } for pid=2358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.280000 audit[2358]: AVC avc: denied { perfmon } for pid=2358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.280000 audit[2358]: AVC avc: denied { perfmon } for pid=2358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.280000 audit[2358]: AVC avc: denied { bpf } for pid=2358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.280000 audit[2358]: AVC avc: denied { bpf } for pid=2358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.280000 audit: BPF prog-id=76 op=LOAD May 17 00:47:45.280000 audit[2358]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=2244 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:45.280000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263323735353735333464393663636163653065346231616439633262 May 17 00:47:45.280000 audit[2358]: AVC avc: denied { bpf } for pid=2358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.280000 audit[2358]: AVC avc: denied { bpf } for pid=2358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.280000 audit[2358]: AVC avc: denied { perfmon } for pid=2358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.280000 audit[2358]: AVC avc: denied { perfmon } for pid=2358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.280000 audit[2358]: AVC avc: denied { perfmon } for pid=2358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.280000 audit[2358]: AVC avc: denied { perfmon } for pid=2358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.280000 audit[2358]: AVC avc: denied { perfmon } for pid=2358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.280000 audit[2358]: AVC avc: denied { bpf } for pid=2358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.280000 audit[2358]: AVC avc: denied { bpf } for pid=2358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.280000 audit: BPF prog-id=77 op=LOAD May 17 00:47:45.280000 audit[2358]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=2244 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:45.280000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263323735353735333464393663636163653065346231616439633262 May 17 00:47:45.280000 audit: BPF prog-id=77 op=UNLOAD May 17 00:47:45.280000 audit: BPF prog-id=76 op=UNLOAD May 17 00:47:45.280000 audit[2358]: AVC avc: denied { bpf } for pid=2358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.280000 audit[2358]: AVC avc: denied { bpf } for pid=2358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.280000 audit[2358]: AVC avc: denied { bpf } for pid=2358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.280000 audit[2358]: AVC avc: denied { perfmon } for pid=2358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.280000 audit[2358]: AVC avc: denied { perfmon } for pid=2358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.280000 audit[2358]: AVC avc: denied { perfmon } for pid=2358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.280000 audit[2358]: AVC avc: denied { perfmon } for pid=2358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.280000 audit[2358]: AVC avc: denied { perfmon } for pid=2358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.280000 audit[2358]: AVC avc: denied { bpf } for pid=2358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.280000 audit[2358]: AVC avc: denied { bpf } for pid=2358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.280000 audit: BPF prog-id=78 op=LOAD May 17 00:47:45.280000 audit[2358]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=2244 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:45.280000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263323735353735333464393663636163653065346231616439633262 May 17 00:47:45.290147 systemd[1]: Started cri-containerd-a04cfd0540c494df9251cf24cf39c44209e0289bd69bb24215046010095d6ca3.scope. May 17 00:47:45.318763 env[1452]: time="2025-05-17T00:47:45.318709866Z" level=info msg="StartContainer for \"2c27557534d96ccace0e4b1ad9c2ba69f448dfe66d2d3d2c359caad314ce9cc2\" returns successfully" May 17 00:47:45.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.322000 audit: BPF prog-id=79 op=LOAD May 17 00:47:45.323000 audit[2381]: AVC avc: denied { bpf } for pid=2381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.323000 audit[2381]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2229 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:45.323000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130346366643035343063343934646639323531636632346366333963 May 17 00:47:45.323000 audit[2381]: AVC avc: denied { perfmon } for pid=2381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.323000 audit[2381]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2229 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:45.323000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130346366643035343063343934646639323531636632346366333963 May 17 00:47:45.323000 audit[2381]: AVC avc: denied { bpf } for pid=2381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.323000 audit[2381]: AVC avc: denied { bpf } for pid=2381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.323000 audit[2381]: AVC avc: denied { bpf } for pid=2381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.323000 audit[2381]: AVC avc: denied { perfmon } for pid=2381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.323000 audit[2381]: AVC avc: denied { perfmon } for pid=2381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.323000 audit[2381]: AVC avc: denied { perfmon } for pid=2381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.323000 audit[2381]: AVC avc: denied { perfmon } for pid=2381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.323000 audit[2381]: AVC avc: denied { perfmon } for pid=2381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.323000 audit[2381]: AVC avc: denied { bpf } for pid=2381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.323000 audit[2381]: AVC avc: denied { bpf } for pid=2381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.323000 audit: BPF prog-id=80 op=LOAD May 17 00:47:45.323000 audit[2381]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2229 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:45.323000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130346366643035343063343934646639323531636632346366333963 May 17 00:47:45.323000 audit[2381]: AVC avc: denied { bpf } for pid=2381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.323000 audit[2381]: AVC avc: denied { bpf } for pid=2381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.323000 audit[2381]: AVC avc: denied { perfmon } for pid=2381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.323000 audit[2381]: AVC avc: denied { perfmon } for pid=2381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.323000 audit[2381]: AVC avc: denied { perfmon } for pid=2381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.323000 audit[2381]: AVC avc: denied { perfmon } for pid=2381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.323000 audit[2381]: AVC avc: denied { perfmon } for pid=2381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.323000 audit[2381]: AVC avc: denied { bpf } for pid=2381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.323000 audit[2381]: AVC avc: denied { bpf } for pid=2381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.323000 audit: BPF prog-id=81 op=LOAD May 17 00:47:45.323000 audit[2381]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2229 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:45.323000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130346366643035343063343934646639323531636632346366333963 May 17 00:47:45.323000 audit: BPF prog-id=81 op=UNLOAD May 17 00:47:45.323000 audit: BPF prog-id=80 op=UNLOAD May 17 00:47:45.323000 audit[2381]: AVC avc: denied { bpf } for pid=2381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.323000 audit[2381]: AVC avc: denied { bpf } for pid=2381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.323000 audit[2381]: AVC avc: denied { bpf } for pid=2381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.323000 audit[2381]: AVC avc: denied { perfmon } for pid=2381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.323000 audit[2381]: AVC avc: denied { perfmon } for pid=2381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.323000 audit[2381]: AVC avc: denied { perfmon } for pid=2381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.323000 audit[2381]: AVC avc: denied { perfmon } for pid=2381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.323000 audit[2381]: AVC avc: denied { perfmon } for pid=2381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.323000 audit[2381]: AVC avc: denied { bpf } for pid=2381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.323000 audit[2381]: AVC avc: denied { bpf } for pid=2381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:45.323000 audit: BPF prog-id=82 op=LOAD May 17 00:47:45.323000 audit[2381]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2229 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:45.323000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130346366643035343063343934646639323531636632346366333963 May 17 00:47:45.361377 env[1452]: time="2025-05-17T00:47:45.361324020Z" level=info msg="StartContainer for \"a04cfd0540c494df9251cf24cf39c44209e0289bd69bb24215046010095d6ca3\" returns successfully" May 17 00:47:46.018112 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1508967930.mount: Deactivated successfully. May 17 00:47:46.198044 kubelet[2156]: I0517 00:47:46.198012 2156 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510.3.7-n-6523ff94dd" May 17 00:47:47.200000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c661,c791 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:47:47.200000 audit[2333]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=4004b022c0 a2=fc6 a3=0 items=0 ppid=2196 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c661,c791 key=(null) May 17 00:47:47.200000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3432002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 00:47:47.200000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c661,c791 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:47:47.200000 audit[2333]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=4003605470 a2=fc6 a3=0 items=0 ppid=2196 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c661,c791 key=(null) May 17 00:47:47.200000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3432002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 00:47:47.203000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520974 scontext=system_u:system_r:svirt_lxc_net_t:s0:c661,c791 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:47:47.203000 audit[2333]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=40037ce840 a2=fc6 a3=0 items=0 ppid=2196 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c661,c791 key=(null) May 17 00:47:47.203000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3432002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 00:47:47.219000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520980 scontext=system_u:system_r:svirt_lxc_net_t:s0:c661,c791 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:47:47.219000 audit[2333]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=65 a1=4006d1a390 a2=fc6 a3=0 items=0 ppid=2196 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c661,c791 key=(null) May 17 00:47:47.219000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3432002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 00:47:47.328000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c661,c791 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:47:47.328000 audit[2333]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=81 a1=4003da8120 a2=fc6 a3=0 items=0 ppid=2196 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c661,c791 key=(null) May 17 00:47:47.328000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3432002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 00:47:47.328000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c661,c791 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:47:47.328000 audit[2333]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=81 a1=400345ae10 a2=fc6 a3=0 items=0 ppid=2196 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c661,c791 key=(null) May 17 00:47:47.328000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3432002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 00:47:47.643740 kubelet[2156]: E0517 00:47:47.643633 2156 event.go:359] "Server rejected event (will not retry!)" err="namespaces \"default\" not found" event="&Event{ObjectMeta:{ci-3510.3.7-n-6523ff94dd.18402a052eab2e4d default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510.3.7-n-6523ff94dd,UID:ci-3510.3.7-n-6523ff94dd,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510.3.7-n-6523ff94dd,},FirstTimestamp:2025-05-17 00:47:37.165925965 +0000 UTC m=+0.436854548,LastTimestamp:2025-05-17 00:47:37.165925965 +0000 UTC m=+0.436854548,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510.3.7-n-6523ff94dd,}" May 17 00:47:47.685971 kubelet[2156]: I0517 00:47:47.685928 2156 kubelet_node_status.go:75] "Successfully registered node" node="ci-3510.3.7-n-6523ff94dd" May 17 00:47:47.933000 audit[2391]: AVC avc: denied { watch } for pid=2391 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c122,c191 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:47:47.933000 audit[2391]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=40002b81b0 a2=fc6 a3=0 items=0 ppid=2229 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c122,c191 key=(null) May 17 00:47:47.933000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:47:47.933000 audit[2391]: AVC avc: denied { watch } for pid=2391 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c122,c191 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:47:47.933000 audit[2391]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=4000387840 a2=fc6 a3=0 items=0 ppid=2229 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c122,c191 key=(null) May 17 00:47:47.933000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:47:48.166208 kubelet[2156]: I0517 00:47:48.166160 2156 apiserver.go:52] "Watching apiserver" May 17 00:47:48.180802 kubelet[2156]: I0517 00:47:48.180763 2156 desired_state_of_world_populator.go:155] "Finished populating initial desired state of world" May 17 00:47:49.670760 systemd[1]: Reloading. May 17 00:47:49.738316 /usr/lib/systemd/system-generators/torcx-generator[2447]: time="2025-05-17T00:47:49Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:47:49.738348 /usr/lib/systemd/system-generators/torcx-generator[2447]: time="2025-05-17T00:47:49Z" level=info msg="torcx already run" May 17 00:47:49.839753 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:47:49.839778 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:47:49.856166 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:47:49.940000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:49.946071 kernel: kauditd_printk_skb: 358 callbacks suppressed May 17 00:47:49.946154 kernel: audit: type=1400 audit(1747442869.940:558): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:49.945000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:49.980986 kernel: audit: type=1400 audit(1747442869.945:559): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:49.945000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:49.998584 kernel: audit: type=1400 audit(1747442869.945:560): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:49.945000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.017361 kernel: audit: type=1400 audit(1747442869.945:561): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:49.945000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:49.945000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.052701 kernel: audit: type=1400 audit(1747442869.945:562): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.052805 kernel: audit: type=1400 audit(1747442869.945:563): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.052836 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 17 00:47:49.945000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.076815 kernel: audit: type=1400 audit(1747442869.945:564): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.076954 kernel: audit: audit_lost=20 audit_rate_limit=0 audit_backlog_limit=64 May 17 00:47:49.945000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.102344 kernel: audit: type=1400 audit(1747442869.945:565): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:49.945000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:49.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:49.963000 audit: BPF prog-id=83 op=LOAD May 17 00:47:49.963000 audit: BPF prog-id=44 op=UNLOAD May 17 00:47:49.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:49.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:49.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:49.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:49.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:49.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:49.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:49.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:49.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:49.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:49.980000 audit: BPF prog-id=84 op=LOAD May 17 00:47:49.980000 audit: BPF prog-id=45 op=UNLOAD May 17 00:47:49.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:49.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:49.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:49.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:49.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:49.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:49.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:49.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:49.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:49.998000 audit: BPF prog-id=85 op=LOAD May 17 00:47:49.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:49.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:49.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:49.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:49.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:49.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:49.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:49.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:49.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:49.998000 audit: BPF prog-id=86 op=LOAD May 17 00:47:49.998000 audit: BPF prog-id=46 op=UNLOAD May 17 00:47:49.998000 audit: BPF prog-id=47 op=UNLOAD May 17 00:47:49.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:49.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:49.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:49.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:49.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:49.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:49.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:49.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:49.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.017000 audit: BPF prog-id=87 op=LOAD May 17 00:47:50.017000 audit: BPF prog-id=48 op=UNLOAD May 17 00:47:50.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.034000 audit: BPF prog-id=88 op=LOAD May 17 00:47:50.034000 audit: BPF prog-id=67 op=UNLOAD May 17 00:47:50.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.083000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.102000 audit: BPF prog-id=90 op=LOAD May 17 00:47:50.102000 audit: BPF prog-id=49 op=UNLOAD May 17 00:47:50.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.102000 audit: BPF prog-id=91 op=LOAD May 17 00:47:50.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.103000 audit: BPF prog-id=93 op=LOAD May 17 00:47:50.103000 audit: BPF prog-id=79 op=UNLOAD May 17 00:47:50.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.104000 audit: BPF prog-id=94 op=LOAD May 17 00:47:50.104000 audit: BPF prog-id=52 op=UNLOAD May 17 00:47:50.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.104000 audit: BPF prog-id=95 op=LOAD May 17 00:47:50.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.104000 audit: BPF prog-id=96 op=LOAD May 17 00:47:50.104000 audit: BPF prog-id=53 op=UNLOAD May 17 00:47:50.104000 audit: BPF prog-id=54 op=UNLOAD May 17 00:47:50.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.104000 audit: BPF prog-id=55 op=UNLOAD May 17 00:47:50.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.104000 audit: BPF prog-id=99 op=LOAD May 17 00:47:50.104000 audit: BPF prog-id=57 op=UNLOAD May 17 00:47:50.105000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.105000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.106000 audit: BPF prog-id=100 op=LOAD May 17 00:47:50.106000 audit: BPF prog-id=59 op=UNLOAD May 17 00:47:50.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.107000 audit: BPF prog-id=101 op=LOAD May 17 00:47:50.107000 audit: BPF prog-id=63 op=UNLOAD May 17 00:47:50.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.108000 audit: BPF prog-id=102 op=LOAD May 17 00:47:50.108000 audit: BPF prog-id=71 op=UNLOAD May 17 00:47:50.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.109000 audit: BPF prog-id=103 op=LOAD May 17 00:47:50.109000 audit: BPF prog-id=58 op=UNLOAD May 17 00:47:50.136061 systemd[1]: Stopping kubelet.service... May 17 00:47:50.152000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:50.153207 systemd[1]: kubelet.service: Deactivated successfully. May 17 00:47:50.153397 systemd[1]: Stopped kubelet.service. May 17 00:47:50.155335 systemd[1]: Starting kubelet.service... May 17 00:47:50.310233 systemd[1]: Started kubelet.service. May 17 00:47:50.310000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:50.384812 kubelet[2511]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:47:50.384812 kubelet[2511]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 17 00:47:50.384812 kubelet[2511]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:47:50.384812 kubelet[2511]: I0517 00:47:50.383325 2511 server.go:211] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 17 00:47:50.662373 kubelet[2511]: I0517 00:47:50.389377 2511 server.go:491] "Kubelet version" kubeletVersion="v1.31.8" May 17 00:47:50.662373 kubelet[2511]: I0517 00:47:50.389400 2511 server.go:493] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 17 00:47:50.662373 kubelet[2511]: I0517 00:47:50.389602 2511 server.go:934] "Client rotation is on, will bootstrap in background" May 17 00:47:50.663928 kubelet[2511]: I0517 00:47:50.663902 2511 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". May 17 00:47:50.666021 kubelet[2511]: I0517 00:47:50.666001 2511 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 17 00:47:50.672819 kubelet[2511]: E0517 00:47:50.672780 2511 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 17 00:47:50.673013 kubelet[2511]: I0517 00:47:50.672997 2511 server.go:1408] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 17 00:47:50.675758 kubelet[2511]: I0517 00:47:50.675735 2511 server.go:749] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 17 00:47:50.676005 kubelet[2511]: I0517 00:47:50.675992 2511 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" May 17 00:47:50.676202 kubelet[2511]: I0517 00:47:50.676176 2511 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 17 00:47:50.676427 kubelet[2511]: I0517 00:47:50.676255 2511 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510.3.7-n-6523ff94dd","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 17 00:47:50.676550 kubelet[2511]: I0517 00:47:50.676540 2511 topology_manager.go:138] "Creating topology manager with none policy" May 17 00:47:50.676633 kubelet[2511]: I0517 00:47:50.676624 2511 container_manager_linux.go:300] "Creating device plugin manager" May 17 00:47:50.676722 kubelet[2511]: I0517 00:47:50.676712 2511 state_mem.go:36] "Initialized new in-memory state store" May 17 00:47:50.676903 kubelet[2511]: I0517 00:47:50.676891 2511 kubelet.go:408] "Attempting to sync node with API server" May 17 00:47:50.676973 kubelet[2511]: I0517 00:47:50.676963 2511 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" May 17 00:47:50.677035 kubelet[2511]: I0517 00:47:50.677026 2511 kubelet.go:314] "Adding apiserver pod source" May 17 00:47:50.677140 kubelet[2511]: I0517 00:47:50.677129 2511 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 17 00:47:50.683517 kubelet[2511]: I0517 00:47:50.682195 2511 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 17 00:47:50.683517 kubelet[2511]: I0517 00:47:50.682712 2511 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 17 00:47:50.683517 kubelet[2511]: I0517 00:47:50.683146 2511 server.go:1274] "Started kubelet" May 17 00:47:50.684000 audit[2511]: AVC avc: denied { mac_admin } for pid=2511 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.684000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:47:50.684000 audit[2511]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40009d9260 a1=4000940df8 a2=40009d9230 a3=25 items=0 ppid=1 pid=2511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:50.684000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:47:50.684000 audit[2511]: AVC avc: denied { mac_admin } for pid=2511 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.684000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:47:50.684000 audit[2511]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40008e58e0 a1=4000940e10 a2=40009d92f0 a3=25 items=0 ppid=1 pid=2511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:50.684000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:47:50.691288 kubelet[2511]: I0517 00:47:50.685469 2511 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 17 00:47:50.691288 kubelet[2511]: I0517 00:47:50.685524 2511 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 17 00:47:50.691288 kubelet[2511]: I0517 00:47:50.685548 2511 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 17 00:47:50.691525 kubelet[2511]: I0517 00:47:50.691493 2511 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 17 00:47:50.692521 kubelet[2511]: I0517 00:47:50.692506 2511 server.go:449] "Adding debug handlers to kubelet server" May 17 00:47:50.694006 kubelet[2511]: I0517 00:47:50.693961 2511 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 17 00:47:50.694301 kubelet[2511]: I0517 00:47:50.694288 2511 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 17 00:47:50.694907 kubelet[2511]: I0517 00:47:50.694889 2511 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 17 00:47:50.696448 kubelet[2511]: I0517 00:47:50.696432 2511 volume_manager.go:289] "Starting Kubelet Volume Manager" May 17 00:47:50.696741 kubelet[2511]: E0517 00:47:50.696722 2511 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-6523ff94dd\" not found" May 17 00:47:50.697355 kubelet[2511]: I0517 00:47:50.697338 2511 desired_state_of_world_populator.go:147] "Desired state populator starts to run" May 17 00:47:50.697565 kubelet[2511]: I0517 00:47:50.697554 2511 reconciler.go:26] "Reconciler: start to sync state" May 17 00:47:50.711341 kubelet[2511]: I0517 00:47:50.711309 2511 factory.go:221] Registration of the systemd container factory successfully May 17 00:47:50.711567 kubelet[2511]: I0517 00:47:50.711549 2511 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 17 00:47:50.716255 kubelet[2511]: I0517 00:47:50.716225 2511 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 17 00:47:50.717152 kubelet[2511]: I0517 00:47:50.717135 2511 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 17 00:47:50.717278 kubelet[2511]: I0517 00:47:50.717266 2511 status_manager.go:217] "Starting to sync pod status with apiserver" May 17 00:47:50.717348 kubelet[2511]: I0517 00:47:50.717339 2511 kubelet.go:2321] "Starting kubelet main sync loop" May 17 00:47:50.717433 kubelet[2511]: E0517 00:47:50.717419 2511 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 17 00:47:50.727068 kubelet[2511]: I0517 00:47:50.727040 2511 factory.go:221] Registration of the containerd container factory successfully May 17 00:47:50.811474 kubelet[2511]: I0517 00:47:50.811446 2511 cpu_manager.go:214] "Starting CPU manager" policy="none" May 17 00:47:50.811737 kubelet[2511]: I0517 00:47:50.811720 2511 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 17 00:47:50.811833 kubelet[2511]: I0517 00:47:50.811823 2511 state_mem.go:36] "Initialized new in-memory state store" May 17 00:47:50.812236 kubelet[2511]: I0517 00:47:50.812213 2511 state_mem.go:88] "Updated default CPUSet" cpuSet="" May 17 00:47:50.812347 kubelet[2511]: I0517 00:47:50.812318 2511 state_mem.go:96] "Updated CPUSet assignments" assignments={} May 17 00:47:50.812441 kubelet[2511]: I0517 00:47:50.812431 2511 policy_none.go:49] "None policy: Start" May 17 00:47:50.813963 kubelet[2511]: I0517 00:47:50.813937 2511 memory_manager.go:170] "Starting memorymanager" policy="None" May 17 00:47:50.814093 kubelet[2511]: I0517 00:47:50.814083 2511 state_mem.go:35] "Initializing new in-memory state store" May 17 00:47:50.814396 kubelet[2511]: I0517 00:47:50.814383 2511 state_mem.go:75] "Updated machine memory state" May 17 00:47:50.818277 kubelet[2511]: E0517 00:47:50.818248 2511 kubelet.go:2345] "Skipping pod synchronization" err="container runtime status check may not have completed yet" May 17 00:47:50.818000 audit[2511]: AVC avc: denied { mac_admin } for pid=2511 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:50.818000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:47:50.818000 audit[2511]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000c7a360 a1=4000f4bb48 a2=4000c7a330 a3=25 items=0 ppid=1 pid=2511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:50.818000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:47:50.819944 kubelet[2511]: I0517 00:47:50.819584 2511 manager.go:513] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 17 00:47:50.819944 kubelet[2511]: I0517 00:47:50.819660 2511 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 17 00:47:50.819944 kubelet[2511]: I0517 00:47:50.819801 2511 eviction_manager.go:189] "Eviction manager: starting control loop" May 17 00:47:50.819944 kubelet[2511]: I0517 00:47:50.819812 2511 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 17 00:47:50.820369 kubelet[2511]: I0517 00:47:50.820175 2511 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 17 00:47:50.930937 kubelet[2511]: I0517 00:47:50.926677 2511 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510.3.7-n-6523ff94dd" May 17 00:47:50.940531 kubelet[2511]: I0517 00:47:50.940493 2511 kubelet_node_status.go:111] "Node was previously registered" node="ci-3510.3.7-n-6523ff94dd" May 17 00:47:50.940677 kubelet[2511]: I0517 00:47:50.940578 2511 kubelet_node_status.go:75] "Successfully registered node" node="ci-3510.3.7-n-6523ff94dd" May 17 00:47:51.030763 kubelet[2511]: W0517 00:47:51.030719 2511 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 17 00:47:51.034108 kubelet[2511]: W0517 00:47:51.034073 2511 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 17 00:47:51.034474 kubelet[2511]: W0517 00:47:51.034448 2511 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 17 00:47:51.100064 kubelet[2511]: I0517 00:47:51.100021 2511 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/ae4a62a3be31fc80e05efb4b4cea69c0-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.7-n-6523ff94dd\" (UID: \"ae4a62a3be31fc80e05efb4b4cea69c0\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-6523ff94dd" May 17 00:47:51.100064 kubelet[2511]: I0517 00:47:51.100061 2511 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/ae4a62a3be31fc80e05efb4b4cea69c0-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.7-n-6523ff94dd\" (UID: \"ae4a62a3be31fc80e05efb4b4cea69c0\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-6523ff94dd" May 17 00:47:51.100254 kubelet[2511]: I0517 00:47:51.100079 2511 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/5f0b632494b14a40e629230dd894eae4-ca-certs\") pod \"kube-apiserver-ci-3510.3.7-n-6523ff94dd\" (UID: \"5f0b632494b14a40e629230dd894eae4\") " pod="kube-system/kube-apiserver-ci-3510.3.7-n-6523ff94dd" May 17 00:47:51.100254 kubelet[2511]: I0517 00:47:51.100094 2511 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/5f0b632494b14a40e629230dd894eae4-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.7-n-6523ff94dd\" (UID: \"5f0b632494b14a40e629230dd894eae4\") " pod="kube-system/kube-apiserver-ci-3510.3.7-n-6523ff94dd" May 17 00:47:51.100254 kubelet[2511]: I0517 00:47:51.100112 2511 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/ae4a62a3be31fc80e05efb4b4cea69c0-ca-certs\") pod \"kube-controller-manager-ci-3510.3.7-n-6523ff94dd\" (UID: \"ae4a62a3be31fc80e05efb4b4cea69c0\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-6523ff94dd" May 17 00:47:51.100254 kubelet[2511]: I0517 00:47:51.100125 2511 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/ae4a62a3be31fc80e05efb4b4cea69c0-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.7-n-6523ff94dd\" (UID: \"ae4a62a3be31fc80e05efb4b4cea69c0\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-6523ff94dd" May 17 00:47:51.100254 kubelet[2511]: I0517 00:47:51.100139 2511 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/ae4a62a3be31fc80e05efb4b4cea69c0-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.7-n-6523ff94dd\" (UID: \"ae4a62a3be31fc80e05efb4b4cea69c0\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-6523ff94dd" May 17 00:47:51.100367 kubelet[2511]: I0517 00:47:51.100155 2511 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/914d127ca78ae9aa41cb21283de2b336-kubeconfig\") pod \"kube-scheduler-ci-3510.3.7-n-6523ff94dd\" (UID: \"914d127ca78ae9aa41cb21283de2b336\") " pod="kube-system/kube-scheduler-ci-3510.3.7-n-6523ff94dd" May 17 00:47:51.100367 kubelet[2511]: I0517 00:47:51.100170 2511 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/5f0b632494b14a40e629230dd894eae4-k8s-certs\") pod \"kube-apiserver-ci-3510.3.7-n-6523ff94dd\" (UID: \"5f0b632494b14a40e629230dd894eae4\") " pod="kube-system/kube-apiserver-ci-3510.3.7-n-6523ff94dd" May 17 00:47:51.677784 kubelet[2511]: I0517 00:47:51.677755 2511 apiserver.go:52] "Watching apiserver" May 17 00:47:51.697835 kubelet[2511]: I0517 00:47:51.697784 2511 desired_state_of_world_populator.go:155] "Finished populating initial desired state of world" May 17 00:47:51.797049 kubelet[2511]: W0517 00:47:51.797002 2511 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 17 00:47:51.797204 kubelet[2511]: E0517 00:47:51.797082 2511 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ci-3510.3.7-n-6523ff94dd\" already exists" pod="kube-system/kube-controller-manager-ci-3510.3.7-n-6523ff94dd" May 17 00:47:51.798035 kubelet[2511]: W0517 00:47:51.798015 2511 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 17 00:47:51.798154 kubelet[2511]: W0517 00:47:51.798143 2511 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 17 00:47:51.798256 kubelet[2511]: E0517 00:47:51.798242 2511 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ci-3510.3.7-n-6523ff94dd\" already exists" pod="kube-system/kube-scheduler-ci-3510.3.7-n-6523ff94dd" May 17 00:47:51.798468 kubelet[2511]: E0517 00:47:51.798451 2511 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.7-n-6523ff94dd\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.7-n-6523ff94dd" May 17 00:47:51.819044 kubelet[2511]: I0517 00:47:51.818981 2511 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510.3.7-n-6523ff94dd" podStartSLOduration=0.818960666 podStartE2EDuration="818.960666ms" podCreationTimestamp="2025-05-17 00:47:51 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:47:51.809691274 +0000 UTC m=+1.490430710" watchObservedRunningTime="2025-05-17 00:47:51.818960666 +0000 UTC m=+1.499700102" May 17 00:47:51.819271 kubelet[2511]: I0517 00:47:51.819121 2511 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510.3.7-n-6523ff94dd" podStartSLOduration=0.819116104 podStartE2EDuration="819.116104ms" podCreationTimestamp="2025-05-17 00:47:51 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:47:51.818196397 +0000 UTC m=+1.498935793" watchObservedRunningTime="2025-05-17 00:47:51.819116104 +0000 UTC m=+1.499855540" May 17 00:47:54.485000 audit[2391]: AVC avc: denied { watch } for pid=2391 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c122,c191 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:47:54.485000 audit[2391]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=400171b5e0 a2=fc6 a3=0 items=0 ppid=2229 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c122,c191 key=(null) May 17 00:47:54.485000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:47:54.486000 audit[2391]: AVC avc: denied { watch } for pid=2391 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c122,c191 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:47:54.486000 audit[2391]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=400171b7a0 a2=fc6 a3=0 items=0 ppid=2229 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c122,c191 key=(null) May 17 00:47:54.486000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:47:54.486000 audit[2391]: AVC avc: denied { watch } for pid=2391 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c122,c191 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:47:54.486000 audit[2391]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=400171b960 a2=fc6 a3=0 items=0 ppid=2229 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c122,c191 key=(null) May 17 00:47:54.486000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:47:54.487000 audit[2391]: AVC avc: denied { watch } for pid=2391 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c122,c191 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:47:54.487000 audit[2391]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=400171bb20 a2=fc6 a3=0 items=0 ppid=2229 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c122,c191 key=(null) May 17 00:47:54.487000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:47:54.638000 audit[2391]: AVC avc: denied { watch } for pid=2391 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=521005 scontext=system_u:system_r:svirt_lxc_net_t:s0:c122,c191 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 17 00:47:54.638000 audit[2391]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000d7d7c0 a2=fc6 a3=0 items=0 ppid=2229 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c122,c191 key=(null) May 17 00:47:54.638000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:47:54.848407 kubelet[2511]: I0517 00:47:54.848294 2511 kuberuntime_manager.go:1635] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" May 17 00:47:54.849044 env[1452]: time="2025-05-17T00:47:54.848953399Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 17 00:47:54.849409 kubelet[2511]: I0517 00:47:54.849389 2511 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" May 17 00:47:55.509940 kubelet[2511]: I0517 00:47:55.509850 2511 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510.3.7-n-6523ff94dd" podStartSLOduration=4.509829229 podStartE2EDuration="4.509829229s" podCreationTimestamp="2025-05-17 00:47:51 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:47:51.829162566 +0000 UTC m=+1.509902002" watchObservedRunningTime="2025-05-17 00:47:55.509829229 +0000 UTC m=+5.190568625" May 17 00:47:55.514674 systemd[1]: Created slice kubepods-besteffort-pod7930df63_baea_4e27_ab87_41edb8737fc3.slice. May 17 00:47:55.524000 kubelet[2511]: I0517 00:47:55.523961 2511 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/7930df63-baea-4e27-ab87-41edb8737fc3-kube-proxy\") pod \"kube-proxy-h7sz7\" (UID: \"7930df63-baea-4e27-ab87-41edb8737fc3\") " pod="kube-system/kube-proxy-h7sz7" May 17 00:47:55.524101 kubelet[2511]: I0517 00:47:55.524006 2511 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/7930df63-baea-4e27-ab87-41edb8737fc3-xtables-lock\") pod \"kube-proxy-h7sz7\" (UID: \"7930df63-baea-4e27-ab87-41edb8737fc3\") " pod="kube-system/kube-proxy-h7sz7" May 17 00:47:55.524101 kubelet[2511]: I0517 00:47:55.524026 2511 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/7930df63-baea-4e27-ab87-41edb8737fc3-lib-modules\") pod \"kube-proxy-h7sz7\" (UID: \"7930df63-baea-4e27-ab87-41edb8737fc3\") " pod="kube-system/kube-proxy-h7sz7" May 17 00:47:55.524101 kubelet[2511]: I0517 00:47:55.524043 2511 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-h9r92\" (UniqueName: \"kubernetes.io/projected/7930df63-baea-4e27-ab87-41edb8737fc3-kube-api-access-h9r92\") pod \"kube-proxy-h7sz7\" (UID: \"7930df63-baea-4e27-ab87-41edb8737fc3\") " pod="kube-system/kube-proxy-h7sz7" May 17 00:47:55.633181 kubelet[2511]: E0517 00:47:55.633140 2511 projected.go:288] Couldn't get configMap kube-system/kube-root-ca.crt: configmap "kube-root-ca.crt" not found May 17 00:47:55.633181 kubelet[2511]: E0517 00:47:55.633175 2511 projected.go:194] Error preparing data for projected volume kube-api-access-h9r92 for pod kube-system/kube-proxy-h7sz7: configmap "kube-root-ca.crt" not found May 17 00:47:55.633358 kubelet[2511]: E0517 00:47:55.633236 2511 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/7930df63-baea-4e27-ab87-41edb8737fc3-kube-api-access-h9r92 podName:7930df63-baea-4e27-ab87-41edb8737fc3 nodeName:}" failed. No retries permitted until 2025-05-17 00:47:56.133217577 +0000 UTC m=+5.813957013 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-h9r92" (UniqueName: "kubernetes.io/projected/7930df63-baea-4e27-ab87-41edb8737fc3-kube-api-access-h9r92") pod "kube-proxy-h7sz7" (UID: "7930df63-baea-4e27-ab87-41edb8737fc3") : configmap "kube-root-ca.crt" not found May 17 00:47:55.797207 systemd[1]: Created slice kubepods-besteffort-pod238195ea_f449_42df_9332_953ad08e6463.slice. May 17 00:47:55.827193 kubelet[2511]: I0517 00:47:55.827139 2511 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ktfhc\" (UniqueName: \"kubernetes.io/projected/238195ea-f449-42df-9332-953ad08e6463-kube-api-access-ktfhc\") pod \"tigera-operator-7c5755cdcb-n4thr\" (UID: \"238195ea-f449-42df-9332-953ad08e6463\") " pod="tigera-operator/tigera-operator-7c5755cdcb-n4thr" May 17 00:47:55.827346 kubelet[2511]: I0517 00:47:55.827243 2511 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/238195ea-f449-42df-9332-953ad08e6463-var-lib-calico\") pod \"tigera-operator-7c5755cdcb-n4thr\" (UID: \"238195ea-f449-42df-9332-953ad08e6463\") " pod="tigera-operator/tigera-operator-7c5755cdcb-n4thr" May 17 00:47:55.935518 kubelet[2511]: I0517 00:47:55.935486 2511 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" May 17 00:47:56.101418 env[1452]: time="2025-05-17T00:47:56.101146320Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7c5755cdcb-n4thr,Uid:238195ea-f449-42df-9332-953ad08e6463,Namespace:tigera-operator,Attempt:0,}" May 17 00:47:56.144670 env[1452]: time="2025-05-17T00:47:56.144479636Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:47:56.144670 env[1452]: time="2025-05-17T00:47:56.144522155Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:47:56.144670 env[1452]: time="2025-05-17T00:47:56.144532275Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:47:56.145068 env[1452]: time="2025-05-17T00:47:56.145015509Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8f4cfed36199d243b24ed64e8f0dba47ee654979c6bea8786c918d0795756d75 pid=2561 runtime=io.containerd.runc.v2 May 17 00:47:56.164218 systemd[1]: Started cri-containerd-8f4cfed36199d243b24ed64e8f0dba47ee654979c6bea8786c918d0795756d75.scope. May 17 00:47:56.189899 kernel: kauditd_printk_skb: 315 callbacks suppressed May 17 00:47:56.189985 kernel: audit: type=1400 audit(1747442876.177:786): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.241155 kernel: audit: type=1400 audit(1747442876.177:787): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.241274 kernel: audit: type=1400 audit(1747442876.177:788): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.260626 kernel: audit: type=1400 audit(1747442876.177:789): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.262271 env[1452]: time="2025-05-17T00:47:56.262233411Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7c5755cdcb-n4thr,Uid:238195ea-f449-42df-9332-953ad08e6463,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"8f4cfed36199d243b24ed64e8f0dba47ee654979c6bea8786c918d0795756d75\"" May 17 00:47:56.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.280949 kernel: audit: type=1400 audit(1747442876.177:790): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.284539 env[1452]: time="2025-05-17T00:47:56.284504421Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.0\"" May 17 00:47:56.300766 kernel: audit: type=1400 audit(1747442876.177:791): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.301635 kernel: audit: type=1400 audit(1747442876.177:792): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.340151 kernel: audit: type=1400 audit(1747442876.177:793): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.340619 kernel: audit: type=1400 audit(1747442876.177:794): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.375966 kernel: audit: type=1400 audit(1747442876.183:795): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.183000 audit: BPF prog-id=104 op=LOAD May 17 00:47:56.200000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.200000 audit[2572]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=2561 pid=2572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:56.200000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866346366656433363139396432343362323465643634653866306462 May 17 00:47:56.200000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.200000 audit[2572]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2561 pid=2572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:56.200000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866346366656433363139396432343362323465643634653866306462 May 17 00:47:56.200000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.200000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.200000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.200000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.200000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.200000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.200000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.200000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.200000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.200000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.200000 audit: BPF prog-id=105 op=LOAD May 17 00:47:56.200000 audit[2572]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2561 pid=2572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:56.200000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866346366656433363139396432343362323465643634653866306462 May 17 00:47:56.200000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.200000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.200000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.200000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.200000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.200000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.200000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.200000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.200000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.200000 audit: BPF prog-id=106 op=LOAD May 17 00:47:56.200000 audit[2572]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2561 pid=2572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:56.200000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866346366656433363139396432343362323465643634653866306462 May 17 00:47:56.201000 audit: BPF prog-id=106 op=UNLOAD May 17 00:47:56.201000 audit: BPF prog-id=105 op=UNLOAD May 17 00:47:56.201000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.201000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.201000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.201000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.201000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.201000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.201000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.201000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.201000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.201000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.201000 audit: BPF prog-id=107 op=LOAD May 17 00:47:56.201000 audit[2572]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2561 pid=2572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:56.201000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866346366656433363139396432343362323465643634653866306462 May 17 00:47:56.422097 env[1452]: time="2025-05-17T00:47:56.422037157Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-h7sz7,Uid:7930df63-baea-4e27-ab87-41edb8737fc3,Namespace:kube-system,Attempt:0,}" May 17 00:47:56.475145 env[1452]: time="2025-05-17T00:47:56.475058795Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:47:56.475346 env[1452]: time="2025-05-17T00:47:56.475169954Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:47:56.475346 env[1452]: time="2025-05-17T00:47:56.475196913Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:47:56.475529 env[1452]: time="2025-05-17T00:47:56.475488310Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6e64601cb02664bbee4bd5e87838a17d157048e754e9c1c4ddcec55cdfd9cfd3 pid=2604 runtime=io.containerd.runc.v2 May 17 00:47:56.488182 systemd[1]: Started cri-containerd-6e64601cb02664bbee4bd5e87838a17d157048e754e9c1c4ddcec55cdfd9cfd3.scope. May 17 00:47:56.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.499000 audit: BPF prog-id=108 op=LOAD May 17 00:47:56.500000 audit[2615]: AVC avc: denied { bpf } for pid=2615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.500000 audit[2615]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2604 pid=2615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:56.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665363436303163623032363634626265653462643565383738333861 May 17 00:47:56.500000 audit[2615]: AVC avc: denied { perfmon } for pid=2615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.500000 audit[2615]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2604 pid=2615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:56.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665363436303163623032363634626265653462643565383738333861 May 17 00:47:56.500000 audit[2615]: AVC avc: denied { bpf } for pid=2615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.500000 audit[2615]: AVC avc: denied { bpf } for pid=2615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.500000 audit[2615]: AVC avc: denied { bpf } for pid=2615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.500000 audit[2615]: AVC avc: denied { perfmon } for pid=2615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.500000 audit[2615]: AVC avc: denied { perfmon } for pid=2615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.500000 audit[2615]: AVC avc: denied { perfmon } for pid=2615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.500000 audit[2615]: AVC avc: denied { perfmon } for pid=2615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.500000 audit[2615]: AVC avc: denied { perfmon } for pid=2615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.500000 audit[2615]: AVC avc: denied { bpf } for pid=2615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.500000 audit[2615]: AVC avc: denied { bpf } for pid=2615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.500000 audit: BPF prog-id=109 op=LOAD May 17 00:47:56.500000 audit[2615]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2604 pid=2615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:56.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665363436303163623032363634626265653462643565383738333861 May 17 00:47:56.500000 audit[2615]: AVC avc: denied { bpf } for pid=2615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.500000 audit[2615]: AVC avc: denied { bpf } for pid=2615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.500000 audit[2615]: AVC avc: denied { perfmon } for pid=2615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.500000 audit[2615]: AVC avc: denied { perfmon } for pid=2615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.500000 audit[2615]: AVC avc: denied { perfmon } for pid=2615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.500000 audit[2615]: AVC avc: denied { perfmon } for pid=2615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.500000 audit[2615]: AVC avc: denied { perfmon } for pid=2615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.500000 audit[2615]: AVC avc: denied { bpf } for pid=2615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.500000 audit[2615]: AVC avc: denied { bpf } for pid=2615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.500000 audit: BPF prog-id=110 op=LOAD May 17 00:47:56.500000 audit[2615]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2604 pid=2615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:56.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665363436303163623032363634626265653462643565383738333861 May 17 00:47:56.500000 audit: BPF prog-id=110 op=UNLOAD May 17 00:47:56.500000 audit: BPF prog-id=109 op=UNLOAD May 17 00:47:56.500000 audit[2615]: AVC avc: denied { bpf } for pid=2615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.500000 audit[2615]: AVC avc: denied { bpf } for pid=2615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.500000 audit[2615]: AVC avc: denied { bpf } for pid=2615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.500000 audit[2615]: AVC avc: denied { perfmon } for pid=2615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.500000 audit[2615]: AVC avc: denied { perfmon } for pid=2615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.500000 audit[2615]: AVC avc: denied { perfmon } for pid=2615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.500000 audit[2615]: AVC avc: denied { perfmon } for pid=2615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.500000 audit[2615]: AVC avc: denied { perfmon } for pid=2615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.500000 audit[2615]: AVC avc: denied { bpf } for pid=2615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.500000 audit[2615]: AVC avc: denied { bpf } for pid=2615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.500000 audit: BPF prog-id=111 op=LOAD May 17 00:47:56.500000 audit[2615]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2604 pid=2615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:56.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665363436303163623032363634626265653462643565383738333861 May 17 00:47:56.515551 env[1452]: time="2025-05-17T00:47:56.515503265Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-h7sz7,Uid:7930df63-baea-4e27-ab87-41edb8737fc3,Namespace:kube-system,Attempt:0,} returns sandbox id \"6e64601cb02664bbee4bd5e87838a17d157048e754e9c1c4ddcec55cdfd9cfd3\"" May 17 00:47:56.518825 env[1452]: time="2025-05-17T00:47:56.518776386Z" level=info msg="CreateContainer within sandbox \"6e64601cb02664bbee4bd5e87838a17d157048e754e9c1c4ddcec55cdfd9cfd3\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 17 00:47:56.575651 env[1452]: time="2025-05-17T00:47:56.575590218Z" level=info msg="CreateContainer within sandbox \"6e64601cb02664bbee4bd5e87838a17d157048e754e9c1c4ddcec55cdfd9cfd3\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"374781ae17a7db9c44e08236645a341a7dae4e73c1a1c53aff3528330157e7cb\"" May 17 00:47:56.577813 env[1452]: time="2025-05-17T00:47:56.577050361Z" level=info msg="StartContainer for \"374781ae17a7db9c44e08236645a341a7dae4e73c1a1c53aff3528330157e7cb\"" May 17 00:47:56.594185 systemd[1]: Started cri-containerd-374781ae17a7db9c44e08236645a341a7dae4e73c1a1c53aff3528330157e7cb.scope. May 17 00:47:56.614000 audit[2647]: AVC avc: denied { perfmon } for pid=2647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.614000 audit[2647]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2604 pid=2647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:56.614000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337343738316165313761376462396334346530383233363634356133 May 17 00:47:56.614000 audit[2647]: AVC avc: denied { bpf } for pid=2647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.614000 audit[2647]: AVC avc: denied { bpf } for pid=2647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.614000 audit[2647]: AVC avc: denied { bpf } for pid=2647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.614000 audit[2647]: AVC avc: denied { perfmon } for pid=2647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.614000 audit[2647]: AVC avc: denied { perfmon } for pid=2647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.614000 audit[2647]: AVC avc: denied { perfmon } for pid=2647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.614000 audit[2647]: AVC avc: denied { perfmon } for pid=2647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.614000 audit[2647]: AVC avc: denied { perfmon } for pid=2647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.614000 audit[2647]: AVC avc: denied { bpf } for pid=2647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.614000 audit[2647]: AVC avc: denied { bpf } for pid=2647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.614000 audit: BPF prog-id=112 op=LOAD May 17 00:47:56.614000 audit[2647]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2604 pid=2647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:56.614000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337343738316165313761376462396334346530383233363634356133 May 17 00:47:56.615000 audit[2647]: AVC avc: denied { bpf } for pid=2647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.615000 audit[2647]: AVC avc: denied { bpf } for pid=2647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.615000 audit[2647]: AVC avc: denied { perfmon } for pid=2647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.615000 audit[2647]: AVC avc: denied { perfmon } for pid=2647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.615000 audit[2647]: AVC avc: denied { perfmon } for pid=2647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.615000 audit[2647]: AVC avc: denied { perfmon } for pid=2647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.615000 audit[2647]: AVC avc: denied { perfmon } for pid=2647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.615000 audit[2647]: AVC avc: denied { bpf } for pid=2647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.615000 audit[2647]: AVC avc: denied { bpf } for pid=2647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.615000 audit: BPF prog-id=113 op=LOAD May 17 00:47:56.615000 audit[2647]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2604 pid=2647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:56.615000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337343738316165313761376462396334346530383233363634356133 May 17 00:47:56.615000 audit: BPF prog-id=113 op=UNLOAD May 17 00:47:56.615000 audit: BPF prog-id=112 op=UNLOAD May 17 00:47:56.615000 audit[2647]: AVC avc: denied { bpf } for pid=2647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.615000 audit[2647]: AVC avc: denied { bpf } for pid=2647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.615000 audit[2647]: AVC avc: denied { bpf } for pid=2647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.615000 audit[2647]: AVC avc: denied { perfmon } for pid=2647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.615000 audit[2647]: AVC avc: denied { perfmon } for pid=2647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.615000 audit[2647]: AVC avc: denied { perfmon } for pid=2647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.615000 audit[2647]: AVC avc: denied { perfmon } for pid=2647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.615000 audit[2647]: AVC avc: denied { perfmon } for pid=2647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.615000 audit[2647]: AVC avc: denied { bpf } for pid=2647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.615000 audit[2647]: AVC avc: denied { bpf } for pid=2647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:56.615000 audit: BPF prog-id=114 op=LOAD May 17 00:47:56.615000 audit[2647]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2604 pid=2647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:56.615000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337343738316165313761376462396334346530383233363634356133 May 17 00:47:56.634911 env[1452]: time="2025-05-17T00:47:56.634782182Z" level=info msg="StartContainer for \"374781ae17a7db9c44e08236645a341a7dae4e73c1a1c53aff3528330157e7cb\" returns successfully" May 17 00:47:56.781000 audit[2706]: NETFILTER_CFG table=mangle:43 family=2 entries=1 op=nft_register_chain pid=2706 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:56.781000 audit[2706]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffc2a2390 a2=0 a3=1 items=0 ppid=2658 pid=2706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:56.781000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 17 00:47:56.783000 audit[2708]: NETFILTER_CFG table=nat:44 family=2 entries=1 op=nft_register_chain pid=2708 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:56.783000 audit[2708]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe94e7210 a2=0 a3=1 items=0 ppid=2658 pid=2708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:56.783000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 17 00:47:56.784000 audit[2707]: NETFILTER_CFG table=mangle:45 family=10 entries=1 op=nft_register_chain pid=2707 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:47:56.784000 audit[2707]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcb97f4e0 a2=0 a3=1 items=0 ppid=2658 pid=2707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:56.784000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 17 00:47:56.792000 audit[2709]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_chain pid=2709 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:56.792000 audit[2709]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffdc4cfc80 a2=0 a3=1 items=0 ppid=2658 pid=2709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:56.792000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 17 00:47:56.798000 audit[2710]: NETFILTER_CFG table=nat:47 family=10 entries=1 op=nft_register_chain pid=2710 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:47:56.798000 audit[2710]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdf2bd630 a2=0 a3=1 items=0 ppid=2658 pid=2710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:56.798000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 17 00:47:56.807000 audit[2711]: NETFILTER_CFG table=filter:48 family=10 entries=1 op=nft_register_chain pid=2711 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:47:56.807000 audit[2711]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe3199960 a2=0 a3=1 items=0 ppid=2658 pid=2711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:56.807000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 17 00:47:56.833094 kubelet[2511]: I0517 00:47:56.833034 2511 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-h7sz7" podStartSLOduration=1.833005543 podStartE2EDuration="1.833005543s" podCreationTimestamp="2025-05-17 00:47:55 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:47:56.818515638 +0000 UTC m=+6.499255074" watchObservedRunningTime="2025-05-17 00:47:56.833005543 +0000 UTC m=+6.513744979" May 17 00:47:56.884000 audit[2712]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2712 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:56.884000 audit[2712]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffef9ad150 a2=0 a3=1 items=0 ppid=2658 pid=2712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:56.884000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 17 00:47:56.889000 audit[2714]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2714 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:56.889000 audit[2714]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffd36c1660 a2=0 a3=1 items=0 ppid=2658 pid=2714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:56.889000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 17 00:47:56.892000 audit[2717]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2717 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:56.892000 audit[2717]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffcf2f7d20 a2=0 a3=1 items=0 ppid=2658 pid=2717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:56.892000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 17 00:47:56.893000 audit[2718]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2718 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:56.893000 audit[2718]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc058c500 a2=0 a3=1 items=0 ppid=2658 pid=2718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:56.893000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 17 00:47:56.896000 audit[2720]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2720 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:56.896000 audit[2720]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe624d010 a2=0 a3=1 items=0 ppid=2658 pid=2720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:56.896000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 17 00:47:56.897000 audit[2721]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2721 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:56.897000 audit[2721]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffe168200 a2=0 a3=1 items=0 ppid=2658 pid=2721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:56.897000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 17 00:47:56.900000 audit[2723]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2723 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:56.900000 audit[2723]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffc3663ad0 a2=0 a3=1 items=0 ppid=2658 pid=2723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:56.900000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 17 00:47:56.903000 audit[2726]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2726 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:56.903000 audit[2726]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffffaf87440 a2=0 a3=1 items=0 ppid=2658 pid=2726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:56.903000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 17 00:47:56.904000 audit[2727]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_chain pid=2727 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:56.904000 audit[2727]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc3a1d450 a2=0 a3=1 items=0 ppid=2658 pid=2727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:56.904000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 17 00:47:56.906000 audit[2729]: NETFILTER_CFG table=filter:58 family=2 entries=1 op=nft_register_rule pid=2729 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:56.906000 audit[2729]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe43ef470 a2=0 a3=1 items=0 ppid=2658 pid=2729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:56.906000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 17 00:47:56.907000 audit[2730]: NETFILTER_CFG table=filter:59 family=2 entries=1 op=nft_register_chain pid=2730 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:56.907000 audit[2730]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe66d96a0 a2=0 a3=1 items=0 ppid=2658 pid=2730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:56.907000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 17 00:47:56.910000 audit[2732]: NETFILTER_CFG table=filter:60 family=2 entries=1 op=nft_register_rule pid=2732 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:56.910000 audit[2732]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe755a420 a2=0 a3=1 items=0 ppid=2658 pid=2732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:56.910000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 00:47:56.914000 audit[2735]: NETFILTER_CFG table=filter:61 family=2 entries=1 op=nft_register_rule pid=2735 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:56.914000 audit[2735]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffcae99530 a2=0 a3=1 items=0 ppid=2658 pid=2735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:56.914000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 00:47:56.917000 audit[2738]: NETFILTER_CFG table=filter:62 family=2 entries=1 op=nft_register_rule pid=2738 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:56.917000 audit[2738]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc57a2ff0 a2=0 a3=1 items=0 ppid=2658 pid=2738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:56.917000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 17 00:47:56.918000 audit[2739]: NETFILTER_CFG table=nat:63 family=2 entries=1 op=nft_register_chain pid=2739 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:56.918000 audit[2739]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffc1c8a160 a2=0 a3=1 items=0 ppid=2658 pid=2739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:56.918000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 17 00:47:56.922000 audit[2741]: NETFILTER_CFG table=nat:64 family=2 entries=1 op=nft_register_rule pid=2741 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:56.922000 audit[2741]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=524 a0=3 a1=ffffd1f878d0 a2=0 a3=1 items=0 ppid=2658 pid=2741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:56.922000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:47:56.925000 audit[2744]: NETFILTER_CFG table=nat:65 family=2 entries=1 op=nft_register_rule pid=2744 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:56.925000 audit[2744]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffcc9cc320 a2=0 a3=1 items=0 ppid=2658 pid=2744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:56.925000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:47:56.927000 audit[2745]: NETFILTER_CFG table=nat:66 family=2 entries=1 op=nft_register_chain pid=2745 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:56.927000 audit[2745]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffa8aaa90 a2=0 a3=1 items=0 ppid=2658 pid=2745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:56.927000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 17 00:47:56.929000 audit[2747]: NETFILTER_CFG table=nat:67 family=2 entries=1 op=nft_register_rule pid=2747 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:56.929000 audit[2747]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=532 a0=3 a1=ffffdec07210 a2=0 a3=1 items=0 ppid=2658 pid=2747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:56.929000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 17 00:47:56.945195 systemd[1]: run-containerd-runc-k8s.io-8f4cfed36199d243b24ed64e8f0dba47ee654979c6bea8786c918d0795756d75-runc.TbrdTO.mount: Deactivated successfully. May 17 00:47:57.027000 audit[2754]: NETFILTER_CFG table=filter:68 family=2 entries=8 op=nft_register_rule pid=2754 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:47:57.027000 audit[2754]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5248 a0=3 a1=fffff6645e90 a2=0 a3=1 items=0 ppid=2658 pid=2754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:57.027000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:47:57.053000 audit[2754]: NETFILTER_CFG table=nat:69 family=2 entries=14 op=nft_register_chain pid=2754 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:47:57.053000 audit[2754]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5508 a0=3 a1=fffff6645e90 a2=0 a3=1 items=0 ppid=2658 pid=2754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:57.053000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:47:57.054000 audit[2759]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2759 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:47:57.054000 audit[2759]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=fffff9dae160 a2=0 a3=1 items=0 ppid=2658 pid=2759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:57.054000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 17 00:47:57.057000 audit[2761]: NETFILTER_CFG table=filter:71 family=10 entries=2 op=nft_register_chain pid=2761 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:47:57.057000 audit[2761]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffffda5430 a2=0 a3=1 items=0 ppid=2658 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:57.057000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 17 00:47:57.061000 audit[2764]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2764 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:47:57.061000 audit[2764]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=fffff56f6cf0 a2=0 a3=1 items=0 ppid=2658 pid=2764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:57.061000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 17 00:47:57.062000 audit[2765]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2765 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:47:57.062000 audit[2765]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd6523260 a2=0 a3=1 items=0 ppid=2658 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:57.062000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 17 00:47:57.066000 audit[2767]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2767 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:47:57.066000 audit[2767]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd5730560 a2=0 a3=1 items=0 ppid=2658 pid=2767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:57.066000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 17 00:47:57.068000 audit[2768]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2768 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:47:57.068000 audit[2768]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffe2ea000 a2=0 a3=1 items=0 ppid=2658 pid=2768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:57.068000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 17 00:47:57.072000 audit[2770]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2770 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:47:57.072000 audit[2770]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffd90fe840 a2=0 a3=1 items=0 ppid=2658 pid=2770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:57.072000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 17 00:47:57.077000 audit[2773]: NETFILTER_CFG table=filter:77 family=10 entries=2 op=nft_register_chain pid=2773 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:47:57.077000 audit[2773]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffe3fcd820 a2=0 a3=1 items=0 ppid=2658 pid=2773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:57.077000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 17 00:47:57.078000 audit[2774]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_chain pid=2774 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:47:57.078000 audit[2774]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffef6a3f20 a2=0 a3=1 items=0 ppid=2658 pid=2774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:57.078000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 17 00:47:57.081000 audit[2776]: NETFILTER_CFG table=filter:79 family=10 entries=1 op=nft_register_rule pid=2776 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:47:57.081000 audit[2776]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe5ae5900 a2=0 a3=1 items=0 ppid=2658 pid=2776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:57.081000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 17 00:47:57.082000 audit[2777]: NETFILTER_CFG table=filter:80 family=10 entries=1 op=nft_register_chain pid=2777 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:47:57.082000 audit[2777]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd632bef0 a2=0 a3=1 items=0 ppid=2658 pid=2777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:57.082000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 17 00:47:57.085000 audit[2779]: NETFILTER_CFG table=filter:81 family=10 entries=1 op=nft_register_rule pid=2779 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:47:57.085000 audit[2779]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffdbcdb0d0 a2=0 a3=1 items=0 ppid=2658 pid=2779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:57.085000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 00:47:57.095000 audit[2782]: NETFILTER_CFG table=filter:82 family=10 entries=1 op=nft_register_rule pid=2782 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:47:57.095000 audit[2782]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc317b750 a2=0 a3=1 items=0 ppid=2658 pid=2782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:57.095000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 17 00:47:57.099000 audit[2785]: NETFILTER_CFG table=filter:83 family=10 entries=1 op=nft_register_rule pid=2785 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:47:57.099000 audit[2785]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff35a69c0 a2=0 a3=1 items=0 ppid=2658 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:57.099000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 17 00:47:57.100000 audit[2786]: NETFILTER_CFG table=nat:84 family=10 entries=1 op=nft_register_chain pid=2786 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:47:57.100000 audit[2786]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffd72178c0 a2=0 a3=1 items=0 ppid=2658 pid=2786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:57.100000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 17 00:47:57.102000 audit[2788]: NETFILTER_CFG table=nat:85 family=10 entries=2 op=nft_register_chain pid=2788 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:47:57.102000 audit[2788]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffe11107b0 a2=0 a3=1 items=0 ppid=2658 pid=2788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:57.102000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:47:57.105000 audit[2791]: NETFILTER_CFG table=nat:86 family=10 entries=2 op=nft_register_chain pid=2791 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:47:57.105000 audit[2791]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffe8ab14b0 a2=0 a3=1 items=0 ppid=2658 pid=2791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:57.105000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:47:57.106000 audit[2792]: NETFILTER_CFG table=nat:87 family=10 entries=1 op=nft_register_chain pid=2792 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:47:57.106000 audit[2792]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe0387130 a2=0 a3=1 items=0 ppid=2658 pid=2792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:57.106000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 17 00:47:57.109000 audit[2794]: NETFILTER_CFG table=nat:88 family=10 entries=2 op=nft_register_chain pid=2794 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:47:57.109000 audit[2794]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffcb0154e0 a2=0 a3=1 items=0 ppid=2658 pid=2794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:57.109000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 17 00:47:57.110000 audit[2795]: NETFILTER_CFG table=filter:89 family=10 entries=1 op=nft_register_chain pid=2795 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:47:57.110000 audit[2795]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd5c036d0 a2=0 a3=1 items=0 ppid=2658 pid=2795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:57.110000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 17 00:47:57.112000 audit[2797]: NETFILTER_CFG table=filter:90 family=10 entries=1 op=nft_register_rule pid=2797 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:47:57.112000 audit[2797]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffffef97690 a2=0 a3=1 items=0 ppid=2658 pid=2797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:57.112000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:47:57.115000 audit[2800]: NETFILTER_CFG table=filter:91 family=10 entries=1 op=nft_register_rule pid=2800 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:47:57.115000 audit[2800]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffe9d8a9b0 a2=0 a3=1 items=0 ppid=2658 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:57.115000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:47:57.118000 audit[2802]: NETFILTER_CFG table=filter:92 family=10 entries=3 op=nft_register_rule pid=2802 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 17 00:47:57.118000 audit[2802]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2088 a0=3 a1=ffffde6984c0 a2=0 a3=1 items=0 ppid=2658 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:57.118000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:47:57.118000 audit[2802]: NETFILTER_CFG table=nat:93 family=10 entries=7 op=nft_register_chain pid=2802 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 17 00:47:57.118000 audit[2802]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=ffffde6984c0 a2=0 a3=1 items=0 ppid=2658 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:57.118000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:47:58.146518 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1487031324.mount: Deactivated successfully. May 17 00:47:58.865870 env[1452]: time="2025-05-17T00:47:58.865788147Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.38.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:47:58.874828 env[1452]: time="2025-05-17T00:47:58.874773644Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:171854d50ba608218142ad5d32c7dd12ce55d536f02872e56e7c04c1f0a96a6b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:47:58.879971 env[1452]: time="2025-05-17T00:47:58.879940584Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.38.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:47:58.884604 env[1452]: time="2025-05-17T00:47:58.884578011Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:e0a34b265aebce1a2db906d8dad99190706e8bf3910cae626b9c2eb6bbb21775,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:47:58.885344 env[1452]: time="2025-05-17T00:47:58.885317963Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.0\" returns image reference \"sha256:171854d50ba608218142ad5d32c7dd12ce55d536f02872e56e7c04c1f0a96a6b\"" May 17 00:47:58.889371 env[1452]: time="2025-05-17T00:47:58.889333956Z" level=info msg="CreateContainer within sandbox \"8f4cfed36199d243b24ed64e8f0dba47ee654979c6bea8786c918d0795756d75\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" May 17 00:47:58.923639 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3821012241.mount: Deactivated successfully. May 17 00:47:58.951989 env[1452]: time="2025-05-17T00:47:58.951926396Z" level=info msg="CreateContainer within sandbox \"8f4cfed36199d243b24ed64e8f0dba47ee654979c6bea8786c918d0795756d75\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"1d2956a87b549b8a7f62fc596f7e8059e5d74eea4fb564c226b6c71e07a8138d\"" May 17 00:47:58.952790 env[1452]: time="2025-05-17T00:47:58.952758466Z" level=info msg="StartContainer for \"1d2956a87b549b8a7f62fc596f7e8059e5d74eea4fb564c226b6c71e07a8138d\"" May 17 00:47:58.968840 systemd[1]: Started cri-containerd-1d2956a87b549b8a7f62fc596f7e8059e5d74eea4fb564c226b6c71e07a8138d.scope. May 17 00:47:58.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:58.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:58.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:58.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:58.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:58.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:58.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:58.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:58.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:58.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:58.984000 audit: BPF prog-id=115 op=LOAD May 17 00:47:58.984000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:58.984000 audit[2810]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2561 pid=2810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:58.984000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164323935366138376235343962386137663632666335393666376538 May 17 00:47:58.984000 audit[2810]: AVC avc: denied { perfmon } for pid=2810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:58.984000 audit[2810]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2561 pid=2810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:58.984000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164323935366138376235343962386137663632666335393666376538 May 17 00:47:58.984000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:58.984000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:58.984000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:58.984000 audit[2810]: AVC avc: denied { perfmon } for pid=2810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:58.984000 audit[2810]: AVC avc: denied { perfmon } for pid=2810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:58.984000 audit[2810]: AVC avc: denied { perfmon } for pid=2810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:58.984000 audit[2810]: AVC avc: denied { perfmon } for pid=2810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:58.984000 audit[2810]: AVC avc: denied { perfmon } for pid=2810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:58.984000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:58.984000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:58.984000 audit: BPF prog-id=116 op=LOAD May 17 00:47:58.984000 audit[2810]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2561 pid=2810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:58.984000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164323935366138376235343962386137663632666335393666376538 May 17 00:47:58.984000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:58.984000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:58.984000 audit[2810]: AVC avc: denied { perfmon } for pid=2810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:58.984000 audit[2810]: AVC avc: denied { perfmon } for pid=2810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:58.984000 audit[2810]: AVC avc: denied { perfmon } for pid=2810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:58.984000 audit[2810]: AVC avc: denied { perfmon } for pid=2810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:58.984000 audit[2810]: AVC avc: denied { perfmon } for pid=2810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:58.984000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:58.984000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:58.984000 audit: BPF prog-id=117 op=LOAD May 17 00:47:58.984000 audit[2810]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2561 pid=2810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:58.984000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164323935366138376235343962386137663632666335393666376538 May 17 00:47:58.984000 audit: BPF prog-id=117 op=UNLOAD May 17 00:47:58.984000 audit: BPF prog-id=116 op=UNLOAD May 17 00:47:58.985000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:58.985000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:58.985000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:58.985000 audit[2810]: AVC avc: denied { perfmon } for pid=2810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:58.985000 audit[2810]: AVC avc: denied { perfmon } for pid=2810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:58.985000 audit[2810]: AVC avc: denied { perfmon } for pid=2810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:58.985000 audit[2810]: AVC avc: denied { perfmon } for pid=2810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:58.985000 audit[2810]: AVC avc: denied { perfmon } for pid=2810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:58.985000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:58.985000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:47:58.985000 audit: BPF prog-id=118 op=LOAD May 17 00:47:58.985000 audit[2810]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2561 pid=2810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:58.985000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164323935366138376235343962386137663632666335393666376538 May 17 00:47:59.010938 env[1452]: time="2025-05-17T00:47:59.010877080Z" level=info msg="StartContainer for \"1d2956a87b549b8a7f62fc596f7e8059e5d74eea4fb564c226b6c71e07a8138d\" returns successfully" May 17 00:47:59.107580 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount40231529.mount: Deactivated successfully. May 17 00:48:00.526793 kubelet[2511]: I0517 00:48:00.526734 2511 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-7c5755cdcb-n4thr" podStartSLOduration=2.921886217 podStartE2EDuration="5.526715751s" podCreationTimestamp="2025-05-17 00:47:55 +0000 UTC" firstStartedPulling="2025-05-17 00:47:56.282039331 +0000 UTC m=+5.962778767" lastFinishedPulling="2025-05-17 00:47:58.886868865 +0000 UTC m=+8.567608301" observedRunningTime="2025-05-17 00:47:59.81274603 +0000 UTC m=+9.493485426" watchObservedRunningTime="2025-05-17 00:48:00.526715751 +0000 UTC m=+10.207455187" May 17 00:48:05.009837 sudo[1795]: pam_unix(sudo:session): session closed for user root May 17 00:48:05.037320 kernel: kauditd_printk_skb: 357 callbacks suppressed May 17 00:48:05.037446 kernel: audit: type=1106 audit(1747442885.009:897): pid=1795 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:48:05.009000 audit[1795]: USER_END pid=1795 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:48:05.038000 audit[1795]: CRED_DISP pid=1795 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:48:05.074639 kernel: audit: type=1104 audit(1747442885.038:898): pid=1795 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:48:05.111537 sshd[1792]: pam_unix(sshd:session): session closed for user core May 17 00:48:05.111000 audit[1792]: USER_END pid=1792 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:48:05.139156 systemd[1]: sshd@6-10.200.20.42:22-10.200.16.10:34950.service: Deactivated successfully. May 17 00:48:05.139877 systemd[1]: session-9.scope: Deactivated successfully. May 17 00:48:05.140022 systemd[1]: session-9.scope: Consumed 5.434s CPU time. May 17 00:48:05.111000 audit[1792]: CRED_DISP pid=1792 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:48:05.162961 kernel: audit: type=1106 audit(1747442885.111:899): pid=1792 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:48:05.163101 kernel: audit: type=1104 audit(1747442885.111:900): pid=1792 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:48:05.164449 systemd-logind[1439]: Session 9 logged out. Waiting for processes to exit. May 17 00:48:05.166698 systemd-logind[1439]: Removed session 9. May 17 00:48:05.138000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.42:22-10.200.16.10:34950 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:05.189890 kernel: audit: type=1131 audit(1747442885.138:901): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.42:22-10.200.16.10:34950 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:06.638000 audit[2885]: NETFILTER_CFG table=filter:94 family=2 entries=15 op=nft_register_rule pid=2885 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:48:06.638000 audit[2885]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=ffffd688ad10 a2=0 a3=1 items=0 ppid=2658 pid=2885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:06.684618 kernel: audit: type=1325 audit(1747442886.638:902): table=filter:94 family=2 entries=15 op=nft_register_rule pid=2885 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:48:06.684748 kernel: audit: type=1300 audit(1747442886.638:902): arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=ffffd688ad10 a2=0 a3=1 items=0 ppid=2658 pid=2885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:06.638000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:48:06.713513 kernel: audit: type=1327 audit(1747442886.638:902): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:48:06.653000 audit[2885]: NETFILTER_CFG table=nat:95 family=2 entries=12 op=nft_register_rule pid=2885 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:48:06.738515 kernel: audit: type=1325 audit(1747442886.653:903): table=nat:95 family=2 entries=12 op=nft_register_rule pid=2885 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:48:06.653000 audit[2885]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffd688ad10 a2=0 a3=1 items=0 ppid=2658 pid=2885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:06.766739 kernel: audit: type=1300 audit(1747442886.653:903): arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffd688ad10 a2=0 a3=1 items=0 ppid=2658 pid=2885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:06.653000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:48:06.670000 audit[2887]: NETFILTER_CFG table=filter:96 family=2 entries=16 op=nft_register_rule pid=2887 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:48:06.670000 audit[2887]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=ffffcd19dd70 a2=0 a3=1 items=0 ppid=2658 pid=2887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:06.670000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:48:06.691000 audit[2887]: NETFILTER_CFG table=nat:97 family=2 entries=12 op=nft_register_rule pid=2887 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:48:06.691000 audit[2887]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffcd19dd70 a2=0 a3=1 items=0 ppid=2658 pid=2887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:06.691000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:48:10.362000 audit[2889]: NETFILTER_CFG table=filter:98 family=2 entries=17 op=nft_register_rule pid=2889 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:48:10.368532 kernel: kauditd_printk_skb: 7 callbacks suppressed May 17 00:48:10.368694 kernel: audit: type=1325 audit(1747442890.362:906): table=filter:98 family=2 entries=17 op=nft_register_rule pid=2889 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:48:10.362000 audit[2889]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6736 a0=3 a1=ffffc3635a90 a2=0 a3=1 items=0 ppid=2658 pid=2889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:10.413906 kernel: audit: type=1300 audit(1747442890.362:906): arch=c00000b7 syscall=211 success=yes exit=6736 a0=3 a1=ffffc3635a90 a2=0 a3=1 items=0 ppid=2658 pid=2889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:10.362000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:48:10.428572 kernel: audit: type=1327 audit(1747442890.362:906): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:48:10.389000 audit[2889]: NETFILTER_CFG table=nat:99 family=2 entries=12 op=nft_register_rule pid=2889 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:48:10.446314 kernel: audit: type=1325 audit(1747442890.389:907): table=nat:99 family=2 entries=12 op=nft_register_rule pid=2889 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:48:10.449088 kernel: audit: type=1300 audit(1747442890.389:907): arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffc3635a90 a2=0 a3=1 items=0 ppid=2658 pid=2889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:10.389000 audit[2889]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffc3635a90 a2=0 a3=1 items=0 ppid=2658 pid=2889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:10.389000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:48:10.489931 kernel: audit: type=1327 audit(1747442890.389:907): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:48:10.488000 audit[2891]: NETFILTER_CFG table=filter:100 family=2 entries=18 op=nft_register_rule pid=2891 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:48:10.505043 kernel: audit: type=1325 audit(1747442890.488:908): table=filter:100 family=2 entries=18 op=nft_register_rule pid=2891 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:48:10.488000 audit[2891]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6736 a0=3 a1=ffffd998b200 a2=0 a3=1 items=0 ppid=2658 pid=2891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:10.532419 kernel: audit: type=1300 audit(1747442890.488:908): arch=c00000b7 syscall=211 success=yes exit=6736 a0=3 a1=ffffd998b200 a2=0 a3=1 items=0 ppid=2658 pid=2891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:10.488000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:48:10.554035 kernel: audit: type=1327 audit(1747442890.488:908): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:48:10.555000 audit[2891]: NETFILTER_CFG table=nat:101 family=2 entries=12 op=nft_register_rule pid=2891 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:48:10.555000 audit[2891]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffd998b200 a2=0 a3=1 items=0 ppid=2658 pid=2891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:10.555000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:48:10.571909 kernel: audit: type=1325 audit(1747442890.555:909): table=nat:101 family=2 entries=12 op=nft_register_rule pid=2891 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:48:10.671594 systemd[1]: Created slice kubepods-besteffort-pod966b8d54_3db2_465e_8e68_f2cb3ceac668.slice. May 17 00:48:10.738119 kubelet[2511]: I0517 00:48:10.738072 2511 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/966b8d54-3db2-465e-8e68-f2cb3ceac668-tigera-ca-bundle\") pod \"calico-typha-767fb44954-2kgdf\" (UID: \"966b8d54-3db2-465e-8e68-f2cb3ceac668\") " pod="calico-system/calico-typha-767fb44954-2kgdf" May 17 00:48:10.738596 kubelet[2511]: I0517 00:48:10.738566 2511 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/966b8d54-3db2-465e-8e68-f2cb3ceac668-typha-certs\") pod \"calico-typha-767fb44954-2kgdf\" (UID: \"966b8d54-3db2-465e-8e68-f2cb3ceac668\") " pod="calico-system/calico-typha-767fb44954-2kgdf" May 17 00:48:10.738672 kubelet[2511]: I0517 00:48:10.738602 2511 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kf242\" (UniqueName: \"kubernetes.io/projected/966b8d54-3db2-465e-8e68-f2cb3ceac668-kube-api-access-kf242\") pod \"calico-typha-767fb44954-2kgdf\" (UID: \"966b8d54-3db2-465e-8e68-f2cb3ceac668\") " pod="calico-system/calico-typha-767fb44954-2kgdf" May 17 00:48:10.825545 systemd[1]: Created slice kubepods-besteffort-podfe51385d_705b_40d4_99bf_a30dc16e58fb.slice. May 17 00:48:10.839149 kubelet[2511]: I0517 00:48:10.839091 2511 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/fe51385d-705b-40d4-99bf-a30dc16e58fb-node-certs\") pod \"calico-node-7xmfl\" (UID: \"fe51385d-705b-40d4-99bf-a30dc16e58fb\") " pod="calico-system/calico-node-7xmfl" May 17 00:48:10.839149 kubelet[2511]: I0517 00:48:10.839132 2511 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/fe51385d-705b-40d4-99bf-a30dc16e58fb-var-run-calico\") pod \"calico-node-7xmfl\" (UID: \"fe51385d-705b-40d4-99bf-a30dc16e58fb\") " pod="calico-system/calico-node-7xmfl" May 17 00:48:10.839335 kubelet[2511]: I0517 00:48:10.839163 2511 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/fe51385d-705b-40d4-99bf-a30dc16e58fb-cni-bin-dir\") pod \"calico-node-7xmfl\" (UID: \"fe51385d-705b-40d4-99bf-a30dc16e58fb\") " pod="calico-system/calico-node-7xmfl" May 17 00:48:10.839335 kubelet[2511]: I0517 00:48:10.839179 2511 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/fe51385d-705b-40d4-99bf-a30dc16e58fb-flexvol-driver-host\") pod \"calico-node-7xmfl\" (UID: \"fe51385d-705b-40d4-99bf-a30dc16e58fb\") " pod="calico-system/calico-node-7xmfl" May 17 00:48:10.839335 kubelet[2511]: I0517 00:48:10.839195 2511 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zhmp7\" (UniqueName: \"kubernetes.io/projected/fe51385d-705b-40d4-99bf-a30dc16e58fb-kube-api-access-zhmp7\") pod \"calico-node-7xmfl\" (UID: \"fe51385d-705b-40d4-99bf-a30dc16e58fb\") " pod="calico-system/calico-node-7xmfl" May 17 00:48:10.839335 kubelet[2511]: I0517 00:48:10.839234 2511 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/fe51385d-705b-40d4-99bf-a30dc16e58fb-xtables-lock\") pod \"calico-node-7xmfl\" (UID: \"fe51385d-705b-40d4-99bf-a30dc16e58fb\") " pod="calico-system/calico-node-7xmfl" May 17 00:48:10.839335 kubelet[2511]: I0517 00:48:10.839250 2511 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/fe51385d-705b-40d4-99bf-a30dc16e58fb-tigera-ca-bundle\") pod \"calico-node-7xmfl\" (UID: \"fe51385d-705b-40d4-99bf-a30dc16e58fb\") " pod="calico-system/calico-node-7xmfl" May 17 00:48:10.839451 kubelet[2511]: I0517 00:48:10.839266 2511 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/fe51385d-705b-40d4-99bf-a30dc16e58fb-cni-log-dir\") pod \"calico-node-7xmfl\" (UID: \"fe51385d-705b-40d4-99bf-a30dc16e58fb\") " pod="calico-system/calico-node-7xmfl" May 17 00:48:10.839451 kubelet[2511]: I0517 00:48:10.839283 2511 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/fe51385d-705b-40d4-99bf-a30dc16e58fb-lib-modules\") pod \"calico-node-7xmfl\" (UID: \"fe51385d-705b-40d4-99bf-a30dc16e58fb\") " pod="calico-system/calico-node-7xmfl" May 17 00:48:10.839451 kubelet[2511]: I0517 00:48:10.839301 2511 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/fe51385d-705b-40d4-99bf-a30dc16e58fb-var-lib-calico\") pod \"calico-node-7xmfl\" (UID: \"fe51385d-705b-40d4-99bf-a30dc16e58fb\") " pod="calico-system/calico-node-7xmfl" May 17 00:48:10.839451 kubelet[2511]: I0517 00:48:10.839317 2511 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/fe51385d-705b-40d4-99bf-a30dc16e58fb-cni-net-dir\") pod \"calico-node-7xmfl\" (UID: \"fe51385d-705b-40d4-99bf-a30dc16e58fb\") " pod="calico-system/calico-node-7xmfl" May 17 00:48:10.839451 kubelet[2511]: I0517 00:48:10.839332 2511 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/fe51385d-705b-40d4-99bf-a30dc16e58fb-policysync\") pod \"calico-node-7xmfl\" (UID: \"fe51385d-705b-40d4-99bf-a30dc16e58fb\") " pod="calico-system/calico-node-7xmfl" May 17 00:48:10.947970 kubelet[2511]: E0517 00:48:10.947170 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:10.950998 kubelet[2511]: W0517 00:48:10.950934 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:10.951147 kubelet[2511]: E0517 00:48:10.951003 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:10.951380 kubelet[2511]: E0517 00:48:10.951354 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:10.951380 kubelet[2511]: W0517 00:48:10.951369 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:10.951380 kubelet[2511]: E0517 00:48:10.951380 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:10.951599 kubelet[2511]: E0517 00:48:10.951577 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:10.951599 kubelet[2511]: W0517 00:48:10.951592 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:10.951599 kubelet[2511]: E0517 00:48:10.951601 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:10.952032 kubelet[2511]: E0517 00:48:10.952006 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:10.952032 kubelet[2511]: W0517 00:48:10.952023 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:10.952032 kubelet[2511]: E0517 00:48:10.952034 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:10.954033 kubelet[2511]: E0517 00:48:10.953992 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:10.954033 kubelet[2511]: W0517 00:48:10.954018 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:10.954033 kubelet[2511]: E0517 00:48:10.954035 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:10.979451 env[1452]: time="2025-05-17T00:48:10.979387756Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-767fb44954-2kgdf,Uid:966b8d54-3db2-465e-8e68-f2cb3ceac668,Namespace:calico-system,Attempt:0,}" May 17 00:48:10.980078 kubelet[2511]: E0517 00:48:10.980028 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:10.980078 kubelet[2511]: W0517 00:48:10.980053 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:10.980078 kubelet[2511]: E0517 00:48:10.980072 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:10.991487 kubelet[2511]: E0517 00:48:10.991257 2511 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mqsn2" podUID="ca23fe46-c12b-49ed-aa7e-a638ad594bbf" May 17 00:48:11.025433 env[1452]: time="2025-05-17T00:48:11.025225563Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:48:11.025433 env[1452]: time="2025-05-17T00:48:11.025271643Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:48:11.025433 env[1452]: time="2025-05-17T00:48:11.025282243Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:48:11.025786 env[1452]: time="2025-05-17T00:48:11.025716439Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d71f24d32f4e54663b904f0a5c024ddf79bc9ae0e8313db9ebd8ac7d935f4831 pid=2910 runtime=io.containerd.runc.v2 May 17 00:48:11.038920 kubelet[2511]: E0517 00:48:11.038833 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:11.038920 kubelet[2511]: W0517 00:48:11.038905 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:11.039119 kubelet[2511]: E0517 00:48:11.038938 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:11.039156 kubelet[2511]: E0517 00:48:11.039144 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:11.039183 kubelet[2511]: W0517 00:48:11.039164 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:11.039183 kubelet[2511]: E0517 00:48:11.039177 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:11.039366 kubelet[2511]: E0517 00:48:11.039343 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:11.039366 kubelet[2511]: W0517 00:48:11.039357 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:11.039366 kubelet[2511]: E0517 00:48:11.039366 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:11.039533 kubelet[2511]: E0517 00:48:11.039512 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:11.039533 kubelet[2511]: W0517 00:48:11.039527 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:11.039594 kubelet[2511]: E0517 00:48:11.039536 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:11.039779 kubelet[2511]: E0517 00:48:11.039696 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:11.039779 kubelet[2511]: W0517 00:48:11.039709 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:11.039779 kubelet[2511]: E0517 00:48:11.039718 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:11.039895 kubelet[2511]: E0517 00:48:11.039837 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:11.039895 kubelet[2511]: W0517 00:48:11.039852 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:11.039895 kubelet[2511]: E0517 00:48:11.039869 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:11.040020 kubelet[2511]: E0517 00:48:11.039991 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:11.040020 kubelet[2511]: W0517 00:48:11.040011 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:11.040020 kubelet[2511]: E0517 00:48:11.040019 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:11.040173 kubelet[2511]: E0517 00:48:11.040144 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:11.040173 kubelet[2511]: W0517 00:48:11.040163 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:11.040173 kubelet[2511]: E0517 00:48:11.040171 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:11.040359 kubelet[2511]: E0517 00:48:11.040331 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:11.040359 kubelet[2511]: W0517 00:48:11.040344 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:11.040359 kubelet[2511]: E0517 00:48:11.040353 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:11.040521 kubelet[2511]: E0517 00:48:11.040498 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:11.040521 kubelet[2511]: W0517 00:48:11.040510 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:11.040521 kubelet[2511]: E0517 00:48:11.040519 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:11.040718 kubelet[2511]: E0517 00:48:11.040698 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:11.040718 kubelet[2511]: W0517 00:48:11.040710 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:11.040781 kubelet[2511]: E0517 00:48:11.040720 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:11.040898 kubelet[2511]: E0517 00:48:11.040846 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:11.040898 kubelet[2511]: W0517 00:48:11.040892 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:11.040975 kubelet[2511]: E0517 00:48:11.040901 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:11.041300 kubelet[2511]: E0517 00:48:11.041072 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:11.041300 kubelet[2511]: W0517 00:48:11.041086 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:11.041300 kubelet[2511]: E0517 00:48:11.041096 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:11.041300 kubelet[2511]: E0517 00:48:11.041229 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:11.041300 kubelet[2511]: W0517 00:48:11.041237 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:11.041300 kubelet[2511]: E0517 00:48:11.041248 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:11.042651 kubelet[2511]: E0517 00:48:11.042618 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:11.043391 kubelet[2511]: W0517 00:48:11.043286 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:11.043391 kubelet[2511]: E0517 00:48:11.043313 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:11.044662 systemd[1]: Started cri-containerd-d71f24d32f4e54663b904f0a5c024ddf79bc9ae0e8313db9ebd8ac7d935f4831.scope. May 17 00:48:11.049207 kubelet[2511]: E0517 00:48:11.049168 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:11.049207 kubelet[2511]: W0517 00:48:11.049196 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:11.049321 kubelet[2511]: E0517 00:48:11.049214 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:11.049475 kubelet[2511]: E0517 00:48:11.049450 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:11.049475 kubelet[2511]: W0517 00:48:11.049465 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:11.049475 kubelet[2511]: E0517 00:48:11.049475 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:11.051894 kubelet[2511]: E0517 00:48:11.050091 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:11.051894 kubelet[2511]: W0517 00:48:11.050107 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:11.051894 kubelet[2511]: E0517 00:48:11.050118 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:11.051894 kubelet[2511]: E0517 00:48:11.050358 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:11.051894 kubelet[2511]: W0517 00:48:11.050368 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:11.051894 kubelet[2511]: E0517 00:48:11.050378 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:11.051894 kubelet[2511]: E0517 00:48:11.050593 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:11.051894 kubelet[2511]: W0517 00:48:11.050603 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:11.051894 kubelet[2511]: E0517 00:48:11.050612 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:11.051894 kubelet[2511]: E0517 00:48:11.050892 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:11.052186 kubelet[2511]: W0517 00:48:11.050902 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:11.052186 kubelet[2511]: E0517 00:48:11.050921 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:11.052186 kubelet[2511]: I0517 00:48:11.050946 2511 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6x84c\" (UniqueName: \"kubernetes.io/projected/ca23fe46-c12b-49ed-aa7e-a638ad594bbf-kube-api-access-6x84c\") pod \"csi-node-driver-mqsn2\" (UID: \"ca23fe46-c12b-49ed-aa7e-a638ad594bbf\") " pod="calico-system/csi-node-driver-mqsn2" May 17 00:48:11.052186 kubelet[2511]: E0517 00:48:11.051139 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:11.052186 kubelet[2511]: W0517 00:48:11.051150 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:11.052186 kubelet[2511]: E0517 00:48:11.051162 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:11.052186 kubelet[2511]: I0517 00:48:11.051188 2511 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/ca23fe46-c12b-49ed-aa7e-a638ad594bbf-registration-dir\") pod \"csi-node-driver-mqsn2\" (UID: \"ca23fe46-c12b-49ed-aa7e-a638ad594bbf\") " pod="calico-system/csi-node-driver-mqsn2" May 17 00:48:11.052186 kubelet[2511]: E0517 00:48:11.051949 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:11.052406 kubelet[2511]: W0517 00:48:11.051965 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:11.052406 kubelet[2511]: E0517 00:48:11.051990 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:11.052406 kubelet[2511]: I0517 00:48:11.052010 2511 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/ca23fe46-c12b-49ed-aa7e-a638ad594bbf-socket-dir\") pod \"csi-node-driver-mqsn2\" (UID: \"ca23fe46-c12b-49ed-aa7e-a638ad594bbf\") " pod="calico-system/csi-node-driver-mqsn2" May 17 00:48:11.054543 kubelet[2511]: E0517 00:48:11.054334 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:11.054543 kubelet[2511]: W0517 00:48:11.054363 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:11.054543 kubelet[2511]: E0517 00:48:11.054378 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:11.054543 kubelet[2511]: I0517 00:48:11.054397 2511 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/ca23fe46-c12b-49ed-aa7e-a638ad594bbf-varrun\") pod \"csi-node-driver-mqsn2\" (UID: \"ca23fe46-c12b-49ed-aa7e-a638ad594bbf\") " pod="calico-system/csi-node-driver-mqsn2" May 17 00:48:11.057298 kubelet[2511]: E0517 00:48:11.057269 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:11.057298 kubelet[2511]: W0517 00:48:11.057292 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:11.057417 kubelet[2511]: E0517 00:48:11.057384 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:11.057417 kubelet[2511]: I0517 00:48:11.057406 2511 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/ca23fe46-c12b-49ed-aa7e-a638ad594bbf-kubelet-dir\") pod \"csi-node-driver-mqsn2\" (UID: \"ca23fe46-c12b-49ed-aa7e-a638ad594bbf\") " pod="calico-system/csi-node-driver-mqsn2" May 17 00:48:11.059020 kubelet[2511]: E0517 00:48:11.058976 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:11.059020 kubelet[2511]: W0517 00:48:11.059007 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:11.059136 kubelet[2511]: E0517 00:48:11.059099 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:11.060992 kubelet[2511]: E0517 00:48:11.060953 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:11.060992 kubelet[2511]: W0517 00:48:11.060981 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:11.061116 kubelet[2511]: E0517 00:48:11.061083 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:11.061251 kubelet[2511]: E0517 00:48:11.061220 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:11.061251 kubelet[2511]: W0517 00:48:11.061241 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:11.061320 kubelet[2511]: E0517 00:48:11.061314 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:11.061491 kubelet[2511]: E0517 00:48:11.061468 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:11.061491 kubelet[2511]: W0517 00:48:11.061485 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:11.061631 kubelet[2511]: E0517 00:48:11.061561 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:11.061783 kubelet[2511]: E0517 00:48:11.061761 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:11.061783 kubelet[2511]: W0517 00:48:11.061775 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:11.061945 kubelet[2511]: E0517 00:48:11.061880 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:11.062680 kubelet[2511]: E0517 00:48:11.062638 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:11.062680 kubelet[2511]: W0517 00:48:11.062658 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:11.062680 kubelet[2511]: E0517 00:48:11.062678 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:11.062999 kubelet[2511]: E0517 00:48:11.062977 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:11.062999 kubelet[2511]: W0517 00:48:11.062994 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:11.063084 kubelet[2511]: E0517 00:48:11.063011 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:11.063246 kubelet[2511]: E0517 00:48:11.063222 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:11.063246 kubelet[2511]: W0517 00:48:11.063237 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:11.063319 kubelet[2511]: E0517 00:48:11.063246 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:11.063468 kubelet[2511]: E0517 00:48:11.063446 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:11.063468 kubelet[2511]: W0517 00:48:11.063462 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:11.063542 kubelet[2511]: E0517 00:48:11.063473 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:11.063801 kubelet[2511]: E0517 00:48:11.063778 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:11.063801 kubelet[2511]: W0517 00:48:11.063795 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:11.063898 kubelet[2511]: E0517 00:48:11.063814 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:11.105000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:11.105000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:11.105000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:11.105000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:11.105000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:11.105000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:11.105000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:11.105000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:11.105000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:11.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:11.106000 audit: BPF prog-id=119 op=LOAD May 17 00:48:11.106000 audit[2922]: AVC avc: denied { bpf } for pid=2922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:11.106000 audit[2922]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2910 pid=2922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:11.106000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437316632346433326634653534363633623930346630613563303234 May 17 00:48:11.107000 audit[2922]: AVC avc: denied { perfmon } for pid=2922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:11.107000 audit[2922]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2910 pid=2922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:11.107000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437316632346433326634653534363633623930346630613563303234 May 17 00:48:11.107000 audit[2922]: AVC avc: denied { bpf } for pid=2922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:11.107000 audit[2922]: AVC avc: denied { bpf } for pid=2922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:11.107000 audit[2922]: AVC avc: denied { bpf } for pid=2922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:11.107000 audit[2922]: AVC avc: denied { perfmon } for pid=2922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:11.107000 audit[2922]: AVC avc: denied { perfmon } for pid=2922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:11.107000 audit[2922]: AVC avc: denied { perfmon } for pid=2922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:11.107000 audit[2922]: AVC avc: denied { perfmon } for pid=2922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:11.107000 audit[2922]: AVC avc: denied { perfmon } for pid=2922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:11.107000 audit[2922]: AVC avc: denied { bpf } for pid=2922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:11.107000 audit[2922]: AVC avc: denied { bpf } for pid=2922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:11.107000 audit: BPF prog-id=120 op=LOAD May 17 00:48:11.107000 audit[2922]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2910 pid=2922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:11.107000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437316632346433326634653534363633623930346630613563303234 May 17 00:48:11.107000 audit[2922]: AVC avc: denied { bpf } for pid=2922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:11.107000 audit[2922]: AVC avc: denied { bpf } for pid=2922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:11.107000 audit[2922]: AVC avc: denied { perfmon } for pid=2922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:11.107000 audit[2922]: AVC avc: denied { perfmon } for pid=2922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:11.107000 audit[2922]: AVC avc: denied { perfmon } for pid=2922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:11.107000 audit[2922]: AVC avc: denied { perfmon } for pid=2922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:11.107000 audit[2922]: AVC avc: denied { perfmon } for pid=2922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:11.107000 audit[2922]: AVC avc: denied { bpf } for pid=2922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:11.107000 audit[2922]: AVC avc: denied { bpf } for pid=2922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:11.107000 audit: BPF prog-id=121 op=LOAD May 17 00:48:11.107000 audit[2922]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2910 pid=2922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:11.107000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437316632346433326634653534363633623930346630613563303234 May 17 00:48:11.108000 audit: BPF prog-id=121 op=UNLOAD May 17 00:48:11.108000 audit: BPF prog-id=120 op=UNLOAD May 17 00:48:11.108000 audit[2922]: AVC avc: denied { bpf } for pid=2922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:11.108000 audit[2922]: AVC avc: denied { bpf } for pid=2922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:11.108000 audit[2922]: AVC avc: denied { bpf } for pid=2922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:11.108000 audit[2922]: AVC avc: denied { perfmon } for pid=2922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:11.108000 audit[2922]: AVC avc: denied { perfmon } for pid=2922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:11.108000 audit[2922]: AVC avc: denied { perfmon } for pid=2922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:11.108000 audit[2922]: AVC avc: denied { perfmon } for pid=2922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:11.108000 audit[2922]: AVC avc: denied { perfmon } for pid=2922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:11.108000 audit[2922]: AVC avc: denied { bpf } for pid=2922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:11.108000 audit[2922]: AVC avc: denied { bpf } for pid=2922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:11.108000 audit: BPF prog-id=122 op=LOAD May 17 00:48:11.108000 audit[2922]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2910 pid=2922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:11.108000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437316632346433326634653534363633623930346630613563303234 May 17 00:48:11.129201 env[1452]: time="2025-05-17T00:48:11.129144321Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-7xmfl,Uid:fe51385d-705b-40d4-99bf-a30dc16e58fb,Namespace:calico-system,Attempt:0,}" May 17 00:48:11.131017 env[1452]: time="2025-05-17T00:48:11.130975946Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-767fb44954-2kgdf,Uid:966b8d54-3db2-465e-8e68-f2cb3ceac668,Namespace:calico-system,Attempt:0,} returns sandbox id \"d71f24d32f4e54663b904f0a5c024ddf79bc9ae0e8313db9ebd8ac7d935f4831\"" May 17 00:48:11.132633 env[1452]: time="2025-05-17T00:48:11.132602012Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.0\"" May 17 00:48:11.158400 kubelet[2511]: E0517 00:48:11.158318 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:11.158400 kubelet[2511]: W0517 00:48:11.158340 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:11.158400 kubelet[2511]: E0517 00:48:11.158359 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:11.158963 kubelet[2511]: E0517 00:48:11.158931 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:11.158963 kubelet[2511]: W0517 00:48:11.158950 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:11.159079 kubelet[2511]: E0517 00:48:11.158965 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:11.159822 kubelet[2511]: E0517 00:48:11.159795 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:11.159822 kubelet[2511]: W0517 00:48:11.159811 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:11.159970 kubelet[2511]: E0517 00:48:11.159837 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:11.160139 kubelet[2511]: E0517 00:48:11.160110 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:11.160139 kubelet[2511]: W0517 00:48:11.160135 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:11.160233 kubelet[2511]: E0517 00:48:11.160211 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:11.160402 kubelet[2511]: E0517 00:48:11.160379 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:11.160402 kubelet[2511]: W0517 00:48:11.160395 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:11.160498 kubelet[2511]: E0517 00:48:11.160476 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:11.160741 kubelet[2511]: E0517 00:48:11.160719 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:11.160741 kubelet[2511]: W0517 00:48:11.160734 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:11.160830 kubelet[2511]: E0517 00:48:11.160819 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:11.161057 kubelet[2511]: E0517 00:48:11.161033 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:11.161107 kubelet[2511]: W0517 00:48:11.161059 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:11.161107 kubelet[2511]: E0517 00:48:11.161073 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:11.161306 kubelet[2511]: E0517 00:48:11.161280 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:11.161306 kubelet[2511]: W0517 00:48:11.161303 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:11.161373 kubelet[2511]: E0517 00:48:11.161319 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:11.164183 kubelet[2511]: E0517 00:48:11.164145 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:11.164183 kubelet[2511]: W0517 00:48:11.164172 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:11.164350 kubelet[2511]: E0517 00:48:11.164305 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:11.164508 kubelet[2511]: E0517 00:48:11.164488 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:11.164508 kubelet[2511]: W0517 00:48:11.164502 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:11.164602 kubelet[2511]: E0517 00:48:11.164582 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:11.164802 kubelet[2511]: E0517 00:48:11.164774 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:11.164802 kubelet[2511]: W0517 00:48:11.164789 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:11.164931 kubelet[2511]: E0517 00:48:11.164920 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:11.165060 kubelet[2511]: E0517 00:48:11.165039 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:11.165060 kubelet[2511]: W0517 00:48:11.165053 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:11.165149 kubelet[2511]: E0517 00:48:11.165129 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:11.165267 kubelet[2511]: E0517 00:48:11.165244 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:11.165267 kubelet[2511]: W0517 00:48:11.165257 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:11.165381 kubelet[2511]: E0517 00:48:11.165356 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:11.165501 kubelet[2511]: E0517 00:48:11.165481 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:11.165501 kubelet[2511]: W0517 00:48:11.165493 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:11.167171 kubelet[2511]: E0517 00:48:11.167137 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:11.169149 kubelet[2511]: E0517 00:48:11.169104 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:11.169149 kubelet[2511]: W0517 00:48:11.169137 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:11.169301 kubelet[2511]: E0517 00:48:11.169164 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:11.169431 kubelet[2511]: E0517 00:48:11.169401 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:11.169431 kubelet[2511]: W0517 00:48:11.169423 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:11.169515 kubelet[2511]: E0517 00:48:11.169494 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:11.169663 kubelet[2511]: E0517 00:48:11.169632 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:11.169663 kubelet[2511]: W0517 00:48:11.169655 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:11.169733 kubelet[2511]: E0517 00:48:11.169726 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:11.169945 kubelet[2511]: E0517 00:48:11.169854 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:11.169945 kubelet[2511]: W0517 00:48:11.169940 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:11.170045 kubelet[2511]: E0517 00:48:11.170024 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:11.170197 kubelet[2511]: E0517 00:48:11.170176 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:11.170197 kubelet[2511]: W0517 00:48:11.170188 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:11.170272 kubelet[2511]: E0517 00:48:11.170256 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:11.170993 kubelet[2511]: E0517 00:48:11.170963 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:11.170993 kubelet[2511]: W0517 00:48:11.170990 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:11.171095 kubelet[2511]: E0517 00:48:11.171008 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:11.171413 kubelet[2511]: E0517 00:48:11.171369 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:11.171413 kubelet[2511]: W0517 00:48:11.171403 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:11.171496 kubelet[2511]: E0517 00:48:11.171476 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:11.171976 kubelet[2511]: E0517 00:48:11.171951 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:11.171976 kubelet[2511]: W0517 00:48:11.171972 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:11.172084 kubelet[2511]: E0517 00:48:11.172064 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:11.173000 kubelet[2511]: E0517 00:48:11.172969 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:11.173000 kubelet[2511]: W0517 00:48:11.172990 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:11.173111 kubelet[2511]: E0517 00:48:11.173093 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:11.173232 kubelet[2511]: E0517 00:48:11.173209 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:11.173232 kubelet[2511]: W0517 00:48:11.173223 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:11.173332 kubelet[2511]: E0517 00:48:11.173313 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:11.173438 kubelet[2511]: E0517 00:48:11.173420 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:11.173438 kubelet[2511]: W0517 00:48:11.173433 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:11.173503 kubelet[2511]: E0517 00:48:11.173442 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:11.181495 env[1452]: time="2025-05-17T00:48:11.181400638Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:48:11.181628 env[1452]: time="2025-05-17T00:48:11.181500237Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:48:11.181628 env[1452]: time="2025-05-17T00:48:11.181527757Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:48:11.181722 env[1452]: time="2025-05-17T00:48:11.181682835Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/add3cbbf4a955878ce1701bfdbf9361d45d7fba9f9d544e317c3554deeda669c pid=3013 runtime=io.containerd.runc.v2 May 17 00:48:11.202629 kubelet[2511]: E0517 00:48:11.202520 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:11.202629 kubelet[2511]: W0517 00:48:11.202554 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:11.202629 kubelet[2511]: E0517 00:48:11.202576 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:11.218993 systemd[1]: Started cri-containerd-add3cbbf4a955878ce1701bfdbf9361d45d7fba9f9d544e317c3554deeda669c.scope. May 17 00:48:11.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:11.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:11.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:11.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:11.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:11.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:11.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:11.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:11.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:11.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:11.234000 audit: BPF prog-id=123 op=LOAD May 17 00:48:11.235000 audit[3021]: AVC avc: denied { bpf } for pid=3021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:11.235000 audit[3021]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3013 pid=3021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:11.235000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164643363626266346139353538373863653137303162666462663933 May 17 00:48:11.235000 audit[3021]: AVC avc: denied { perfmon } for pid=3021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:11.235000 audit[3021]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3013 pid=3021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:11.235000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164643363626266346139353538373863653137303162666462663933 May 17 00:48:11.235000 audit[3021]: AVC avc: denied { bpf } for pid=3021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:11.235000 audit[3021]: AVC avc: denied { bpf } for pid=3021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:11.235000 audit[3021]: AVC avc: denied { bpf } for pid=3021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:11.235000 audit[3021]: AVC avc: denied { perfmon } for pid=3021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:11.235000 audit[3021]: AVC avc: denied { perfmon } for pid=3021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:11.235000 audit[3021]: AVC avc: denied { perfmon } for pid=3021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:11.235000 audit[3021]: AVC avc: denied { perfmon } for pid=3021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:11.235000 audit[3021]: AVC avc: denied { perfmon } for pid=3021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:11.235000 audit[3021]: AVC avc: denied { bpf } for pid=3021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:11.235000 audit[3021]: AVC avc: denied { bpf } for pid=3021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:11.235000 audit: BPF prog-id=124 op=LOAD May 17 00:48:11.235000 audit[3021]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3013 pid=3021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:11.235000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164643363626266346139353538373863653137303162666462663933 May 17 00:48:11.235000 audit[3021]: AVC avc: denied { bpf } for pid=3021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:11.235000 audit[3021]: AVC avc: denied { bpf } for pid=3021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:11.235000 audit[3021]: AVC avc: denied { perfmon } for pid=3021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:11.235000 audit[3021]: AVC avc: denied { perfmon } for pid=3021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:11.235000 audit[3021]: AVC avc: denied { perfmon } for pid=3021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:11.235000 audit[3021]: AVC avc: denied { perfmon } for pid=3021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:11.235000 audit[3021]: AVC avc: denied { perfmon } for pid=3021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:11.235000 audit[3021]: AVC avc: denied { bpf } for pid=3021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:11.235000 audit[3021]: AVC avc: denied { bpf } for pid=3021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:11.235000 audit: BPF prog-id=125 op=LOAD May 17 00:48:11.235000 audit[3021]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3013 pid=3021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:11.235000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164643363626266346139353538373863653137303162666462663933 May 17 00:48:11.235000 audit: BPF prog-id=125 op=UNLOAD May 17 00:48:11.235000 audit: BPF prog-id=124 op=UNLOAD May 17 00:48:11.235000 audit[3021]: AVC avc: denied { bpf } for pid=3021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:11.235000 audit[3021]: AVC avc: denied { bpf } for pid=3021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:11.235000 audit[3021]: AVC avc: denied { bpf } for pid=3021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:11.235000 audit[3021]: AVC avc: denied { perfmon } for pid=3021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:11.235000 audit[3021]: AVC avc: denied { perfmon } for pid=3021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:11.235000 audit[3021]: AVC avc: denied { perfmon } for pid=3021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:11.235000 audit[3021]: AVC avc: denied { perfmon } for pid=3021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:11.235000 audit[3021]: AVC avc: denied { perfmon } for pid=3021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:11.235000 audit[3021]: AVC avc: denied { bpf } for pid=3021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:11.235000 audit[3021]: AVC avc: denied { bpf } for pid=3021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:11.235000 audit: BPF prog-id=126 op=LOAD May 17 00:48:11.235000 audit[3021]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3013 pid=3021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:11.235000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164643363626266346139353538373863653137303162666462663933 May 17 00:48:11.271344 env[1452]: time="2025-05-17T00:48:11.271283595Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-7xmfl,Uid:fe51385d-705b-40d4-99bf-a30dc16e58fb,Namespace:calico-system,Attempt:0,} returns sandbox id \"add3cbbf4a955878ce1701bfdbf9361d45d7fba9f9d544e317c3554deeda669c\"" May 17 00:48:11.579000 audit[3046]: NETFILTER_CFG table=filter:102 family=2 entries=20 op=nft_register_rule pid=3046 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:48:11.579000 audit[3046]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8224 a0=3 a1=ffffd1e11da0 a2=0 a3=1 items=0 ppid=2658 pid=3046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:11.579000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:48:11.585000 audit[3046]: NETFILTER_CFG table=nat:103 family=2 entries=12 op=nft_register_rule pid=3046 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:48:11.585000 audit[3046]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffd1e11da0 a2=0 a3=1 items=0 ppid=2658 pid=3046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:11.585000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:48:12.472200 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2456569593.mount: Deactivated successfully. May 17 00:48:12.724061 kubelet[2511]: E0517 00:48:12.718424 2511 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mqsn2" podUID="ca23fe46-c12b-49ed-aa7e-a638ad594bbf" May 17 00:48:13.705413 env[1452]: time="2025-05-17T00:48:13.705352183Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:13.770025 env[1452]: time="2025-05-17T00:48:13.769924698Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:05ca98cdd7b8267a0dc5550048c0a195c8d42f85d92f090a669493485d8a6beb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:13.777977 env[1452]: time="2025-05-17T00:48:13.777920233Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:13.784844 env[1452]: time="2025-05-17T00:48:13.784790298Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:d282f6c773c4631b9dc8379eb093c54ca34c7728d55d6509cb45da5e1f5baf8f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:13.785501 env[1452]: time="2025-05-17T00:48:13.785461852Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.0\" returns image reference \"sha256:05ca98cdd7b8267a0dc5550048c0a195c8d42f85d92f090a669493485d8a6beb\"" May 17 00:48:13.793129 env[1452]: time="2025-05-17T00:48:13.790191254Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0\"" May 17 00:48:13.802135 env[1452]: time="2025-05-17T00:48:13.802082277Z" level=info msg="CreateContainer within sandbox \"d71f24d32f4e54663b904f0a5c024ddf79bc9ae0e8313db9ebd8ac7d935f4831\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" May 17 00:48:13.883405 env[1452]: time="2025-05-17T00:48:13.883346577Z" level=info msg="CreateContainer within sandbox \"d71f24d32f4e54663b904f0a5c024ddf79bc9ae0e8313db9ebd8ac7d935f4831\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"2f32b42128da04b61f65ab5d8afc111c06ba72185200ff3e6250e28dc1add0b7\"" May 17 00:48:13.883936 env[1452]: time="2025-05-17T00:48:13.883899133Z" level=info msg="StartContainer for \"2f32b42128da04b61f65ab5d8afc111c06ba72185200ff3e6250e28dc1add0b7\"" May 17 00:48:13.908288 systemd[1]: Started cri-containerd-2f32b42128da04b61f65ab5d8afc111c06ba72185200ff3e6250e28dc1add0b7.scope. May 17 00:48:13.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:13.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:13.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:13.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:13.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:13.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:13.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:13.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:13.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:13.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:13.922000 audit: BPF prog-id=127 op=LOAD May 17 00:48:13.922000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:13.922000 audit[3056]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014db38 a2=10 a3=0 items=0 ppid=2910 pid=3056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:13.922000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266333262343231323864613034623631663635616235643861666331 May 17 00:48:13.923000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:13.923000 audit[3056]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=2910 pid=3056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:13.923000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266333262343231323864613034623631663635616235643861666331 May 17 00:48:13.923000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:13.923000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:13.923000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:13.923000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:13.923000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:13.923000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:13.923000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:13.923000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:13.923000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:13.923000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:13.923000 audit: BPF prog-id=128 op=LOAD May 17 00:48:13.923000 audit[3056]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=2910 pid=3056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:13.923000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266333262343231323864613034623631663635616235643861666331 May 17 00:48:13.924000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:13.924000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:13.924000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:13.924000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:13.924000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:13.924000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:13.924000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:13.924000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:13.924000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:13.924000 audit: BPF prog-id=129 op=LOAD May 17 00:48:13.924000 audit[3056]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=2910 pid=3056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:13.924000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266333262343231323864613034623631663635616235643861666331 May 17 00:48:13.924000 audit: BPF prog-id=129 op=UNLOAD May 17 00:48:13.924000 audit: BPF prog-id=128 op=UNLOAD May 17 00:48:13.925000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:13.925000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:13.925000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:13.925000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:13.925000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:13.925000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:13.925000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:13.925000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:13.925000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:13.925000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:13.925000 audit: BPF prog-id=130 op=LOAD May 17 00:48:13.925000 audit[3056]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=2910 pid=3056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:13.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266333262343231323864613034623631663635616235643861666331 May 17 00:48:13.951315 env[1452]: time="2025-05-17T00:48:13.951259106Z" level=info msg="StartContainer for \"2f32b42128da04b61f65ab5d8afc111c06ba72185200ff3e6250e28dc1add0b7\" returns successfully" May 17 00:48:14.718221 kubelet[2511]: E0517 00:48:14.718169 2511 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mqsn2" podUID="ca23fe46-c12b-49ed-aa7e-a638ad594bbf" May 17 00:48:14.842999 kubelet[2511]: I0517 00:48:14.842932 2511 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-767fb44954-2kgdf" podStartSLOduration=2.188407304 podStartE2EDuration="4.842916211s" podCreationTimestamp="2025-05-17 00:48:10 +0000 UTC" firstStartedPulling="2025-05-17 00:48:11.132122136 +0000 UTC m=+20.812861572" lastFinishedPulling="2025-05-17 00:48:13.786631043 +0000 UTC m=+23.467370479" observedRunningTime="2025-05-17 00:48:14.842667253 +0000 UTC m=+24.523406689" watchObservedRunningTime="2025-05-17 00:48:14.842916211 +0000 UTC m=+24.523655647" May 17 00:48:14.877698 kubelet[2511]: E0517 00:48:14.877665 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:14.877906 kubelet[2511]: W0517 00:48:14.877886 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:14.878002 kubelet[2511]: E0517 00:48:14.877988 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:14.878294 kubelet[2511]: E0517 00:48:14.878279 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:14.878394 kubelet[2511]: W0517 00:48:14.878381 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:14.878542 kubelet[2511]: E0517 00:48:14.878526 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:14.878826 kubelet[2511]: E0517 00:48:14.878812 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:14.878947 kubelet[2511]: W0517 00:48:14.878933 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:14.879029 kubelet[2511]: E0517 00:48:14.879015 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:14.879301 kubelet[2511]: E0517 00:48:14.879287 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:14.879400 kubelet[2511]: W0517 00:48:14.879387 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:14.879479 kubelet[2511]: E0517 00:48:14.879466 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:14.879757 kubelet[2511]: E0517 00:48:14.879719 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:14.879867 kubelet[2511]: W0517 00:48:14.879844 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:14.879945 kubelet[2511]: E0517 00:48:14.879933 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:14.880322 kubelet[2511]: E0517 00:48:14.880308 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:14.880442 kubelet[2511]: W0517 00:48:14.880428 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:14.880519 kubelet[2511]: E0517 00:48:14.880507 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:14.880771 kubelet[2511]: E0517 00:48:14.880757 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:14.880881 kubelet[2511]: W0517 00:48:14.880844 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:14.880962 kubelet[2511]: E0517 00:48:14.880948 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:14.881211 kubelet[2511]: E0517 00:48:14.881196 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:14.881306 kubelet[2511]: W0517 00:48:14.881292 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:14.881387 kubelet[2511]: E0517 00:48:14.881374 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:14.881643 kubelet[2511]: E0517 00:48:14.881628 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:14.881740 kubelet[2511]: W0517 00:48:14.881716 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:14.881810 kubelet[2511]: E0517 00:48:14.881798 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:14.882124 kubelet[2511]: E0517 00:48:14.882110 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:14.882284 kubelet[2511]: W0517 00:48:14.882268 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:14.882358 kubelet[2511]: E0517 00:48:14.882346 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:14.882604 kubelet[2511]: E0517 00:48:14.882582 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:14.882687 kubelet[2511]: W0517 00:48:14.882674 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:14.882753 kubelet[2511]: E0517 00:48:14.882741 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:14.883052 kubelet[2511]: E0517 00:48:14.883031 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:14.883147 kubelet[2511]: W0517 00:48:14.883134 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:14.883209 kubelet[2511]: E0517 00:48:14.883198 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:14.883465 kubelet[2511]: E0517 00:48:14.883451 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:14.883550 kubelet[2511]: W0517 00:48:14.883537 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:14.883620 kubelet[2511]: E0517 00:48:14.883607 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:14.883852 kubelet[2511]: E0517 00:48:14.883839 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:14.883974 kubelet[2511]: W0517 00:48:14.883958 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:14.884044 kubelet[2511]: E0517 00:48:14.884031 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:14.884284 kubelet[2511]: E0517 00:48:14.884271 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:14.884391 kubelet[2511]: W0517 00:48:14.884376 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:14.884468 kubelet[2511]: E0517 00:48:14.884455 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:14.888641 kubelet[2511]: E0517 00:48:14.888613 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:14.888641 kubelet[2511]: W0517 00:48:14.888630 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:14.888641 kubelet[2511]: E0517 00:48:14.888643 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:14.888835 kubelet[2511]: E0517 00:48:14.888814 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:14.888835 kubelet[2511]: W0517 00:48:14.888827 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:14.888835 kubelet[2511]: E0517 00:48:14.888835 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:14.889029 kubelet[2511]: E0517 00:48:14.889010 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:14.889029 kubelet[2511]: W0517 00:48:14.889025 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:14.889110 kubelet[2511]: E0517 00:48:14.889036 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:14.889259 kubelet[2511]: E0517 00:48:14.889226 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:14.889259 kubelet[2511]: W0517 00:48:14.889241 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:14.889259 kubelet[2511]: E0517 00:48:14.889257 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:14.889413 kubelet[2511]: E0517 00:48:14.889385 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:14.889413 kubelet[2511]: W0517 00:48:14.889397 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:14.889413 kubelet[2511]: E0517 00:48:14.889407 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:14.889523 kubelet[2511]: E0517 00:48:14.889519 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:14.889550 kubelet[2511]: W0517 00:48:14.889526 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:14.889550 kubelet[2511]: E0517 00:48:14.889536 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:14.889686 kubelet[2511]: E0517 00:48:14.889667 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:14.889686 kubelet[2511]: W0517 00:48:14.889682 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:14.889780 kubelet[2511]: E0517 00:48:14.889696 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:14.890079 kubelet[2511]: E0517 00:48:14.890062 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:14.890159 kubelet[2511]: W0517 00:48:14.890145 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:14.890244 kubelet[2511]: E0517 00:48:14.890230 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:14.890504 kubelet[2511]: E0517 00:48:14.890484 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:14.890504 kubelet[2511]: W0517 00:48:14.890500 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:14.890603 kubelet[2511]: E0517 00:48:14.890516 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:14.890678 kubelet[2511]: E0517 00:48:14.890663 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:14.890678 kubelet[2511]: W0517 00:48:14.890675 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:14.890757 kubelet[2511]: E0517 00:48:14.890689 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:14.890835 kubelet[2511]: E0517 00:48:14.890819 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:14.890835 kubelet[2511]: W0517 00:48:14.890832 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:14.890993 kubelet[2511]: E0517 00:48:14.890846 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:14.891063 kubelet[2511]: E0517 00:48:14.891042 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:14.891063 kubelet[2511]: W0517 00:48:14.891057 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:14.891172 kubelet[2511]: E0517 00:48:14.891155 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:14.891378 kubelet[2511]: E0517 00:48:14.891185 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:14.891476 kubelet[2511]: W0517 00:48:14.891461 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:14.891629 kubelet[2511]: E0517 00:48:14.891615 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:14.891789 kubelet[2511]: E0517 00:48:14.891778 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:14.891926 kubelet[2511]: W0517 00:48:14.891852 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:14.892041 kubelet[2511]: E0517 00:48:14.892017 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:14.892258 kubelet[2511]: E0517 00:48:14.892245 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:14.892348 kubelet[2511]: W0517 00:48:14.892335 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:14.892425 kubelet[2511]: E0517 00:48:14.892411 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:14.892667 kubelet[2511]: E0517 00:48:14.892649 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:14.892667 kubelet[2511]: W0517 00:48:14.892663 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:14.892761 kubelet[2511]: E0517 00:48:14.892672 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:14.892842 kubelet[2511]: E0517 00:48:14.892826 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:14.892842 kubelet[2511]: W0517 00:48:14.892839 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:14.892946 kubelet[2511]: E0517 00:48:14.892849 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:14.893347 kubelet[2511]: E0517 00:48:14.893327 2511 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:14.893347 kubelet[2511]: W0517 00:48:14.893342 2511 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:14.893418 kubelet[2511]: E0517 00:48:14.893353 2511 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:15.393212 env[1452]: time="2025-05-17T00:48:15.393148585Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:15.400399 env[1452]: time="2025-05-17T00:48:15.400358288Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:080eaf4c238c85534b61055c31b109c96ce3d20075391e58988541a442c7c701,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:15.406023 env[1452]: time="2025-05-17T00:48:15.405957365Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:15.411382 env[1452]: time="2025-05-17T00:48:15.411336643Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:ce76dd87f11d3fd0054c35ad2e0e9f833748d007f77a9bfe859d0ddcb66fcb2c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:15.411848 env[1452]: time="2025-05-17T00:48:15.411811439Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0\" returns image reference \"sha256:080eaf4c238c85534b61055c31b109c96ce3d20075391e58988541a442c7c701\"" May 17 00:48:15.416090 env[1452]: time="2025-05-17T00:48:15.416041886Z" level=info msg="CreateContainer within sandbox \"add3cbbf4a955878ce1701bfdbf9361d45d7fba9f9d544e317c3554deeda669c\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 17 00:48:15.457886 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2686110541.mount: Deactivated successfully. May 17 00:48:15.477959 env[1452]: time="2025-05-17T00:48:15.477902005Z" level=info msg="CreateContainer within sandbox \"add3cbbf4a955878ce1701bfdbf9361d45d7fba9f9d544e317c3554deeda669c\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"ed59b0df8362af0426be263c8c0733a0a31b80b989cfcd3d09401e8d1a35caa0\"" May 17 00:48:15.479716 env[1452]: time="2025-05-17T00:48:15.478934077Z" level=info msg="StartContainer for \"ed59b0df8362af0426be263c8c0733a0a31b80b989cfcd3d09401e8d1a35caa0\"" May 17 00:48:15.506391 systemd[1]: Started cri-containerd-ed59b0df8362af0426be263c8c0733a0a31b80b989cfcd3d09401e8d1a35caa0.scope. May 17 00:48:15.523000 audit[3130]: AVC avc: denied { perfmon } for pid=3130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:15.530187 kernel: kauditd_printk_skb: 179 callbacks suppressed May 17 00:48:15.530283 kernel: audit: type=1400 audit(1747442895.523:966): avc: denied { perfmon } for pid=3130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:15.523000 audit[3130]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3013 pid=3130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:15.575669 kernel: audit: type=1300 audit(1747442895.523:966): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3013 pid=3130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:15.575786 kernel: audit: type=1327 audit(1747442895.523:966): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564353962306466383336326166303432366265323633633863303733 May 17 00:48:15.523000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564353962306466383336326166303432366265323633633863303733 May 17 00:48:15.529000 audit[3130]: AVC avc: denied { bpf } for pid=3130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:15.529000 audit[3130]: AVC avc: denied { bpf } for pid=3130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:15.638070 kernel: audit: type=1400 audit(1747442895.529:967): avc: denied { bpf } for pid=3130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:15.638192 kernel: audit: type=1400 audit(1747442895.529:967): avc: denied { bpf } for pid=3130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:15.529000 audit[3130]: AVC avc: denied { bpf } for pid=3130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:15.656702 kernel: audit: type=1400 audit(1747442895.529:967): avc: denied { bpf } for pid=3130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:15.529000 audit[3130]: AVC avc: denied { perfmon } for pid=3130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:15.675101 kernel: audit: type=1400 audit(1747442895.529:967): avc: denied { perfmon } for pid=3130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:15.529000 audit[3130]: AVC avc: denied { perfmon } for pid=3130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:15.694527 kernel: audit: type=1400 audit(1747442895.529:967): avc: denied { perfmon } for pid=3130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:15.529000 audit[3130]: AVC avc: denied { perfmon } for pid=3130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:15.716570 kernel: audit: type=1400 audit(1747442895.529:967): avc: denied { perfmon } for pid=3130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:15.717145 kernel: audit: type=1400 audit(1747442895.529:967): avc: denied { perfmon } for pid=3130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:15.529000 audit[3130]: AVC avc: denied { perfmon } for pid=3130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:15.719877 env[1452]: time="2025-05-17T00:48:15.719814844Z" level=info msg="StartContainer for \"ed59b0df8362af0426be263c8c0733a0a31b80b989cfcd3d09401e8d1a35caa0\" returns successfully" May 17 00:48:15.735184 systemd[1]: cri-containerd-ed59b0df8362af0426be263c8c0733a0a31b80b989cfcd3d09401e8d1a35caa0.scope: Deactivated successfully. May 17 00:48:15.529000 audit[3130]: AVC avc: denied { perfmon } for pid=3130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:15.529000 audit[3130]: AVC avc: denied { bpf } for pid=3130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:15.529000 audit[3130]: AVC avc: denied { bpf } for pid=3130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:15.529000 audit: BPF prog-id=131 op=LOAD May 17 00:48:15.529000 audit[3130]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3013 pid=3130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:15.529000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564353962306466383336326166303432366265323633633863303733 May 17 00:48:15.546000 audit[3130]: AVC avc: denied { bpf } for pid=3130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:15.546000 audit[3130]: AVC avc: denied { bpf } for pid=3130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:15.546000 audit[3130]: AVC avc: denied { perfmon } for pid=3130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:15.546000 audit[3130]: AVC avc: denied { perfmon } for pid=3130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:15.546000 audit[3130]: AVC avc: denied { perfmon } for pid=3130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:15.546000 audit[3130]: AVC avc: denied { perfmon } for pid=3130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:15.546000 audit[3130]: AVC avc: denied { perfmon } for pid=3130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:15.546000 audit[3130]: AVC avc: denied { bpf } for pid=3130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:15.546000 audit[3130]: AVC avc: denied { bpf } for pid=3130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:15.546000 audit: BPF prog-id=132 op=LOAD May 17 00:48:15.546000 audit[3130]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3013 pid=3130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:15.546000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564353962306466383336326166303432366265323633633863303733 May 17 00:48:15.574000 audit: BPF prog-id=132 op=UNLOAD May 17 00:48:15.574000 audit: BPF prog-id=131 op=UNLOAD May 17 00:48:15.574000 audit[3130]: AVC avc: denied { bpf } for pid=3130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:15.574000 audit[3130]: AVC avc: denied { bpf } for pid=3130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:15.574000 audit[3130]: AVC avc: denied { bpf } for pid=3130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:15.574000 audit[3130]: AVC avc: denied { perfmon } for pid=3130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:15.574000 audit[3130]: AVC avc: denied { perfmon } for pid=3130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:15.574000 audit[3130]: AVC avc: denied { perfmon } for pid=3130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:15.574000 audit[3130]: AVC avc: denied { perfmon } for pid=3130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:15.574000 audit[3130]: AVC avc: denied { perfmon } for pid=3130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:15.574000 audit[3130]: AVC avc: denied { bpf } for pid=3130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:15.574000 audit[3130]: AVC avc: denied { bpf } for pid=3130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:15.574000 audit: BPF prog-id=133 op=LOAD May 17 00:48:15.574000 audit[3130]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3013 pid=3130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:15.574000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564353962306466383336326166303432366265323633633863303733 May 17 00:48:15.737000 audit: BPF prog-id=133 op=UNLOAD May 17 00:48:15.791586 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-ed59b0df8362af0426be263c8c0733a0a31b80b989cfcd3d09401e8d1a35caa0-rootfs.mount: Deactivated successfully. May 17 00:48:15.829919 kubelet[2511]: I0517 00:48:15.829876 2511 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:48:16.718317 kubelet[2511]: E0517 00:48:16.718272 2511 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mqsn2" podUID="ca23fe46-c12b-49ed-aa7e-a638ad594bbf" May 17 00:48:16.783404 env[1452]: time="2025-05-17T00:48:16.783362218Z" level=info msg="shim disconnected" id=ed59b0df8362af0426be263c8c0733a0a31b80b989cfcd3d09401e8d1a35caa0 May 17 00:48:16.783843 env[1452]: time="2025-05-17T00:48:16.783820495Z" level=warning msg="cleaning up after shim disconnected" id=ed59b0df8362af0426be263c8c0733a0a31b80b989cfcd3d09401e8d1a35caa0 namespace=k8s.io May 17 00:48:16.783976 env[1452]: time="2025-05-17T00:48:16.783958134Z" level=info msg="cleaning up dead shim" May 17 00:48:16.791211 env[1452]: time="2025-05-17T00:48:16.791167039Z" level=warning msg="cleanup warnings time=\"2025-05-17T00:48:16Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3175 runtime=io.containerd.runc.v2\n" May 17 00:48:16.844959 env[1452]: time="2025-05-17T00:48:16.844922030Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.0\"" May 17 00:48:18.719551 kubelet[2511]: E0517 00:48:18.719120 2511 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mqsn2" podUID="ca23fe46-c12b-49ed-aa7e-a638ad594bbf" May 17 00:48:20.420148 kubelet[2511]: I0517 00:48:20.420062 2511 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:48:20.458000 audit[3188]: NETFILTER_CFG table=filter:104 family=2 entries=21 op=nft_register_rule pid=3188 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:48:20.458000 audit[3188]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=7480 a0=3 a1=ffffd596f920 a2=0 a3=1 items=0 ppid=2658 pid=3188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:20.458000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:48:20.462000 audit[3188]: NETFILTER_CFG table=nat:105 family=2 entries=19 op=nft_register_chain pid=3188 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:48:20.462000 audit[3188]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6276 a0=3 a1=ffffd596f920 a2=0 a3=1 items=0 ppid=2658 pid=3188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:20.462000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:48:20.719265 kubelet[2511]: E0517 00:48:20.718322 2511 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mqsn2" podUID="ca23fe46-c12b-49ed-aa7e-a638ad594bbf" May 17 00:48:20.800203 env[1452]: time="2025-05-17T00:48:20.800140439Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:20.808742 env[1452]: time="2025-05-17T00:48:20.808690300Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0a1b3d5412de2974bc057a3463a132f935c307bc06d5b990ad54031e1f5a351d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:20.812636 env[1452]: time="2025-05-17T00:48:20.812600752Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:20.816813 env[1452]: time="2025-05-17T00:48:20.816779043Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:3dd06656abdc03fbd51782d5f6fe4d70e6825a1c0c5bce2a165bbd2ff9e0f7df,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:20.817624 env[1452]: time="2025-05-17T00:48:20.817596237Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.0\" returns image reference \"sha256:0a1b3d5412de2974bc057a3463a132f935c307bc06d5b990ad54031e1f5a351d\"" May 17 00:48:20.820764 env[1452]: time="2025-05-17T00:48:20.820402417Z" level=info msg="CreateContainer within sandbox \"add3cbbf4a955878ce1701bfdbf9361d45d7fba9f9d544e317c3554deeda669c\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 17 00:48:20.855309 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4061849534.mount: Deactivated successfully. May 17 00:48:20.874072 env[1452]: time="2025-05-17T00:48:20.873992602Z" level=info msg="CreateContainer within sandbox \"add3cbbf4a955878ce1701bfdbf9361d45d7fba9f9d544e317c3554deeda669c\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"2c97367e9164aa1ecbd4589989198ab081204c361db1c6c09796254b43b1c013\"" May 17 00:48:20.876012 env[1452]: time="2025-05-17T00:48:20.875461071Z" level=info msg="StartContainer for \"2c97367e9164aa1ecbd4589989198ab081204c361db1c6c09796254b43b1c013\"" May 17 00:48:20.902591 systemd[1]: Started cri-containerd-2c97367e9164aa1ecbd4589989198ab081204c361db1c6c09796254b43b1c013.scope. May 17 00:48:20.920000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:20.928109 kernel: kauditd_printk_skb: 40 callbacks suppressed May 17 00:48:20.928165 kernel: audit: type=1400 audit(1747442900.920:975): avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:20.920000 audit[3196]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=3013 pid=3196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:20.974181 kernel: audit: type=1300 audit(1747442900.920:975): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=3013 pid=3196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:20.920000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263393733363765393136346161316563626434353839393839313938 May 17 00:48:21.000960 kernel: audit: type=1327 audit(1747442900.920:975): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263393733363765393136346161316563626434353839393839313938 May 17 00:48:20.920000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:21.024207 kernel: audit: type=1400 audit(1747442900.920:976): avc: denied { bpf } for pid=3196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:20.920000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:20.920000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:21.047888 kernel: audit: type=1400 audit(1747442900.920:976): avc: denied { bpf } for pid=3196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:21.067614 env[1452]: time="2025-05-17T00:48:21.050036534Z" level=info msg="StartContainer for \"2c97367e9164aa1ecbd4589989198ab081204c361db1c6c09796254b43b1c013\" returns successfully" May 17 00:48:20.920000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:21.086230 kernel: audit: type=1400 audit(1747442900.920:976): avc: denied { bpf } for pid=3196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:21.086313 kernel: audit: type=1400 audit(1747442900.920:976): avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:20.920000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:21.104302 kernel: audit: type=1400 audit(1747442900.920:976): avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:20.920000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:21.122289 kernel: audit: type=1400 audit(1747442900.920:976): avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:20.920000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:21.140537 kernel: audit: type=1400 audit(1747442900.920:976): avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:20.920000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:20.920000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:20.920000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:20.920000 audit: BPF prog-id=134 op=LOAD May 17 00:48:20.920000 audit[3196]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=3013 pid=3196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:20.920000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263393733363765393136346161316563626434353839393839313938 May 17 00:48:20.920000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:20.920000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:20.920000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:20.920000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:20.920000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:20.920000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:20.920000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:20.920000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:20.920000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:20.920000 audit: BPF prog-id=135 op=LOAD May 17 00:48:20.920000 audit[3196]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=3013 pid=3196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:20.920000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263393733363765393136346161316563626434353839393839313938 May 17 00:48:20.920000 audit: BPF prog-id=135 op=UNLOAD May 17 00:48:20.920000 audit: BPF prog-id=134 op=UNLOAD May 17 00:48:20.920000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:20.920000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:20.920000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:20.920000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:20.920000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:20.920000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:20.920000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:20.920000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:20.920000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:20.920000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:20.920000 audit: BPF prog-id=136 op=LOAD May 17 00:48:20.920000 audit[3196]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=3013 pid=3196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:20.920000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263393733363765393136346161316563626434353839393839313938 May 17 00:48:22.528281 env[1452]: time="2025-05-17T00:48:22.528214726Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 17 00:48:22.530908 systemd[1]: cri-containerd-2c97367e9164aa1ecbd4589989198ab081204c361db1c6c09796254b43b1c013.scope: Deactivated successfully. May 17 00:48:22.533000 audit: BPF prog-id=136 op=UNLOAD May 17 00:48:22.549017 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-2c97367e9164aa1ecbd4589989198ab081204c361db1c6c09796254b43b1c013-rootfs.mount: Deactivated successfully. May 17 00:48:22.564440 kubelet[2511]: I0517 00:48:22.564403 2511 kubelet_node_status.go:488] "Fast updating node status as it just became ready" May 17 00:48:22.864229 kubelet[2511]: W0517 00:48:22.636268 2511 reflector.go:561] object-"calico-system"/"whisker-backend-key-pair": failed to list *v1.Secret: secrets "whisker-backend-key-pair" is forbidden: User "system:node:ci-3510.3.7-n-6523ff94dd" cannot list resource "secrets" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510.3.7-n-6523ff94dd' and this object May 17 00:48:22.864229 kubelet[2511]: E0517 00:48:22.636313 2511 reflector.go:158] "Unhandled Error" err="object-\"calico-system\"/\"whisker-backend-key-pair\": Failed to watch *v1.Secret: failed to list *v1.Secret: secrets \"whisker-backend-key-pair\" is forbidden: User \"system:node:ci-3510.3.7-n-6523ff94dd\" cannot list resource \"secrets\" in API group \"\" in the namespace \"calico-system\": no relationship found between node 'ci-3510.3.7-n-6523ff94dd' and this object" logger="UnhandledError" May 17 00:48:22.864229 kubelet[2511]: I0517 00:48:22.746354 2511 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/e98971c7-2262-4242-8532-c18d59231219-tigera-ca-bundle\") pod \"calico-kube-controllers-6cdf59f477-fr7wb\" (UID: \"e98971c7-2262-4242-8532-c18d59231219\") " pod="calico-system/calico-kube-controllers-6cdf59f477-fr7wb" May 17 00:48:22.864229 kubelet[2511]: I0517 00:48:22.746399 2511 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-p6jf5\" (UniqueName: \"kubernetes.io/projected/dc3b60ab-99b9-435e-bc94-f900356b518f-kube-api-access-p6jf5\") pod \"goldmane-8f77d7b6c-78tx5\" (UID: \"dc3b60ab-99b9-435e-bc94-f900356b518f\") " pod="calico-system/goldmane-8f77d7b6c-78tx5" May 17 00:48:22.864229 kubelet[2511]: I0517 00:48:22.746424 2511 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/6fb16588-55b1-4adf-9d05-4d2e2212101f-config-volume\") pod \"coredns-7c65d6cfc9-9bbtw\" (UID: \"6fb16588-55b1-4adf-9d05-4d2e2212101f\") " pod="kube-system/coredns-7c65d6cfc9-9bbtw" May 17 00:48:22.601137 systemd[1]: Created slice kubepods-besteffort-pode98971c7_2262_4242_8532_c18d59231219.slice. May 17 00:48:22.864598 kubelet[2511]: I0517 00:48:22.746445 2511 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vshlg\" (UniqueName: \"kubernetes.io/projected/6fb16588-55b1-4adf-9d05-4d2e2212101f-kube-api-access-vshlg\") pod \"coredns-7c65d6cfc9-9bbtw\" (UID: \"6fb16588-55b1-4adf-9d05-4d2e2212101f\") " pod="kube-system/coredns-7c65d6cfc9-9bbtw" May 17 00:48:22.864598 kubelet[2511]: I0517 00:48:22.746464 2511 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gjld9\" (UniqueName: \"kubernetes.io/projected/6c68e9fc-8024-41fc-851a-e97b8196dc2e-kube-api-access-gjld9\") pod \"coredns-7c65d6cfc9-ljkjl\" (UID: \"6c68e9fc-8024-41fc-851a-e97b8196dc2e\") " pod="kube-system/coredns-7c65d6cfc9-ljkjl" May 17 00:48:22.864598 kubelet[2511]: I0517 00:48:22.746484 2511 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5f5n7\" (UniqueName: \"kubernetes.io/projected/7629aa25-d93a-483f-b781-91e28432ed09-kube-api-access-5f5n7\") pod \"calico-apiserver-86b546bb5c-f9pmr\" (UID: \"7629aa25-d93a-483f-b781-91e28432ed09\") " pod="calico-apiserver/calico-apiserver-86b546bb5c-f9pmr" May 17 00:48:22.864598 kubelet[2511]: I0517 00:48:22.746504 2511 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-h4586\" (UniqueName: \"kubernetes.io/projected/81ca1c4a-23c4-4480-a4ac-3309374863e9-kube-api-access-h4586\") pod \"whisker-6dc6bd874f-r5bvr\" (UID: \"81ca1c4a-23c4-4480-a4ac-3309374863e9\") " pod="calico-system/whisker-6dc6bd874f-r5bvr" May 17 00:48:22.864598 kubelet[2511]: I0517 00:48:22.746519 2511 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/6c68e9fc-8024-41fc-851a-e97b8196dc2e-config-volume\") pod \"coredns-7c65d6cfc9-ljkjl\" (UID: \"6c68e9fc-8024-41fc-851a-e97b8196dc2e\") " pod="kube-system/coredns-7c65d6cfc9-ljkjl" May 17 00:48:22.618833 systemd[1]: Created slice kubepods-burstable-pod6c68e9fc_8024_41fc_851a_e97b8196dc2e.slice. May 17 00:48:22.864759 kubelet[2511]: I0517 00:48:22.746539 2511 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-psd56\" (UniqueName: \"kubernetes.io/projected/82f2f80c-103d-408f-831d-8869219e2fae-kube-api-access-psd56\") pod \"calico-apiserver-86b546bb5c-jpwk2\" (UID: \"82f2f80c-103d-408f-831d-8869219e2fae\") " pod="calico-apiserver/calico-apiserver-86b546bb5c-jpwk2" May 17 00:48:22.864759 kubelet[2511]: I0517 00:48:22.746556 2511 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/7629aa25-d93a-483f-b781-91e28432ed09-calico-apiserver-certs\") pod \"calico-apiserver-86b546bb5c-f9pmr\" (UID: \"7629aa25-d93a-483f-b781-91e28432ed09\") " pod="calico-apiserver/calico-apiserver-86b546bb5c-f9pmr" May 17 00:48:22.864759 kubelet[2511]: I0517 00:48:22.746574 2511 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/81ca1c4a-23c4-4480-a4ac-3309374863e9-whisker-backend-key-pair\") pod \"whisker-6dc6bd874f-r5bvr\" (UID: \"81ca1c4a-23c4-4480-a4ac-3309374863e9\") " pod="calico-system/whisker-6dc6bd874f-r5bvr" May 17 00:48:22.864759 kubelet[2511]: I0517 00:48:22.746593 2511 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-key-pair\" (UniqueName: \"kubernetes.io/secret/dc3b60ab-99b9-435e-bc94-f900356b518f-goldmane-key-pair\") pod \"goldmane-8f77d7b6c-78tx5\" (UID: \"dc3b60ab-99b9-435e-bc94-f900356b518f\") " pod="calico-system/goldmane-8f77d7b6c-78tx5" May 17 00:48:22.864759 kubelet[2511]: I0517 00:48:22.746611 2511 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/82f2f80c-103d-408f-831d-8869219e2fae-calico-apiserver-certs\") pod \"calico-apiserver-86b546bb5c-jpwk2\" (UID: \"82f2f80c-103d-408f-831d-8869219e2fae\") " pod="calico-apiserver/calico-apiserver-86b546bb5c-jpwk2" May 17 00:48:22.643820 systemd[1]: Created slice kubepods-besteffort-poddc3b60ab_99b9_435e_bc94_f900356b518f.slice. May 17 00:48:22.864953 kubelet[2511]: I0517 00:48:22.746630 2511 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-cltjq\" (UniqueName: \"kubernetes.io/projected/e98971c7-2262-4242-8532-c18d59231219-kube-api-access-cltjq\") pod \"calico-kube-controllers-6cdf59f477-fr7wb\" (UID: \"e98971c7-2262-4242-8532-c18d59231219\") " pod="calico-system/calico-kube-controllers-6cdf59f477-fr7wb" May 17 00:48:22.864953 kubelet[2511]: I0517 00:48:22.746647 2511 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/81ca1c4a-23c4-4480-a4ac-3309374863e9-whisker-ca-bundle\") pod \"whisker-6dc6bd874f-r5bvr\" (UID: \"81ca1c4a-23c4-4480-a4ac-3309374863e9\") " pod="calico-system/whisker-6dc6bd874f-r5bvr" May 17 00:48:22.864953 kubelet[2511]: I0517 00:48:22.746673 2511 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config\" (UniqueName: \"kubernetes.io/configmap/dc3b60ab-99b9-435e-bc94-f900356b518f-config\") pod \"goldmane-8f77d7b6c-78tx5\" (UID: \"dc3b60ab-99b9-435e-bc94-f900356b518f\") " pod="calico-system/goldmane-8f77d7b6c-78tx5" May 17 00:48:22.864953 kubelet[2511]: I0517 00:48:22.746688 2511 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/dc3b60ab-99b9-435e-bc94-f900356b518f-goldmane-ca-bundle\") pod \"goldmane-8f77d7b6c-78tx5\" (UID: \"dc3b60ab-99b9-435e-bc94-f900356b518f\") " pod="calico-system/goldmane-8f77d7b6c-78tx5" May 17 00:48:22.649918 systemd[1]: Created slice kubepods-besteffort-pod82f2f80c_103d_408f_831d_8869219e2fae.slice. May 17 00:48:22.655553 systemd[1]: Created slice kubepods-besteffort-pod7629aa25_d93a_483f_b781_91e28432ed09.slice. May 17 00:48:22.662344 systemd[1]: Created slice kubepods-burstable-pod6fb16588_55b1_4adf_9d05_4d2e2212101f.slice. May 17 00:48:22.668558 systemd[1]: Created slice kubepods-besteffort-pod81ca1c4a_23c4_4480_a4ac_3309374863e9.slice. May 17 00:48:22.723617 systemd[1]: Created slice kubepods-besteffort-podca23fe46_c12b_49ed_aa7e_a638ad594bbf.slice. May 17 00:48:22.911712 env[1452]: time="2025-05-17T00:48:22.911303985Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-mqsn2,Uid:ca23fe46-c12b-49ed-aa7e-a638ad594bbf,Namespace:calico-system,Attempt:0,}" May 17 00:48:23.148013 env[1452]: time="2025-05-17T00:48:23.147335613Z" level=info msg="shim disconnected" id=2c97367e9164aa1ecbd4589989198ab081204c361db1c6c09796254b43b1c013 May 17 00:48:23.148013 env[1452]: time="2025-05-17T00:48:23.147382573Z" level=warning msg="cleaning up after shim disconnected" id=2c97367e9164aa1ecbd4589989198ab081204c361db1c6c09796254b43b1c013 namespace=k8s.io May 17 00:48:23.148013 env[1452]: time="2025-05-17T00:48:23.147391893Z" level=info msg="cleaning up dead shim" May 17 00:48:23.156174 env[1452]: time="2025-05-17T00:48:23.156134635Z" level=warning msg="cleanup warnings time=\"2025-05-17T00:48:23Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3268 runtime=io.containerd.runc.v2\n" May 17 00:48:23.212560 env[1452]: time="2025-05-17T00:48:23.212504502Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6cdf59f477-fr7wb,Uid:e98971c7-2262-4242-8532-c18d59231219,Namespace:calico-system,Attempt:0,}" May 17 00:48:23.216142 env[1452]: time="2025-05-17T00:48:23.216103399Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-86b546bb5c-f9pmr,Uid:7629aa25-d93a-483f-b781-91e28432ed09,Namespace:calico-apiserver,Attempt:0,}" May 17 00:48:23.216729 env[1452]: time="2025-05-17T00:48:23.216350197Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-86b546bb5c-jpwk2,Uid:82f2f80c-103d-408f-831d-8869219e2fae,Namespace:calico-apiserver,Attempt:0,}" May 17 00:48:23.216896 env[1452]: time="2025-05-17T00:48:23.216419517Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-8f77d7b6c-78tx5,Uid:dc3b60ab-99b9-435e-bc94-f900356b518f,Namespace:calico-system,Attempt:0,}" May 17 00:48:23.217028 env[1452]: time="2025-05-17T00:48:23.216478276Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-ljkjl,Uid:6c68e9fc-8024-41fc-851a-e97b8196dc2e,Namespace:kube-system,Attempt:0,}" May 17 00:48:23.232438 env[1452]: time="2025-05-17T00:48:23.232397651Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-9bbtw,Uid:6fb16588-55b1-4adf-9d05-4d2e2212101f,Namespace:kube-system,Attempt:0,}" May 17 00:48:23.232934 env[1452]: time="2025-05-17T00:48:23.232877408Z" level=error msg="Failed to destroy network for sandbox \"6187f80c6b1af2e633e0e670cc928a5e6ea0345fcde66621998a6df50bd22af1\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:48:23.233469 env[1452]: time="2025-05-17T00:48:23.233435284Z" level=error msg="encountered an error cleaning up failed sandbox \"6187f80c6b1af2e633e0e670cc928a5e6ea0345fcde66621998a6df50bd22af1\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:48:23.233617 env[1452]: time="2025-05-17T00:48:23.233591083Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-mqsn2,Uid:ca23fe46-c12b-49ed-aa7e-a638ad594bbf,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"6187f80c6b1af2e633e0e670cc928a5e6ea0345fcde66621998a6df50bd22af1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:48:23.234279 kubelet[2511]: E0517 00:48:23.233828 2511 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6187f80c6b1af2e633e0e670cc928a5e6ea0345fcde66621998a6df50bd22af1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:48:23.234279 kubelet[2511]: E0517 00:48:23.233921 2511 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6187f80c6b1af2e633e0e670cc928a5e6ea0345fcde66621998a6df50bd22af1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-mqsn2" May 17 00:48:23.234279 kubelet[2511]: E0517 00:48:23.233965 2511 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6187f80c6b1af2e633e0e670cc928a5e6ea0345fcde66621998a6df50bd22af1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-mqsn2" May 17 00:48:23.234455 kubelet[2511]: E0517 00:48:23.234010 2511 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-mqsn2_calico-system(ca23fe46-c12b-49ed-aa7e-a638ad594bbf)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-mqsn2_calico-system(ca23fe46-c12b-49ed-aa7e-a638ad594bbf)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"6187f80c6b1af2e633e0e670cc928a5e6ea0345fcde66621998a6df50bd22af1\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-mqsn2" podUID="ca23fe46-c12b-49ed-aa7e-a638ad594bbf" May 17 00:48:23.500114 env[1452]: time="2025-05-17T00:48:23.499982003Z" level=error msg="Failed to destroy network for sandbox \"d02ec9e0916eb99bf802ca6be9e9a4731f876af349990f3a74d882c617ed7772\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:48:23.500535 env[1452]: time="2025-05-17T00:48:23.500478080Z" level=error msg="encountered an error cleaning up failed sandbox \"d02ec9e0916eb99bf802ca6be9e9a4731f876af349990f3a74d882c617ed7772\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:48:23.500608 env[1452]: time="2025-05-17T00:48:23.500557159Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-86b546bb5c-jpwk2,Uid:82f2f80c-103d-408f-831d-8869219e2fae,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"d02ec9e0916eb99bf802ca6be9e9a4731f876af349990f3a74d882c617ed7772\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:48:23.501187 kubelet[2511]: E0517 00:48:23.500804 2511 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d02ec9e0916eb99bf802ca6be9e9a4731f876af349990f3a74d882c617ed7772\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:48:23.501187 kubelet[2511]: E0517 00:48:23.500881 2511 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d02ec9e0916eb99bf802ca6be9e9a4731f876af349990f3a74d882c617ed7772\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-86b546bb5c-jpwk2" May 17 00:48:23.501187 kubelet[2511]: E0517 00:48:23.500900 2511 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d02ec9e0916eb99bf802ca6be9e9a4731f876af349990f3a74d882c617ed7772\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-86b546bb5c-jpwk2" May 17 00:48:23.501367 kubelet[2511]: E0517 00:48:23.500945 2511 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-86b546bb5c-jpwk2_calico-apiserver(82f2f80c-103d-408f-831d-8869219e2fae)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-86b546bb5c-jpwk2_calico-apiserver(82f2f80c-103d-408f-831d-8869219e2fae)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"d02ec9e0916eb99bf802ca6be9e9a4731f876af349990f3a74d882c617ed7772\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-86b546bb5c-jpwk2" podUID="82f2f80c-103d-408f-831d-8869219e2fae" May 17 00:48:23.596930 env[1452]: time="2025-05-17T00:48:23.596840483Z" level=error msg="Failed to destroy network for sandbox \"3d8e0a399d4f9326b0d1779c026ca35d8d47037f09a348582946804ef659f1a7\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:48:23.599749 env[1452]: time="2025-05-17T00:48:23.599694584Z" level=error msg="encountered an error cleaning up failed sandbox \"3d8e0a399d4f9326b0d1779c026ca35d8d47037f09a348582946804ef659f1a7\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:48:23.599955 env[1452]: time="2025-05-17T00:48:23.599924503Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-8f77d7b6c-78tx5,Uid:dc3b60ab-99b9-435e-bc94-f900356b518f,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"3d8e0a399d4f9326b0d1779c026ca35d8d47037f09a348582946804ef659f1a7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:48:23.600634 kubelet[2511]: E0517 00:48:23.600251 2511 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3d8e0a399d4f9326b0d1779c026ca35d8d47037f09a348582946804ef659f1a7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:48:23.600634 kubelet[2511]: E0517 00:48:23.600307 2511 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3d8e0a399d4f9326b0d1779c026ca35d8d47037f09a348582946804ef659f1a7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-8f77d7b6c-78tx5" May 17 00:48:23.600634 kubelet[2511]: E0517 00:48:23.600354 2511 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3d8e0a399d4f9326b0d1779c026ca35d8d47037f09a348582946804ef659f1a7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-8f77d7b6c-78tx5" May 17 00:48:23.600998 kubelet[2511]: E0517 00:48:23.600393 2511 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"goldmane-8f77d7b6c-78tx5_calico-system(dc3b60ab-99b9-435e-bc94-f900356b518f)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"goldmane-8f77d7b6c-78tx5_calico-system(dc3b60ab-99b9-435e-bc94-f900356b518f)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"3d8e0a399d4f9326b0d1779c026ca35d8d47037f09a348582946804ef659f1a7\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-8f77d7b6c-78tx5" podUID="dc3b60ab-99b9-435e-bc94-f900356b518f" May 17 00:48:23.601406 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-3d8e0a399d4f9326b0d1779c026ca35d8d47037f09a348582946804ef659f1a7-shm.mount: Deactivated successfully. May 17 00:48:23.636629 env[1452]: time="2025-05-17T00:48:23.636561021Z" level=error msg="Failed to destroy network for sandbox \"2bdcc7637ca0f5f39fdf5a216cf0bd20dc22d842d8a0e6851b7718601999a14f\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:48:23.637625 env[1452]: time="2025-05-17T00:48:23.637583414Z" level=error msg="Failed to destroy network for sandbox \"7d9b2695c89cace7b088158899257805f4aea18a8ebb6524ddaf08908fb5e1fe\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:48:23.638743 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-2bdcc7637ca0f5f39fdf5a216cf0bd20dc22d842d8a0e6851b7718601999a14f-shm.mount: Deactivated successfully. May 17 00:48:23.640182 env[1452]: time="2025-05-17T00:48:23.640078397Z" level=error msg="Failed to destroy network for sandbox \"89662f2be62f79066c314f694f3a1cd60e7d20a67c1c3bdbbb11635180c5037a\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:48:23.644603 env[1452]: time="2025-05-17T00:48:23.640521794Z" level=error msg="encountered an error cleaning up failed sandbox \"89662f2be62f79066c314f694f3a1cd60e7d20a67c1c3bdbbb11635180c5037a\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:48:23.644603 env[1452]: time="2025-05-17T00:48:23.640581194Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-ljkjl,Uid:6c68e9fc-8024-41fc-851a-e97b8196dc2e,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"89662f2be62f79066c314f694f3a1cd60e7d20a67c1c3bdbbb11635180c5037a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:48:23.644603 env[1452]: time="2025-05-17T00:48:23.641574987Z" level=error msg="encountered an error cleaning up failed sandbox \"2bdcc7637ca0f5f39fdf5a216cf0bd20dc22d842d8a0e6851b7718601999a14f\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:48:23.644603 env[1452]: time="2025-05-17T00:48:23.641627147Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6cdf59f477-fr7wb,Uid:e98971c7-2262-4242-8532-c18d59231219,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"2bdcc7637ca0f5f39fdf5a216cf0bd20dc22d842d8a0e6851b7718601999a14f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:48:23.644912 kubelet[2511]: E0517 00:48:23.644104 2511 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2bdcc7637ca0f5f39fdf5a216cf0bd20dc22d842d8a0e6851b7718601999a14f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:48:23.644912 kubelet[2511]: E0517 00:48:23.644165 2511 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2bdcc7637ca0f5f39fdf5a216cf0bd20dc22d842d8a0e6851b7718601999a14f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-6cdf59f477-fr7wb" May 17 00:48:23.644912 kubelet[2511]: E0517 00:48:23.644185 2511 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2bdcc7637ca0f5f39fdf5a216cf0bd20dc22d842d8a0e6851b7718601999a14f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-6cdf59f477-fr7wb" May 17 00:48:23.643569 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-89662f2be62f79066c314f694f3a1cd60e7d20a67c1c3bdbbb11635180c5037a-shm.mount: Deactivated successfully. May 17 00:48:23.645086 kubelet[2511]: E0517 00:48:23.644220 2511 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-6cdf59f477-fr7wb_calico-system(e98971c7-2262-4242-8532-c18d59231219)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-6cdf59f477-fr7wb_calico-system(e98971c7-2262-4242-8532-c18d59231219)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"2bdcc7637ca0f5f39fdf5a216cf0bd20dc22d842d8a0e6851b7718601999a14f\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-6cdf59f477-fr7wb" podUID="e98971c7-2262-4242-8532-c18d59231219" May 17 00:48:23.645086 kubelet[2511]: E0517 00:48:23.644493 2511 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"89662f2be62f79066c314f694f3a1cd60e7d20a67c1c3bdbbb11635180c5037a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:48:23.645086 kubelet[2511]: E0517 00:48:23.644519 2511 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"89662f2be62f79066c314f694f3a1cd60e7d20a67c1c3bdbbb11635180c5037a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7c65d6cfc9-ljkjl" May 17 00:48:23.643659 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-7d9b2695c89cace7b088158899257805f4aea18a8ebb6524ddaf08908fb5e1fe-shm.mount: Deactivated successfully. May 17 00:48:23.645212 kubelet[2511]: E0517 00:48:23.644532 2511 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"89662f2be62f79066c314f694f3a1cd60e7d20a67c1c3bdbbb11635180c5037a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7c65d6cfc9-ljkjl" May 17 00:48:23.645212 kubelet[2511]: E0517 00:48:23.644555 2511 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7c65d6cfc9-ljkjl_kube-system(6c68e9fc-8024-41fc-851a-e97b8196dc2e)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7c65d6cfc9-ljkjl_kube-system(6c68e9fc-8024-41fc-851a-e97b8196dc2e)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"89662f2be62f79066c314f694f3a1cd60e7d20a67c1c3bdbbb11635180c5037a\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7c65d6cfc9-ljkjl" podUID="6c68e9fc-8024-41fc-851a-e97b8196dc2e" May 17 00:48:23.650792 env[1452]: time="2025-05-17T00:48:23.650732687Z" level=error msg="encountered an error cleaning up failed sandbox \"7d9b2695c89cace7b088158899257805f4aea18a8ebb6524ddaf08908fb5e1fe\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:48:23.651013 env[1452]: time="2025-05-17T00:48:23.650981205Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-86b546bb5c-f9pmr,Uid:7629aa25-d93a-483f-b781-91e28432ed09,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"7d9b2695c89cace7b088158899257805f4aea18a8ebb6524ddaf08908fb5e1fe\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:48:23.651393 kubelet[2511]: E0517 00:48:23.651352 2511 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7d9b2695c89cace7b088158899257805f4aea18a8ebb6524ddaf08908fb5e1fe\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:48:23.651474 kubelet[2511]: E0517 00:48:23.651410 2511 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7d9b2695c89cace7b088158899257805f4aea18a8ebb6524ddaf08908fb5e1fe\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-86b546bb5c-f9pmr" May 17 00:48:23.651474 kubelet[2511]: E0517 00:48:23.651437 2511 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7d9b2695c89cace7b088158899257805f4aea18a8ebb6524ddaf08908fb5e1fe\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-86b546bb5c-f9pmr" May 17 00:48:23.651528 kubelet[2511]: E0517 00:48:23.651478 2511 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-86b546bb5c-f9pmr_calico-apiserver(7629aa25-d93a-483f-b781-91e28432ed09)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-86b546bb5c-f9pmr_calico-apiserver(7629aa25-d93a-483f-b781-91e28432ed09)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"7d9b2695c89cace7b088158899257805f4aea18a8ebb6524ddaf08908fb5e1fe\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-86b546bb5c-f9pmr" podUID="7629aa25-d93a-483f-b781-91e28432ed09" May 17 00:48:23.664173 env[1452]: time="2025-05-17T00:48:23.664100719Z" level=error msg="Failed to destroy network for sandbox \"9712dac8e71cec13cad3378b92a933b51563f4bbcc4dfb040aa59ed700ab5798\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:48:23.666746 env[1452]: time="2025-05-17T00:48:23.664468836Z" level=error msg="encountered an error cleaning up failed sandbox \"9712dac8e71cec13cad3378b92a933b51563f4bbcc4dfb040aa59ed700ab5798\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:48:23.666746 env[1452]: time="2025-05-17T00:48:23.664523956Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-9bbtw,Uid:6fb16588-55b1-4adf-9d05-4d2e2212101f,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"9712dac8e71cec13cad3378b92a933b51563f4bbcc4dfb040aa59ed700ab5798\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:48:23.668462 kubelet[2511]: E0517 00:48:23.666449 2511 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9712dac8e71cec13cad3378b92a933b51563f4bbcc4dfb040aa59ed700ab5798\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:48:23.668462 kubelet[2511]: E0517 00:48:23.666502 2511 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9712dac8e71cec13cad3378b92a933b51563f4bbcc4dfb040aa59ed700ab5798\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7c65d6cfc9-9bbtw" May 17 00:48:23.668462 kubelet[2511]: E0517 00:48:23.666519 2511 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9712dac8e71cec13cad3378b92a933b51563f4bbcc4dfb040aa59ed700ab5798\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7c65d6cfc9-9bbtw" May 17 00:48:23.668588 kubelet[2511]: E0517 00:48:23.666567 2511 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7c65d6cfc9-9bbtw_kube-system(6fb16588-55b1-4adf-9d05-4d2e2212101f)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7c65d6cfc9-9bbtw_kube-system(6fb16588-55b1-4adf-9d05-4d2e2212101f)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"9712dac8e71cec13cad3378b92a933b51563f4bbcc4dfb040aa59ed700ab5798\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7c65d6cfc9-9bbtw" podUID="6fb16588-55b1-4adf-9d05-4d2e2212101f" May 17 00:48:23.852623 env[1452]: time="2025-05-17T00:48:23.850833405Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.0\"" May 17 00:48:23.857832 kubelet[2511]: I0517 00:48:23.857179 2511 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="7d9b2695c89cace7b088158899257805f4aea18a8ebb6524ddaf08908fb5e1fe" May 17 00:48:23.860880 env[1452]: time="2025-05-17T00:48:23.860825139Z" level=info msg="StopPodSandbox for \"7d9b2695c89cace7b088158899257805f4aea18a8ebb6524ddaf08908fb5e1fe\"" May 17 00:48:23.862207 kubelet[2511]: I0517 00:48:23.861835 2511 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="9712dac8e71cec13cad3378b92a933b51563f4bbcc4dfb040aa59ed700ab5798" May 17 00:48:23.862699 env[1452]: time="2025-05-17T00:48:23.862309089Z" level=info msg="StopPodSandbox for \"9712dac8e71cec13cad3378b92a933b51563f4bbcc4dfb040aa59ed700ab5798\"" May 17 00:48:23.864574 kubelet[2511]: E0517 00:48:23.864553 2511 secret.go:189] Couldn't get secret calico-system/whisker-backend-key-pair: failed to sync secret cache: timed out waiting for the condition May 17 00:48:23.864720 kubelet[2511]: E0517 00:48:23.864707 2511 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/81ca1c4a-23c4-4480-a4ac-3309374863e9-whisker-backend-key-pair podName:81ca1c4a-23c4-4480-a4ac-3309374863e9 nodeName:}" failed. No retries permitted until 2025-05-17 00:48:24.364688233 +0000 UTC m=+34.045427629 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "whisker-backend-key-pair" (UniqueName: "kubernetes.io/secret/81ca1c4a-23c4-4480-a4ac-3309374863e9-whisker-backend-key-pair") pod "whisker-6dc6bd874f-r5bvr" (UID: "81ca1c4a-23c4-4480-a4ac-3309374863e9") : failed to sync secret cache: timed out waiting for the condition May 17 00:48:23.865274 kubelet[2511]: I0517 00:48:23.865253 2511 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="6187f80c6b1af2e633e0e670cc928a5e6ea0345fcde66621998a6df50bd22af1" May 17 00:48:23.865855 env[1452]: time="2025-05-17T00:48:23.865825826Z" level=info msg="StopPodSandbox for \"6187f80c6b1af2e633e0e670cc928a5e6ea0345fcde66621998a6df50bd22af1\"" May 17 00:48:23.867068 kubelet[2511]: I0517 00:48:23.867043 2511 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="d02ec9e0916eb99bf802ca6be9e9a4731f876af349990f3a74d882c617ed7772" May 17 00:48:23.867924 env[1452]: time="2025-05-17T00:48:23.867895372Z" level=info msg="StopPodSandbox for \"d02ec9e0916eb99bf802ca6be9e9a4731f876af349990f3a74d882c617ed7772\"" May 17 00:48:23.869598 kubelet[2511]: I0517 00:48:23.869577 2511 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="3d8e0a399d4f9326b0d1779c026ca35d8d47037f09a348582946804ef659f1a7" May 17 00:48:23.870270 env[1452]: time="2025-05-17T00:48:23.870224077Z" level=info msg="StopPodSandbox for \"3d8e0a399d4f9326b0d1779c026ca35d8d47037f09a348582946804ef659f1a7\"" May 17 00:48:23.872125 kubelet[2511]: I0517 00:48:23.871797 2511 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="2bdcc7637ca0f5f39fdf5a216cf0bd20dc22d842d8a0e6851b7718601999a14f" May 17 00:48:23.872391 env[1452]: time="2025-05-17T00:48:23.872349983Z" level=info msg="StopPodSandbox for \"2bdcc7637ca0f5f39fdf5a216cf0bd20dc22d842d8a0e6851b7718601999a14f\"" May 17 00:48:23.877468 kubelet[2511]: I0517 00:48:23.877442 2511 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="89662f2be62f79066c314f694f3a1cd60e7d20a67c1c3bdbbb11635180c5037a" May 17 00:48:23.878099 env[1452]: time="2025-05-17T00:48:23.878061625Z" level=info msg="StopPodSandbox for \"89662f2be62f79066c314f694f3a1cd60e7d20a67c1c3bdbbb11635180c5037a\"" May 17 00:48:23.945175 env[1452]: time="2025-05-17T00:48:23.945104942Z" level=error msg="StopPodSandbox for \"9712dac8e71cec13cad3378b92a933b51563f4bbcc4dfb040aa59ed700ab5798\" failed" error="failed to destroy network for sandbox \"9712dac8e71cec13cad3378b92a933b51563f4bbcc4dfb040aa59ed700ab5798\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:48:23.945755 kubelet[2511]: E0517 00:48:23.945523 2511 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"9712dac8e71cec13cad3378b92a933b51563f4bbcc4dfb040aa59ed700ab5798\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="9712dac8e71cec13cad3378b92a933b51563f4bbcc4dfb040aa59ed700ab5798" May 17 00:48:23.945755 kubelet[2511]: E0517 00:48:23.945595 2511 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"9712dac8e71cec13cad3378b92a933b51563f4bbcc4dfb040aa59ed700ab5798"} May 17 00:48:23.945755 kubelet[2511]: E0517 00:48:23.945673 2511 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"6fb16588-55b1-4adf-9d05-4d2e2212101f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9712dac8e71cec13cad3378b92a933b51563f4bbcc4dfb040aa59ed700ab5798\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:48:23.945755 kubelet[2511]: E0517 00:48:23.945714 2511 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"6fb16588-55b1-4adf-9d05-4d2e2212101f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9712dac8e71cec13cad3378b92a933b51563f4bbcc4dfb040aa59ed700ab5798\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7c65d6cfc9-9bbtw" podUID="6fb16588-55b1-4adf-9d05-4d2e2212101f" May 17 00:48:23.994670 env[1452]: time="2025-05-17T00:48:23.994594255Z" level=error msg="StopPodSandbox for \"6187f80c6b1af2e633e0e670cc928a5e6ea0345fcde66621998a6df50bd22af1\" failed" error="failed to destroy network for sandbox \"6187f80c6b1af2e633e0e670cc928a5e6ea0345fcde66621998a6df50bd22af1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:48:23.994937 kubelet[2511]: E0517 00:48:23.994887 2511 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"6187f80c6b1af2e633e0e670cc928a5e6ea0345fcde66621998a6df50bd22af1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="6187f80c6b1af2e633e0e670cc928a5e6ea0345fcde66621998a6df50bd22af1" May 17 00:48:23.995014 kubelet[2511]: E0517 00:48:23.994948 2511 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"6187f80c6b1af2e633e0e670cc928a5e6ea0345fcde66621998a6df50bd22af1"} May 17 00:48:23.995014 kubelet[2511]: E0517 00:48:23.994985 2511 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ca23fe46-c12b-49ed-aa7e-a638ad594bbf\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6187f80c6b1af2e633e0e670cc928a5e6ea0345fcde66621998a6df50bd22af1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:48:23.995105 kubelet[2511]: E0517 00:48:23.995007 2511 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ca23fe46-c12b-49ed-aa7e-a638ad594bbf\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6187f80c6b1af2e633e0e670cc928a5e6ea0345fcde66621998a6df50bd22af1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-mqsn2" podUID="ca23fe46-c12b-49ed-aa7e-a638ad594bbf" May 17 00:48:24.007748 env[1452]: time="2025-05-17T00:48:24.007680609Z" level=error msg="StopPodSandbox for \"2bdcc7637ca0f5f39fdf5a216cf0bd20dc22d842d8a0e6851b7718601999a14f\" failed" error="failed to destroy network for sandbox \"2bdcc7637ca0f5f39fdf5a216cf0bd20dc22d842d8a0e6851b7718601999a14f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:48:24.007961 kubelet[2511]: E0517 00:48:24.007922 2511 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"2bdcc7637ca0f5f39fdf5a216cf0bd20dc22d842d8a0e6851b7718601999a14f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="2bdcc7637ca0f5f39fdf5a216cf0bd20dc22d842d8a0e6851b7718601999a14f" May 17 00:48:24.008032 kubelet[2511]: E0517 00:48:24.007969 2511 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"2bdcc7637ca0f5f39fdf5a216cf0bd20dc22d842d8a0e6851b7718601999a14f"} May 17 00:48:24.008065 kubelet[2511]: E0517 00:48:24.008027 2511 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e98971c7-2262-4242-8532-c18d59231219\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2bdcc7637ca0f5f39fdf5a216cf0bd20dc22d842d8a0e6851b7718601999a14f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:48:24.008065 kubelet[2511]: E0517 00:48:24.008052 2511 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e98971c7-2262-4242-8532-c18d59231219\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2bdcc7637ca0f5f39fdf5a216cf0bd20dc22d842d8a0e6851b7718601999a14f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-6cdf59f477-fr7wb" podUID="e98971c7-2262-4242-8532-c18d59231219" May 17 00:48:24.009088 env[1452]: time="2025-05-17T00:48:24.009036040Z" level=error msg="StopPodSandbox for \"7d9b2695c89cace7b088158899257805f4aea18a8ebb6524ddaf08908fb5e1fe\" failed" error="failed to destroy network for sandbox \"7d9b2695c89cace7b088158899257805f4aea18a8ebb6524ddaf08908fb5e1fe\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:48:24.009477 kubelet[2511]: E0517 00:48:24.009333 2511 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"7d9b2695c89cace7b088158899257805f4aea18a8ebb6524ddaf08908fb5e1fe\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="7d9b2695c89cace7b088158899257805f4aea18a8ebb6524ddaf08908fb5e1fe" May 17 00:48:24.009477 kubelet[2511]: E0517 00:48:24.009381 2511 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"7d9b2695c89cace7b088158899257805f4aea18a8ebb6524ddaf08908fb5e1fe"} May 17 00:48:24.009477 kubelet[2511]: E0517 00:48:24.009415 2511 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"7629aa25-d93a-483f-b781-91e28432ed09\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7d9b2695c89cace7b088158899257805f4aea18a8ebb6524ddaf08908fb5e1fe\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:48:24.009477 kubelet[2511]: E0517 00:48:24.009452 2511 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"7629aa25-d93a-483f-b781-91e28432ed09\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7d9b2695c89cace7b088158899257805f4aea18a8ebb6524ddaf08908fb5e1fe\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-86b546bb5c-f9pmr" podUID="7629aa25-d93a-483f-b781-91e28432ed09" May 17 00:48:24.009665 env[1452]: time="2025-05-17T00:48:24.009403598Z" level=error msg="StopPodSandbox for \"89662f2be62f79066c314f694f3a1cd60e7d20a67c1c3bdbbb11635180c5037a\" failed" error="failed to destroy network for sandbox \"89662f2be62f79066c314f694f3a1cd60e7d20a67c1c3bdbbb11635180c5037a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:48:24.009868 kubelet[2511]: E0517 00:48:24.009824 2511 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"89662f2be62f79066c314f694f3a1cd60e7d20a67c1c3bdbbb11635180c5037a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="89662f2be62f79066c314f694f3a1cd60e7d20a67c1c3bdbbb11635180c5037a" May 17 00:48:24.009944 kubelet[2511]: E0517 00:48:24.009885 2511 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"89662f2be62f79066c314f694f3a1cd60e7d20a67c1c3bdbbb11635180c5037a"} May 17 00:48:24.009944 kubelet[2511]: E0517 00:48:24.009911 2511 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"6c68e9fc-8024-41fc-851a-e97b8196dc2e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"89662f2be62f79066c314f694f3a1cd60e7d20a67c1c3bdbbb11635180c5037a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:48:24.009944 kubelet[2511]: E0517 00:48:24.009933 2511 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"6c68e9fc-8024-41fc-851a-e97b8196dc2e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"89662f2be62f79066c314f694f3a1cd60e7d20a67c1c3bdbbb11635180c5037a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7c65d6cfc9-ljkjl" podUID="6c68e9fc-8024-41fc-851a-e97b8196dc2e" May 17 00:48:24.010576 env[1452]: time="2025-05-17T00:48:24.010507271Z" level=error msg="StopPodSandbox for \"d02ec9e0916eb99bf802ca6be9e9a4731f876af349990f3a74d882c617ed7772\" failed" error="failed to destroy network for sandbox \"d02ec9e0916eb99bf802ca6be9e9a4731f876af349990f3a74d882c617ed7772\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:48:24.010919 kubelet[2511]: E0517 00:48:24.010786 2511 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d02ec9e0916eb99bf802ca6be9e9a4731f876af349990f3a74d882c617ed7772\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d02ec9e0916eb99bf802ca6be9e9a4731f876af349990f3a74d882c617ed7772" May 17 00:48:24.010919 kubelet[2511]: E0517 00:48:24.010820 2511 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"d02ec9e0916eb99bf802ca6be9e9a4731f876af349990f3a74d882c617ed7772"} May 17 00:48:24.010919 kubelet[2511]: E0517 00:48:24.010843 2511 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"82f2f80c-103d-408f-831d-8869219e2fae\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d02ec9e0916eb99bf802ca6be9e9a4731f876af349990f3a74d882c617ed7772\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:48:24.010919 kubelet[2511]: E0517 00:48:24.010891 2511 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"82f2f80c-103d-408f-831d-8869219e2fae\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d02ec9e0916eb99bf802ca6be9e9a4731f876af349990f3a74d882c617ed7772\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-86b546bb5c-jpwk2" podUID="82f2f80c-103d-408f-831d-8869219e2fae" May 17 00:48:24.012841 env[1452]: time="2025-05-17T00:48:24.012789336Z" level=error msg="StopPodSandbox for \"3d8e0a399d4f9326b0d1779c026ca35d8d47037f09a348582946804ef659f1a7\" failed" error="failed to destroy network for sandbox \"3d8e0a399d4f9326b0d1779c026ca35d8d47037f09a348582946804ef659f1a7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:48:24.013342 kubelet[2511]: E0517 00:48:24.013304 2511 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3d8e0a399d4f9326b0d1779c026ca35d8d47037f09a348582946804ef659f1a7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3d8e0a399d4f9326b0d1779c026ca35d8d47037f09a348582946804ef659f1a7" May 17 00:48:24.013416 kubelet[2511]: E0517 00:48:24.013342 2511 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3d8e0a399d4f9326b0d1779c026ca35d8d47037f09a348582946804ef659f1a7"} May 17 00:48:24.013416 kubelet[2511]: E0517 00:48:24.013369 2511 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"dc3b60ab-99b9-435e-bc94-f900356b518f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3d8e0a399d4f9326b0d1779c026ca35d8d47037f09a348582946804ef659f1a7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:48:24.013416 kubelet[2511]: E0517 00:48:24.013387 2511 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"dc3b60ab-99b9-435e-bc94-f900356b518f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3d8e0a399d4f9326b0d1779c026ca35d8d47037f09a348582946804ef659f1a7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-8f77d7b6c-78tx5" podUID="dc3b60ab-99b9-435e-bc94-f900356b518f" May 17 00:48:24.550256 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-9712dac8e71cec13cad3378b92a933b51563f4bbcc4dfb040aa59ed700ab5798-shm.mount: Deactivated successfully. May 17 00:48:24.714191 env[1452]: time="2025-05-17T00:48:24.714151231Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-6dc6bd874f-r5bvr,Uid:81ca1c4a-23c4-4480-a4ac-3309374863e9,Namespace:calico-system,Attempt:0,}" May 17 00:48:24.823587 env[1452]: time="2025-05-17T00:48:24.820627661Z" level=error msg="Failed to destroy network for sandbox \"2e5b1de266d3e0076aab820b52b42cc70e282ac5018716796d7f44ee17ebe8d0\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:48:24.822905 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-2e5b1de266d3e0076aab820b52b42cc70e282ac5018716796d7f44ee17ebe8d0-shm.mount: Deactivated successfully. May 17 00:48:24.823948 env[1452]: time="2025-05-17T00:48:24.823829080Z" level=error msg="encountered an error cleaning up failed sandbox \"2e5b1de266d3e0076aab820b52b42cc70e282ac5018716796d7f44ee17ebe8d0\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:48:24.823948 env[1452]: time="2025-05-17T00:48:24.823919360Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-6dc6bd874f-r5bvr,Uid:81ca1c4a-23c4-4480-a4ac-3309374863e9,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"2e5b1de266d3e0076aab820b52b42cc70e282ac5018716796d7f44ee17ebe8d0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:48:24.824590 kubelet[2511]: E0517 00:48:24.824186 2511 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2e5b1de266d3e0076aab820b52b42cc70e282ac5018716796d7f44ee17ebe8d0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:48:24.824590 kubelet[2511]: E0517 00:48:24.824251 2511 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2e5b1de266d3e0076aab820b52b42cc70e282ac5018716796d7f44ee17ebe8d0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-6dc6bd874f-r5bvr" May 17 00:48:24.824590 kubelet[2511]: E0517 00:48:24.824271 2511 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2e5b1de266d3e0076aab820b52b42cc70e282ac5018716796d7f44ee17ebe8d0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-6dc6bd874f-r5bvr" May 17 00:48:24.826269 kubelet[2511]: E0517 00:48:24.824311 2511 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"whisker-6dc6bd874f-r5bvr_calico-system(81ca1c4a-23c4-4480-a4ac-3309374863e9)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"whisker-6dc6bd874f-r5bvr_calico-system(81ca1c4a-23c4-4480-a4ac-3309374863e9)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"2e5b1de266d3e0076aab820b52b42cc70e282ac5018716796d7f44ee17ebe8d0\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-6dc6bd874f-r5bvr" podUID="81ca1c4a-23c4-4480-a4ac-3309374863e9" May 17 00:48:24.880104 kubelet[2511]: I0517 00:48:24.880065 2511 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="2e5b1de266d3e0076aab820b52b42cc70e282ac5018716796d7f44ee17ebe8d0" May 17 00:48:24.880972 env[1452]: time="2025-05-17T00:48:24.880772311Z" level=info msg="StopPodSandbox for \"2e5b1de266d3e0076aab820b52b42cc70e282ac5018716796d7f44ee17ebe8d0\"" May 17 00:48:24.913334 env[1452]: time="2025-05-17T00:48:24.913151941Z" level=error msg="StopPodSandbox for \"2e5b1de266d3e0076aab820b52b42cc70e282ac5018716796d7f44ee17ebe8d0\" failed" error="failed to destroy network for sandbox \"2e5b1de266d3e0076aab820b52b42cc70e282ac5018716796d7f44ee17ebe8d0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:48:24.913572 kubelet[2511]: E0517 00:48:24.913517 2511 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"2e5b1de266d3e0076aab820b52b42cc70e282ac5018716796d7f44ee17ebe8d0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="2e5b1de266d3e0076aab820b52b42cc70e282ac5018716796d7f44ee17ebe8d0" May 17 00:48:24.913650 kubelet[2511]: E0517 00:48:24.913584 2511 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"2e5b1de266d3e0076aab820b52b42cc70e282ac5018716796d7f44ee17ebe8d0"} May 17 00:48:24.913650 kubelet[2511]: E0517 00:48:24.913624 2511 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"81ca1c4a-23c4-4480-a4ac-3309374863e9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2e5b1de266d3e0076aab820b52b42cc70e282ac5018716796d7f44ee17ebe8d0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:48:24.913753 kubelet[2511]: E0517 00:48:24.913651 2511 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"81ca1c4a-23c4-4480-a4ac-3309374863e9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2e5b1de266d3e0076aab820b52b42cc70e282ac5018716796d7f44ee17ebe8d0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-6dc6bd874f-r5bvr" podUID="81ca1c4a-23c4-4480-a4ac-3309374863e9" May 17 00:48:31.521951 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount207654592.mount: Deactivated successfully. May 17 00:48:31.974513 env[1452]: time="2025-05-17T00:48:31.974444706Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:31.983757 env[1452]: time="2025-05-17T00:48:31.983692093Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f7148fde8e28b27da58f84cac134cdc53b5df321cda13c660192f06839670732,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:31.987961 env[1452]: time="2025-05-17T00:48:31.987925709Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:31.994575 env[1452]: time="2025-05-17T00:48:31.994513471Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:7cb61ea47ca0a8e6d0526a42da4f1e399b37ccd13339d0776d272465cb7ee012,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:31.995390 env[1452]: time="2025-05-17T00:48:31.995354786Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.0\" returns image reference \"sha256:f7148fde8e28b27da58f84cac134cdc53b5df321cda13c660192f06839670732\"" May 17 00:48:32.012469 env[1452]: time="2025-05-17T00:48:32.012429250Z" level=info msg="CreateContainer within sandbox \"add3cbbf4a955878ce1701bfdbf9361d45d7fba9f9d544e317c3554deeda669c\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 17 00:48:32.060934 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3729347890.mount: Deactivated successfully. May 17 00:48:32.085266 env[1452]: time="2025-05-17T00:48:32.085207283Z" level=info msg="CreateContainer within sandbox \"add3cbbf4a955878ce1701bfdbf9361d45d7fba9f9d544e317c3554deeda669c\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"1d87cdc503ee1ccd701b6534fab870398df46e3585dc65c0281e3637ae46bc86\"" May 17 00:48:32.085995 env[1452]: time="2025-05-17T00:48:32.085968078Z" level=info msg="StartContainer for \"1d87cdc503ee1ccd701b6534fab870398df46e3585dc65c0281e3637ae46bc86\"" May 17 00:48:32.114000 systemd[1]: Started cri-containerd-1d87cdc503ee1ccd701b6534fab870398df46e3585dc65c0281e3637ae46bc86.scope. May 17 00:48:32.134000 audit[3638]: AVC avc: denied { perfmon } for pid=3638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:32.141288 kernel: kauditd_printk_skb: 34 callbacks suppressed May 17 00:48:32.141414 kernel: audit: type=1400 audit(1747442912.134:982): avc: denied { perfmon } for pid=3638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:32.134000 audit[3638]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3013 pid=3638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:32.190064 kernel: audit: type=1300 audit(1747442912.134:982): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3013 pid=3638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:32.134000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164383763646335303365653163636437303162363533346661623837 May 17 00:48:32.217886 kernel: audit: type=1327 audit(1747442912.134:982): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164383763646335303365653163636437303162363533346661623837 May 17 00:48:32.136000 audit[3638]: AVC avc: denied { bpf } for pid=3638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:32.237034 kernel: audit: type=1400 audit(1747442912.136:983): avc: denied { bpf } for pid=3638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:32.136000 audit[3638]: AVC avc: denied { bpf } for pid=3638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:32.259233 kernel: audit: type=1400 audit(1747442912.136:983): avc: denied { bpf } for pid=3638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:32.136000 audit[3638]: AVC avc: denied { bpf } for pid=3638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:32.259764 env[1452]: time="2025-05-17T00:48:32.259709225Z" level=info msg="StartContainer for \"1d87cdc503ee1ccd701b6534fab870398df46e3585dc65c0281e3637ae46bc86\" returns successfully" May 17 00:48:32.278020 kernel: audit: type=1400 audit(1747442912.136:983): avc: denied { bpf } for pid=3638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:32.136000 audit[3638]: AVC avc: denied { perfmon } for pid=3638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:32.298532 kernel: audit: type=1400 audit(1747442912.136:983): avc: denied { perfmon } for pid=3638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:32.136000 audit[3638]: AVC avc: denied { perfmon } for pid=3638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:32.318028 kernel: audit: type=1400 audit(1747442912.136:983): avc: denied { perfmon } for pid=3638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:32.136000 audit[3638]: AVC avc: denied { perfmon } for pid=3638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:32.336905 kernel: audit: type=1400 audit(1747442912.136:983): avc: denied { perfmon } for pid=3638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:32.136000 audit[3638]: AVC avc: denied { perfmon } for pid=3638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:32.355682 kernel: audit: type=1400 audit(1747442912.136:983): avc: denied { perfmon } for pid=3638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:32.136000 audit[3638]: AVC avc: denied { perfmon } for pid=3638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:32.136000 audit[3638]: AVC avc: denied { bpf } for pid=3638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:32.136000 audit[3638]: AVC avc: denied { bpf } for pid=3638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:32.136000 audit: BPF prog-id=137 op=LOAD May 17 00:48:32.136000 audit[3638]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3013 pid=3638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:32.136000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164383763646335303365653163636437303162363533346661623837 May 17 00:48:32.139000 audit[3638]: AVC avc: denied { bpf } for pid=3638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:32.139000 audit[3638]: AVC avc: denied { bpf } for pid=3638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:32.139000 audit[3638]: AVC avc: denied { perfmon } for pid=3638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:32.139000 audit[3638]: AVC avc: denied { perfmon } for pid=3638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:32.139000 audit[3638]: AVC avc: denied { perfmon } for pid=3638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:32.139000 audit[3638]: AVC avc: denied { perfmon } for pid=3638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:32.139000 audit[3638]: AVC avc: denied { perfmon } for pid=3638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:32.139000 audit[3638]: AVC avc: denied { bpf } for pid=3638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:32.139000 audit[3638]: AVC avc: denied { bpf } for pid=3638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:32.139000 audit: BPF prog-id=138 op=LOAD May 17 00:48:32.139000 audit[3638]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3013 pid=3638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:32.139000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164383763646335303365653163636437303162363533346661623837 May 17 00:48:32.157000 audit: BPF prog-id=138 op=UNLOAD May 17 00:48:32.157000 audit: BPF prog-id=137 op=UNLOAD May 17 00:48:32.157000 audit[3638]: AVC avc: denied { bpf } for pid=3638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:32.157000 audit[3638]: AVC avc: denied { bpf } for pid=3638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:32.157000 audit[3638]: AVC avc: denied { bpf } for pid=3638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:32.157000 audit[3638]: AVC avc: denied { perfmon } for pid=3638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:32.157000 audit[3638]: AVC avc: denied { perfmon } for pid=3638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:32.157000 audit[3638]: AVC avc: denied { perfmon } for pid=3638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:32.157000 audit[3638]: AVC avc: denied { perfmon } for pid=3638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:32.157000 audit[3638]: AVC avc: denied { perfmon } for pid=3638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:32.157000 audit[3638]: AVC avc: denied { bpf } for pid=3638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:32.157000 audit[3638]: AVC avc: denied { bpf } for pid=3638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:32.157000 audit: BPF prog-id=139 op=LOAD May 17 00:48:32.157000 audit[3638]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3013 pid=3638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:32.157000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164383763646335303365653163636437303162363533346661623837 May 17 00:48:32.637912 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 17 00:48:32.638082 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 17 00:48:32.753471 env[1452]: time="2025-05-17T00:48:32.753414420Z" level=info msg="StopPodSandbox for \"2e5b1de266d3e0076aab820b52b42cc70e282ac5018716796d7f44ee17ebe8d0\"" May 17 00:48:32.886056 env[1452]: 2025-05-17 00:48:32.824 [INFO][3686] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="2e5b1de266d3e0076aab820b52b42cc70e282ac5018716796d7f44ee17ebe8d0" May 17 00:48:32.886056 env[1452]: 2025-05-17 00:48:32.824 [INFO][3686] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="2e5b1de266d3e0076aab820b52b42cc70e282ac5018716796d7f44ee17ebe8d0" iface="eth0" netns="/var/run/netns/cni-44c31265-9b8c-9bc3-c488-9c078cc639ef" May 17 00:48:32.886056 env[1452]: 2025-05-17 00:48:32.824 [INFO][3686] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="2e5b1de266d3e0076aab820b52b42cc70e282ac5018716796d7f44ee17ebe8d0" iface="eth0" netns="/var/run/netns/cni-44c31265-9b8c-9bc3-c488-9c078cc639ef" May 17 00:48:32.886056 env[1452]: 2025-05-17 00:48:32.825 [INFO][3686] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="2e5b1de266d3e0076aab820b52b42cc70e282ac5018716796d7f44ee17ebe8d0" iface="eth0" netns="/var/run/netns/cni-44c31265-9b8c-9bc3-c488-9c078cc639ef" May 17 00:48:32.886056 env[1452]: 2025-05-17 00:48:32.825 [INFO][3686] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="2e5b1de266d3e0076aab820b52b42cc70e282ac5018716796d7f44ee17ebe8d0" May 17 00:48:32.886056 env[1452]: 2025-05-17 00:48:32.825 [INFO][3686] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2e5b1de266d3e0076aab820b52b42cc70e282ac5018716796d7f44ee17ebe8d0" May 17 00:48:32.886056 env[1452]: 2025-05-17 00:48:32.847 [INFO][3700] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2e5b1de266d3e0076aab820b52b42cc70e282ac5018716796d7f44ee17ebe8d0" HandleID="k8s-pod-network.2e5b1de266d3e0076aab820b52b42cc70e282ac5018716796d7f44ee17ebe8d0" Workload="ci--3510.3.7--n--6523ff94dd-k8s-whisker--6dc6bd874f--r5bvr-eth0" May 17 00:48:32.886056 env[1452]: 2025-05-17 00:48:32.847 [INFO][3700] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:48:32.886056 env[1452]: 2025-05-17 00:48:32.847 [INFO][3700] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:48:32.886417 env[1452]: 2025-05-17 00:48:32.865 [WARNING][3700] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2e5b1de266d3e0076aab820b52b42cc70e282ac5018716796d7f44ee17ebe8d0" HandleID="k8s-pod-network.2e5b1de266d3e0076aab820b52b42cc70e282ac5018716796d7f44ee17ebe8d0" Workload="ci--3510.3.7--n--6523ff94dd-k8s-whisker--6dc6bd874f--r5bvr-eth0" May 17 00:48:32.886417 env[1452]: 2025-05-17 00:48:32.865 [INFO][3700] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2e5b1de266d3e0076aab820b52b42cc70e282ac5018716796d7f44ee17ebe8d0" HandleID="k8s-pod-network.2e5b1de266d3e0076aab820b52b42cc70e282ac5018716796d7f44ee17ebe8d0" Workload="ci--3510.3.7--n--6523ff94dd-k8s-whisker--6dc6bd874f--r5bvr-eth0" May 17 00:48:32.886417 env[1452]: 2025-05-17 00:48:32.882 [INFO][3700] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:48:32.886417 env[1452]: 2025-05-17 00:48:32.884 [INFO][3686] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="2e5b1de266d3e0076aab820b52b42cc70e282ac5018716796d7f44ee17ebe8d0" May 17 00:48:32.890691 systemd[1]: run-netns-cni\x2d44c31265\x2d9b8c\x2d9bc3\x2dc488\x2d9c078cc639ef.mount: Deactivated successfully. May 17 00:48:32.891952 env[1452]: time="2025-05-17T00:48:32.891898885Z" level=info msg="TearDown network for sandbox \"2e5b1de266d3e0076aab820b52b42cc70e282ac5018716796d7f44ee17ebe8d0\" successfully" May 17 00:48:32.891952 env[1452]: time="2025-05-17T00:48:32.891943964Z" level=info msg="StopPodSandbox for \"2e5b1de266d3e0076aab820b52b42cc70e282ac5018716796d7f44ee17ebe8d0\" returns successfully" May 17 00:48:32.921986 kubelet[2511]: I0517 00:48:32.921299 2511 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"kube-api-access-h4586\" (UniqueName: \"kubernetes.io/projected/81ca1c4a-23c4-4480-a4ac-3309374863e9-kube-api-access-h4586\") pod \"81ca1c4a-23c4-4480-a4ac-3309374863e9\" (UID: \"81ca1c4a-23c4-4480-a4ac-3309374863e9\") " May 17 00:48:32.921986 kubelet[2511]: I0517 00:48:32.921367 2511 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/81ca1c4a-23c4-4480-a4ac-3309374863e9-whisker-backend-key-pair\") pod \"81ca1c4a-23c4-4480-a4ac-3309374863e9\" (UID: \"81ca1c4a-23c4-4480-a4ac-3309374863e9\") " May 17 00:48:32.921986 kubelet[2511]: I0517 00:48:32.921390 2511 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/81ca1c4a-23c4-4480-a4ac-3309374863e9-whisker-ca-bundle\") pod \"81ca1c4a-23c4-4480-a4ac-3309374863e9\" (UID: \"81ca1c4a-23c4-4480-a4ac-3309374863e9\") " May 17 00:48:32.923453 kubelet[2511]: I0517 00:48:32.923420 2511 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/81ca1c4a-23c4-4480-a4ac-3309374863e9-whisker-ca-bundle" (OuterVolumeSpecName: "whisker-ca-bundle") pod "81ca1c4a-23c4-4480-a4ac-3309374863e9" (UID: "81ca1c4a-23c4-4480-a4ac-3309374863e9"). InnerVolumeSpecName "whisker-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" May 17 00:48:32.927393 systemd[1]: var-lib-kubelet-pods-81ca1c4a\x2d23c4\x2d4480\x2da4ac\x2d3309374863e9-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dh4586.mount: Deactivated successfully. May 17 00:48:32.935961 systemd[1]: var-lib-kubelet-pods-81ca1c4a\x2d23c4\x2d4480\x2da4ac\x2d3309374863e9-volumes-kubernetes.io\x7esecret-whisker\x2dbackend\x2dkey\x2dpair.mount: Deactivated successfully. May 17 00:48:32.936819 kubelet[2511]: I0517 00:48:32.932126 2511 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-7xmfl" podStartSLOduration=2.208403782 podStartE2EDuration="22.9321075s" podCreationTimestamp="2025-05-17 00:48:10 +0000 UTC" firstStartedPulling="2025-05-17 00:48:11.272825742 +0000 UTC m=+20.953565178" lastFinishedPulling="2025-05-17 00:48:31.99652946 +0000 UTC m=+41.677268896" observedRunningTime="2025-05-17 00:48:32.919973167 +0000 UTC m=+42.600712603" watchObservedRunningTime="2025-05-17 00:48:32.9321075 +0000 UTC m=+42.612846936" May 17 00:48:32.937690 kubelet[2511]: I0517 00:48:32.937651 2511 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/81ca1c4a-23c4-4480-a4ac-3309374863e9-kube-api-access-h4586" (OuterVolumeSpecName: "kube-api-access-h4586") pod "81ca1c4a-23c4-4480-a4ac-3309374863e9" (UID: "81ca1c4a-23c4-4480-a4ac-3309374863e9"). InnerVolumeSpecName "kube-api-access-h4586". PluginName "kubernetes.io/projected", VolumeGidValue "" May 17 00:48:32.938493 kubelet[2511]: I0517 00:48:32.938461 2511 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/81ca1c4a-23c4-4480-a4ac-3309374863e9-whisker-backend-key-pair" (OuterVolumeSpecName: "whisker-backend-key-pair") pod "81ca1c4a-23c4-4480-a4ac-3309374863e9" (UID: "81ca1c4a-23c4-4480-a4ac-3309374863e9"). InnerVolumeSpecName "whisker-backend-key-pair". PluginName "kubernetes.io/secret", VolumeGidValue "" May 17 00:48:33.022171 kubelet[2511]: I0517 00:48:33.022065 2511 reconciler_common.go:293] "Volume detached for volume \"kube-api-access-h4586\" (UniqueName: \"kubernetes.io/projected/81ca1c4a-23c4-4480-a4ac-3309374863e9-kube-api-access-h4586\") on node \"ci-3510.3.7-n-6523ff94dd\" DevicePath \"\"" May 17 00:48:33.022171 kubelet[2511]: I0517 00:48:33.022100 2511 reconciler_common.go:293] "Volume detached for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/81ca1c4a-23c4-4480-a4ac-3309374863e9-whisker-backend-key-pair\") on node \"ci-3510.3.7-n-6523ff94dd\" DevicePath \"\"" May 17 00:48:33.022171 kubelet[2511]: I0517 00:48:33.022111 2511 reconciler_common.go:293] "Volume detached for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/81ca1c4a-23c4-4480-a4ac-3309374863e9-whisker-ca-bundle\") on node \"ci-3510.3.7-n-6523ff94dd\" DevicePath \"\"" May 17 00:48:33.909247 systemd[1]: Removed slice kubepods-besteffort-pod81ca1c4a_23c4_4480_a4ac_3309374863e9.slice. May 17 00:48:33.969494 systemd[1]: Created slice kubepods-besteffort-pod1034e955_0d22_4661_9e47_81fdd9a27aa3.slice. May 17 00:48:34.028337 kubelet[2511]: I0517 00:48:34.028286 2511 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/1034e955-0d22-4661-9e47-81fdd9a27aa3-whisker-ca-bundle\") pod \"whisker-5c6b5ff985-qsbbb\" (UID: \"1034e955-0d22-4661-9e47-81fdd9a27aa3\") " pod="calico-system/whisker-5c6b5ff985-qsbbb" May 17 00:48:34.028686 kubelet[2511]: I0517 00:48:34.028355 2511 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/1034e955-0d22-4661-9e47-81fdd9a27aa3-whisker-backend-key-pair\") pod \"whisker-5c6b5ff985-qsbbb\" (UID: \"1034e955-0d22-4661-9e47-81fdd9a27aa3\") " pod="calico-system/whisker-5c6b5ff985-qsbbb" May 17 00:48:34.028686 kubelet[2511]: I0517 00:48:34.028376 2511 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-98cxh\" (UniqueName: \"kubernetes.io/projected/1034e955-0d22-4661-9e47-81fdd9a27aa3-kube-api-access-98cxh\") pod \"whisker-5c6b5ff985-qsbbb\" (UID: \"1034e955-0d22-4661-9e47-81fdd9a27aa3\") " pod="calico-system/whisker-5c6b5ff985-qsbbb" May 17 00:48:34.078000 audit[3763]: AVC avc: denied { write } for pid=3763 comm="tee" name="fd" dev="proc" ino=24479 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:48:34.078000 audit[3763]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe540c7d9 a2=241 a3=1b6 items=1 ppid=3741 pid=3763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:34.078000 audit: CWD cwd="/etc/service/enabled/cni/log" May 17 00:48:34.078000 audit: PATH item=0 name="/dev/fd/63" inode=24473 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:48:34.078000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:48:34.096000 audit[3767]: AVC avc: denied { write } for pid=3767 comm="tee" name="fd" dev="proc" ino=24494 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:48:34.096000 audit[3767]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffcb5fc7c7 a2=241 a3=1b6 items=1 ppid=3732 pid=3767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:34.096000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 17 00:48:34.096000 audit: PATH item=0 name="/dev/fd/63" inode=24476 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:48:34.096000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:48:34.113000 audit[3791]: AVC avc: denied { write } for pid=3791 comm="tee" name="fd" dev="proc" ino=24505 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:48:34.113000 audit[3791]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd5cb57c8 a2=241 a3=1b6 items=1 ppid=3736 pid=3791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:34.113000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 17 00:48:34.113000 audit: PATH item=0 name="/dev/fd/63" inode=24500 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:48:34.113000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:48:34.145000 audit[3787]: AVC avc: denied { write } for pid=3787 comm="tee" name="fd" dev="proc" ino=24515 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:48:34.145000 audit[3787]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff9d1a7d7 a2=241 a3=1b6 items=1 ppid=3735 pid=3787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:34.145000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 17 00:48:34.145000 audit: PATH item=0 name="/dev/fd/63" inode=25335 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:48:34.145000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:48:34.146000 audit[3789]: AVC avc: denied { write } for pid=3789 comm="tee" name="fd" dev="proc" ino=24519 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:48:34.146000 audit[3789]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff76a37d8 a2=241 a3=1b6 items=1 ppid=3729 pid=3789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:34.146000 audit: CWD cwd="/etc/service/enabled/bird/log" May 17 00:48:34.146000 audit: PATH item=0 name="/dev/fd/63" inode=25336 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:48:34.146000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:48:34.167000 audit[3798]: AVC avc: denied { write } for pid=3798 comm="tee" name="fd" dev="proc" ino=24525 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:48:34.167000 audit[3798]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc82e27d7 a2=241 a3=1b6 items=1 ppid=3733 pid=3798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:34.167000 audit: CWD cwd="/etc/service/enabled/confd/log" May 17 00:48:34.167000 audit: PATH item=0 name="/dev/fd/63" inode=25343 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:48:34.167000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:48:34.182000 audit[3804]: AVC avc: denied { write } for pid=3804 comm="tee" name="fd" dev="proc" ino=24529 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:48:34.182000 audit[3804]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe19817d7 a2=241 a3=1b6 items=1 ppid=3750 pid=3804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:34.182000 audit: CWD cwd="/etc/service/enabled/felix/log" May 17 00:48:34.182000 audit: PATH item=0 name="/dev/fd/63" inode=25346 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:48:34.182000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:48:34.272933 env[1452]: time="2025-05-17T00:48:34.272886416Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-5c6b5ff985-qsbbb,Uid:1034e955-0d22-4661-9e47-81fdd9a27aa3,Namespace:calico-system,Attempt:0,}" May 17 00:48:34.461000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.461000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.461000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.461000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.461000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.461000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.461000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.461000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.461000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.461000 audit: BPF prog-id=140 op=LOAD May 17 00:48:34.461000 audit[3856]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc94cbe68 a2=98 a3=ffffc94cbe58 items=0 ppid=3751 pid=3856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:34.461000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:48:34.461000 audit: BPF prog-id=140 op=UNLOAD May 17 00:48:34.462000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.462000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.462000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.462000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.462000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.462000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.462000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.462000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.462000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.462000 audit: BPF prog-id=141 op=LOAD May 17 00:48:34.462000 audit[3856]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc94cbaf8 a2=74 a3=95 items=0 ppid=3751 pid=3856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:34.462000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:48:34.462000 audit: BPF prog-id=141 op=UNLOAD May 17 00:48:34.462000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.462000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.462000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.462000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.462000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.462000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.462000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.462000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.462000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.462000 audit: BPF prog-id=142 op=LOAD May 17 00:48:34.462000 audit[3856]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc94cbb58 a2=94 a3=2 items=0 ppid=3751 pid=3856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:34.462000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:48:34.467000 audit: BPF prog-id=142 op=UNLOAD May 17 00:48:34.578000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.578000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.578000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.578000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.578000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.578000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.578000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.578000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.578000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.578000 audit: BPF prog-id=143 op=LOAD May 17 00:48:34.578000 audit[3856]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc94cbb18 a2=40 a3=ffffc94cbb48 items=0 ppid=3751 pid=3856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:34.578000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:48:34.578000 audit: BPF prog-id=143 op=UNLOAD May 17 00:48:34.578000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.578000 audit[3856]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffc94cbc30 a2=50 a3=0 items=0 ppid=3751 pid=3856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:34.578000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:48:34.587000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.587000 audit[3856]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc94cbb88 a2=28 a3=ffffc94cbcb8 items=0 ppid=3751 pid=3856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:34.587000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:48:34.587000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.587000 audit[3856]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc94cbbb8 a2=28 a3=ffffc94cbce8 items=0 ppid=3751 pid=3856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:34.587000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:48:34.587000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.587000 audit[3856]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc94cba68 a2=28 a3=ffffc94cbb98 items=0 ppid=3751 pid=3856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:34.587000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:48:34.587000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.587000 audit[3856]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc94cbbd8 a2=28 a3=ffffc94cbd08 items=0 ppid=3751 pid=3856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:34.587000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:48:34.587000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.587000 audit[3856]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc94cbbb8 a2=28 a3=ffffc94cbce8 items=0 ppid=3751 pid=3856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:34.587000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:48:34.587000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.587000 audit[3856]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc94cbba8 a2=28 a3=ffffc94cbcd8 items=0 ppid=3751 pid=3856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:34.587000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:48:34.587000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.587000 audit[3856]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc94cbbd8 a2=28 a3=ffffc94cbd08 items=0 ppid=3751 pid=3856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:34.587000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:48:34.587000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.587000 audit[3856]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc94cbbb8 a2=28 a3=ffffc94cbce8 items=0 ppid=3751 pid=3856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:34.587000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:48:34.587000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.587000 audit[3856]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc94cbbd8 a2=28 a3=ffffc94cbd08 items=0 ppid=3751 pid=3856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:34.587000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:48:34.587000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.587000 audit[3856]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc94cbba8 a2=28 a3=ffffc94cbcd8 items=0 ppid=3751 pid=3856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:34.587000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:48:34.587000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.587000 audit[3856]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc94cbc28 a2=28 a3=ffffc94cbd68 items=0 ppid=3751 pid=3856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:34.587000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:48:34.587000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.587000 audit[3856]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffc94cb960 a2=50 a3=0 items=0 ppid=3751 pid=3856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:34.587000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:48:34.587000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.587000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.587000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.587000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.587000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.587000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.587000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.587000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.587000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.587000 audit: BPF prog-id=144 op=LOAD May 17 00:48:34.587000 audit[3856]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffc94cb968 a2=94 a3=5 items=0 ppid=3751 pid=3856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:34.587000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:48:34.587000 audit: BPF prog-id=144 op=UNLOAD May 17 00:48:34.587000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.587000 audit[3856]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffc94cba70 a2=50 a3=0 items=0 ppid=3751 pid=3856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:34.587000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:48:34.587000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.587000 audit[3856]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffc94cbbb8 a2=4 a3=3 items=0 ppid=3751 pid=3856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:34.587000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:48:34.587000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.587000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.587000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.587000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.587000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.587000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.587000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.587000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.587000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.587000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.587000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:48:34.587000 audit[3856]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffc94cbb98 a2=94 a3=6 items=0 ppid=3751 pid=3856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:34.587000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:48:34.588000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.588000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.588000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.588000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.588000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.588000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.588000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.588000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.588000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.588000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.588000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:48:34.588000 audit[3856]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffc94cb368 a2=94 a3=83 items=0 ppid=3751 pid=3856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:34.588000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:48:34.588000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.588000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.588000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.588000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.588000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.588000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.588000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.588000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.588000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.588000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.588000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:48:34.588000 audit[3856]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffc94cb368 a2=94 a3=83 items=0 ppid=3751 pid=3856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:34.588000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:48:34.597000 audit[3860]: AVC avc: denied { bpf } for pid=3860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.597000 audit[3860]: AVC avc: denied { bpf } for pid=3860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.597000 audit[3860]: AVC avc: denied { perfmon } for pid=3860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.597000 audit[3860]: AVC avc: denied { perfmon } for pid=3860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.597000 audit[3860]: AVC avc: denied { perfmon } for pid=3860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.597000 audit[3860]: AVC avc: denied { perfmon } for pid=3860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.597000 audit[3860]: AVC avc: denied { perfmon } for pid=3860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.597000 audit[3860]: AVC avc: denied { bpf } for pid=3860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.597000 audit[3860]: AVC avc: denied { bpf } for pid=3860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.597000 audit: BPF prog-id=145 op=LOAD May 17 00:48:34.597000 audit[3860]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffffc22b1b8 a2=98 a3=fffffc22b1a8 items=0 ppid=3751 pid=3860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:34.597000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 00:48:34.597000 audit: BPF prog-id=145 op=UNLOAD May 17 00:48:34.597000 audit[3860]: AVC avc: denied { bpf } for pid=3860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.597000 audit[3860]: AVC avc: denied { bpf } for pid=3860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.597000 audit[3860]: AVC avc: denied { perfmon } for pid=3860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.597000 audit[3860]: AVC avc: denied { perfmon } for pid=3860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.597000 audit[3860]: AVC avc: denied { perfmon } for pid=3860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.597000 audit[3860]: AVC avc: denied { perfmon } for pid=3860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.597000 audit[3860]: AVC avc: denied { perfmon } for pid=3860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.597000 audit[3860]: AVC avc: denied { bpf } for pid=3860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.597000 audit[3860]: AVC avc: denied { bpf } for pid=3860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.597000 audit: BPF prog-id=146 op=LOAD May 17 00:48:34.597000 audit[3860]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffffc22b068 a2=74 a3=95 items=0 ppid=3751 pid=3860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:34.597000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 00:48:34.597000 audit: BPF prog-id=146 op=UNLOAD May 17 00:48:34.597000 audit[3860]: AVC avc: denied { bpf } for pid=3860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.597000 audit[3860]: AVC avc: denied { bpf } for pid=3860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.597000 audit[3860]: AVC avc: denied { perfmon } for pid=3860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.597000 audit[3860]: AVC avc: denied { perfmon } for pid=3860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.597000 audit[3860]: AVC avc: denied { perfmon } for pid=3860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.597000 audit[3860]: AVC avc: denied { perfmon } for pid=3860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.597000 audit[3860]: AVC avc: denied { perfmon } for pid=3860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.597000 audit[3860]: AVC avc: denied { bpf } for pid=3860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.597000 audit[3860]: AVC avc: denied { bpf } for pid=3860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.597000 audit: BPF prog-id=147 op=LOAD May 17 00:48:34.597000 audit[3860]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffffc22b098 a2=40 a3=fffffc22b0c8 items=0 ppid=3751 pid=3860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:34.597000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 00:48:34.597000 audit: BPF prog-id=147 op=UNLOAD May 17 00:48:34.646299 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:48:34.647133 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calic1f2e7d9995: link becomes ready May 17 00:48:34.649677 systemd-networkd[1609]: calic1f2e7d9995: Link UP May 17 00:48:34.649826 systemd-networkd[1609]: calic1f2e7d9995: Gained carrier May 17 00:48:34.663914 env[1452]: 2025-05-17 00:48:34.373 [INFO][3810] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 17 00:48:34.663914 env[1452]: 2025-05-17 00:48:34.405 [INFO][3810] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--6523ff94dd-k8s-whisker--5c6b5ff985--qsbbb-eth0 whisker-5c6b5ff985- calico-system 1034e955-0d22-4661-9e47-81fdd9a27aa3 916 0 2025-05-17 00:48:33 +0000 UTC map[app.kubernetes.io/name:whisker k8s-app:whisker pod-template-hash:5c6b5ff985 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:whisker] map[] [] [] []} {k8s ci-3510.3.7-n-6523ff94dd whisker-5c6b5ff985-qsbbb eth0 whisker [] [] [kns.calico-system ksa.calico-system.whisker] calic1f2e7d9995 [] [] }} ContainerID="cfbba7d4b9b0c0645aeba63bd4736e031b838ce86da70533566420ff057a3e2d" Namespace="calico-system" Pod="whisker-5c6b5ff985-qsbbb" WorkloadEndpoint="ci--3510.3.7--n--6523ff94dd-k8s-whisker--5c6b5ff985--qsbbb-" May 17 00:48:34.663914 env[1452]: 2025-05-17 00:48:34.405 [INFO][3810] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="cfbba7d4b9b0c0645aeba63bd4736e031b838ce86da70533566420ff057a3e2d" Namespace="calico-system" Pod="whisker-5c6b5ff985-qsbbb" WorkloadEndpoint="ci--3510.3.7--n--6523ff94dd-k8s-whisker--5c6b5ff985--qsbbb-eth0" May 17 00:48:34.663914 env[1452]: 2025-05-17 00:48:34.431 [INFO][3827] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="cfbba7d4b9b0c0645aeba63bd4736e031b838ce86da70533566420ff057a3e2d" HandleID="k8s-pod-network.cfbba7d4b9b0c0645aeba63bd4736e031b838ce86da70533566420ff057a3e2d" Workload="ci--3510.3.7--n--6523ff94dd-k8s-whisker--5c6b5ff985--qsbbb-eth0" May 17 00:48:34.664172 env[1452]: 2025-05-17 00:48:34.431 [INFO][3827] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="cfbba7d4b9b0c0645aeba63bd4736e031b838ce86da70533566420ff057a3e2d" HandleID="k8s-pod-network.cfbba7d4b9b0c0645aeba63bd4736e031b838ce86da70533566420ff057a3e2d" Workload="ci--3510.3.7--n--6523ff94dd-k8s-whisker--5c6b5ff985--qsbbb-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400022efe0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.7-n-6523ff94dd", "pod":"whisker-5c6b5ff985-qsbbb", "timestamp":"2025-05-17 00:48:34.431298359 +0000 UTC"}, Hostname:"ci-3510.3.7-n-6523ff94dd", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:48:34.664172 env[1452]: 2025-05-17 00:48:34.431 [INFO][3827] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:48:34.664172 env[1452]: 2025-05-17 00:48:34.431 [INFO][3827] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:48:34.664172 env[1452]: 2025-05-17 00:48:34.431 [INFO][3827] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-6523ff94dd' May 17 00:48:34.664172 env[1452]: 2025-05-17 00:48:34.441 [INFO][3827] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.cfbba7d4b9b0c0645aeba63bd4736e031b838ce86da70533566420ff057a3e2d" host="ci-3510.3.7-n-6523ff94dd" May 17 00:48:34.664172 env[1452]: 2025-05-17 00:48:34.446 [INFO][3827] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.7-n-6523ff94dd" May 17 00:48:34.664172 env[1452]: 2025-05-17 00:48:34.451 [INFO][3827] ipam/ipam.go 511: Trying affinity for 192.168.38.192/26 host="ci-3510.3.7-n-6523ff94dd" May 17 00:48:34.664172 env[1452]: 2025-05-17 00:48:34.453 [INFO][3827] ipam/ipam.go 158: Attempting to load block cidr=192.168.38.192/26 host="ci-3510.3.7-n-6523ff94dd" May 17 00:48:34.664172 env[1452]: 2025-05-17 00:48:34.457 [INFO][3827] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.38.192/26 host="ci-3510.3.7-n-6523ff94dd" May 17 00:48:34.664533 env[1452]: 2025-05-17 00:48:34.457 [INFO][3827] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.38.192/26 handle="k8s-pod-network.cfbba7d4b9b0c0645aeba63bd4736e031b838ce86da70533566420ff057a3e2d" host="ci-3510.3.7-n-6523ff94dd" May 17 00:48:34.664533 env[1452]: 2025-05-17 00:48:34.460 [INFO][3827] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.cfbba7d4b9b0c0645aeba63bd4736e031b838ce86da70533566420ff057a3e2d May 17 00:48:34.664533 env[1452]: 2025-05-17 00:48:34.472 [INFO][3827] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.38.192/26 handle="k8s-pod-network.cfbba7d4b9b0c0645aeba63bd4736e031b838ce86da70533566420ff057a3e2d" host="ci-3510.3.7-n-6523ff94dd" May 17 00:48:34.664533 env[1452]: 2025-05-17 00:48:34.481 [INFO][3827] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.38.193/26] block=192.168.38.192/26 handle="k8s-pod-network.cfbba7d4b9b0c0645aeba63bd4736e031b838ce86da70533566420ff057a3e2d" host="ci-3510.3.7-n-6523ff94dd" May 17 00:48:34.664533 env[1452]: 2025-05-17 00:48:34.481 [INFO][3827] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.38.193/26] handle="k8s-pod-network.cfbba7d4b9b0c0645aeba63bd4736e031b838ce86da70533566420ff057a3e2d" host="ci-3510.3.7-n-6523ff94dd" May 17 00:48:34.664533 env[1452]: 2025-05-17 00:48:34.481 [INFO][3827] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:48:34.664533 env[1452]: 2025-05-17 00:48:34.481 [INFO][3827] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.38.193/26] IPv6=[] ContainerID="cfbba7d4b9b0c0645aeba63bd4736e031b838ce86da70533566420ff057a3e2d" HandleID="k8s-pod-network.cfbba7d4b9b0c0645aeba63bd4736e031b838ce86da70533566420ff057a3e2d" Workload="ci--3510.3.7--n--6523ff94dd-k8s-whisker--5c6b5ff985--qsbbb-eth0" May 17 00:48:34.664684 env[1452]: 2025-05-17 00:48:34.483 [INFO][3810] cni-plugin/k8s.go 418: Populated endpoint ContainerID="cfbba7d4b9b0c0645aeba63bd4736e031b838ce86da70533566420ff057a3e2d" Namespace="calico-system" Pod="whisker-5c6b5ff985-qsbbb" WorkloadEndpoint="ci--3510.3.7--n--6523ff94dd-k8s-whisker--5c6b5ff985--qsbbb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--6523ff94dd-k8s-whisker--5c6b5ff985--qsbbb-eth0", GenerateName:"whisker-5c6b5ff985-", Namespace:"calico-system", SelfLink:"", UID:"1034e955-0d22-4661-9e47-81fdd9a27aa3", ResourceVersion:"916", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 48, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"5c6b5ff985", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-6523ff94dd", ContainerID:"", Pod:"whisker-5c6b5ff985-qsbbb", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.38.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"calic1f2e7d9995", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:48:34.664684 env[1452]: 2025-05-17 00:48:34.483 [INFO][3810] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.38.193/32] ContainerID="cfbba7d4b9b0c0645aeba63bd4736e031b838ce86da70533566420ff057a3e2d" Namespace="calico-system" Pod="whisker-5c6b5ff985-qsbbb" WorkloadEndpoint="ci--3510.3.7--n--6523ff94dd-k8s-whisker--5c6b5ff985--qsbbb-eth0" May 17 00:48:34.665951 env[1452]: 2025-05-17 00:48:34.484 [INFO][3810] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calic1f2e7d9995 ContainerID="cfbba7d4b9b0c0645aeba63bd4736e031b838ce86da70533566420ff057a3e2d" Namespace="calico-system" Pod="whisker-5c6b5ff985-qsbbb" WorkloadEndpoint="ci--3510.3.7--n--6523ff94dd-k8s-whisker--5c6b5ff985--qsbbb-eth0" May 17 00:48:34.665951 env[1452]: 2025-05-17 00:48:34.631 [INFO][3810] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="cfbba7d4b9b0c0645aeba63bd4736e031b838ce86da70533566420ff057a3e2d" Namespace="calico-system" Pod="whisker-5c6b5ff985-qsbbb" WorkloadEndpoint="ci--3510.3.7--n--6523ff94dd-k8s-whisker--5c6b5ff985--qsbbb-eth0" May 17 00:48:34.666044 env[1452]: 2025-05-17 00:48:34.647 [INFO][3810] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="cfbba7d4b9b0c0645aeba63bd4736e031b838ce86da70533566420ff057a3e2d" Namespace="calico-system" Pod="whisker-5c6b5ff985-qsbbb" WorkloadEndpoint="ci--3510.3.7--n--6523ff94dd-k8s-whisker--5c6b5ff985--qsbbb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--6523ff94dd-k8s-whisker--5c6b5ff985--qsbbb-eth0", GenerateName:"whisker-5c6b5ff985-", Namespace:"calico-system", SelfLink:"", UID:"1034e955-0d22-4661-9e47-81fdd9a27aa3", ResourceVersion:"916", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 48, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"5c6b5ff985", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-6523ff94dd", ContainerID:"cfbba7d4b9b0c0645aeba63bd4736e031b838ce86da70533566420ff057a3e2d", Pod:"whisker-5c6b5ff985-qsbbb", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.38.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"calic1f2e7d9995", MAC:"52:0c:09:f8:45:27", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:48:34.666103 env[1452]: 2025-05-17 00:48:34.657 [INFO][3810] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="cfbba7d4b9b0c0645aeba63bd4736e031b838ce86da70533566420ff057a3e2d" Namespace="calico-system" Pod="whisker-5c6b5ff985-qsbbb" WorkloadEndpoint="ci--3510.3.7--n--6523ff94dd-k8s-whisker--5c6b5ff985--qsbbb-eth0" May 17 00:48:34.721295 env[1452]: time="2025-05-17T00:48:34.721170990Z" level=info msg="StopPodSandbox for \"d02ec9e0916eb99bf802ca6be9e9a4731f876af349990f3a74d882c617ed7772\"" May 17 00:48:34.724103 env[1452]: time="2025-05-17T00:48:34.724069494Z" level=info msg="StopPodSandbox for \"2bdcc7637ca0f5f39fdf5a216cf0bd20dc22d842d8a0e6851b7718601999a14f\"" May 17 00:48:34.725557 kubelet[2511]: I0517 00:48:34.725365 2511 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="81ca1c4a-23c4-4480-a4ac-3309374863e9" path="/var/lib/kubelet/pods/81ca1c4a-23c4-4480-a4ac-3309374863e9/volumes" May 17 00:48:34.795428 env[1452]: time="2025-05-17T00:48:34.795334548Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:48:34.795428 env[1452]: time="2025-05-17T00:48:34.795379748Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:48:34.795428 env[1452]: time="2025-05-17T00:48:34.795389548Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:48:34.795675 env[1452]: time="2025-05-17T00:48:34.795552787Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/cfbba7d4b9b0c0645aeba63bd4736e031b838ce86da70533566420ff057a3e2d pid=3917 runtime=io.containerd.runc.v2 May 17 00:48:34.833499 systemd[1]: Started cri-containerd-cfbba7d4b9b0c0645aeba63bd4736e031b838ce86da70533566420ff057a3e2d.scope. May 17 00:48:34.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.883000 audit: BPF prog-id=148 op=LOAD May 17 00:48:34.883000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.883000 audit[3928]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3917 pid=3928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:34.883000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366626261376434623962306330363435616562613633626434373336 May 17 00:48:34.883000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.883000 audit[3928]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3917 pid=3928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:34.883000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366626261376434623962306330363435616562613633626434373336 May 17 00:48:34.883000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.883000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.883000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.883000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.883000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.883000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.883000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.883000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.883000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.883000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.883000 audit: BPF prog-id=149 op=LOAD May 17 00:48:34.883000 audit[3928]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3917 pid=3928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:34.883000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366626261376434623962306330363435616562613633626434373336 May 17 00:48:34.884000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.884000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.884000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.884000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.884000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.884000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.884000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.884000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.884000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.884000 audit: BPF prog-id=150 op=LOAD May 17 00:48:34.884000 audit[3928]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3917 pid=3928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:34.884000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366626261376434623962306330363435616562613633626434373336 May 17 00:48:34.884000 audit: BPF prog-id=150 op=UNLOAD May 17 00:48:34.884000 audit: BPF prog-id=149 op=UNLOAD May 17 00:48:34.884000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.884000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.884000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.884000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.884000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.884000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.884000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.884000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.884000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.884000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.884000 audit: BPF prog-id=151 op=LOAD May 17 00:48:34.884000 audit[3928]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3917 pid=3928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:34.884000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366626261376434623962306330363435616562613633626434373336 May 17 00:48:34.930248 env[1452]: time="2025-05-17T00:48:34.930195858Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-5c6b5ff985-qsbbb,Uid:1034e955-0d22-4661-9e47-81fdd9a27aa3,Namespace:calico-system,Attempt:0,} returns sandbox id \"cfbba7d4b9b0c0645aeba63bd4736e031b838ce86da70533566420ff057a3e2d\"" May 17 00:48:34.935004 env[1452]: time="2025-05-17T00:48:34.934964553Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\"" May 17 00:48:34.935883 env[1452]: 2025-05-17 00:48:34.858 [INFO][3895] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="2bdcc7637ca0f5f39fdf5a216cf0bd20dc22d842d8a0e6851b7718601999a14f" May 17 00:48:34.935883 env[1452]: 2025-05-17 00:48:34.859 [INFO][3895] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="2bdcc7637ca0f5f39fdf5a216cf0bd20dc22d842d8a0e6851b7718601999a14f" iface="eth0" netns="/var/run/netns/cni-455a3e1c-9f79-49f3-e12b-61e508243bcb" May 17 00:48:34.935883 env[1452]: 2025-05-17 00:48:34.859 [INFO][3895] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="2bdcc7637ca0f5f39fdf5a216cf0bd20dc22d842d8a0e6851b7718601999a14f" iface="eth0" netns="/var/run/netns/cni-455a3e1c-9f79-49f3-e12b-61e508243bcb" May 17 00:48:34.935883 env[1452]: 2025-05-17 00:48:34.859 [INFO][3895] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="2bdcc7637ca0f5f39fdf5a216cf0bd20dc22d842d8a0e6851b7718601999a14f" iface="eth0" netns="/var/run/netns/cni-455a3e1c-9f79-49f3-e12b-61e508243bcb" May 17 00:48:34.935883 env[1452]: 2025-05-17 00:48:34.859 [INFO][3895] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="2bdcc7637ca0f5f39fdf5a216cf0bd20dc22d842d8a0e6851b7718601999a14f" May 17 00:48:34.935883 env[1452]: 2025-05-17 00:48:34.859 [INFO][3895] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2bdcc7637ca0f5f39fdf5a216cf0bd20dc22d842d8a0e6851b7718601999a14f" May 17 00:48:34.935883 env[1452]: 2025-05-17 00:48:34.897 [INFO][3945] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2bdcc7637ca0f5f39fdf5a216cf0bd20dc22d842d8a0e6851b7718601999a14f" HandleID="k8s-pod-network.2bdcc7637ca0f5f39fdf5a216cf0bd20dc22d842d8a0e6851b7718601999a14f" Workload="ci--3510.3.7--n--6523ff94dd-k8s-calico--kube--controllers--6cdf59f477--fr7wb-eth0" May 17 00:48:34.935883 env[1452]: 2025-05-17 00:48:34.897 [INFO][3945] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:48:34.935883 env[1452]: 2025-05-17 00:48:34.898 [INFO][3945] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:48:34.936173 env[1452]: 2025-05-17 00:48:34.918 [WARNING][3945] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2bdcc7637ca0f5f39fdf5a216cf0bd20dc22d842d8a0e6851b7718601999a14f" HandleID="k8s-pod-network.2bdcc7637ca0f5f39fdf5a216cf0bd20dc22d842d8a0e6851b7718601999a14f" Workload="ci--3510.3.7--n--6523ff94dd-k8s-calico--kube--controllers--6cdf59f477--fr7wb-eth0" May 17 00:48:34.936173 env[1452]: 2025-05-17 00:48:34.918 [INFO][3945] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2bdcc7637ca0f5f39fdf5a216cf0bd20dc22d842d8a0e6851b7718601999a14f" HandleID="k8s-pod-network.2bdcc7637ca0f5f39fdf5a216cf0bd20dc22d842d8a0e6851b7718601999a14f" Workload="ci--3510.3.7--n--6523ff94dd-k8s-calico--kube--controllers--6cdf59f477--fr7wb-eth0" May 17 00:48:34.936173 env[1452]: 2025-05-17 00:48:34.926 [INFO][3945] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:48:34.936173 env[1452]: 2025-05-17 00:48:34.928 [INFO][3895] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="2bdcc7637ca0f5f39fdf5a216cf0bd20dc22d842d8a0e6851b7718601999a14f" May 17 00:48:34.963355 env[1452]: time="2025-05-17T00:48:34.963291719Z" level=info msg="TearDown network for sandbox \"2bdcc7637ca0f5f39fdf5a216cf0bd20dc22d842d8a0e6851b7718601999a14f\" successfully" May 17 00:48:34.963355 env[1452]: time="2025-05-17T00:48:34.963339559Z" level=info msg="StopPodSandbox for \"2bdcc7637ca0f5f39fdf5a216cf0bd20dc22d842d8a0e6851b7718601999a14f\" returns successfully" May 17 00:48:35.021850 env[1452]: 2025-05-17 00:48:34.894 [INFO][3900] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="d02ec9e0916eb99bf802ca6be9e9a4731f876af349990f3a74d882c617ed7772" May 17 00:48:35.021850 env[1452]: 2025-05-17 00:48:34.894 [INFO][3900] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="d02ec9e0916eb99bf802ca6be9e9a4731f876af349990f3a74d882c617ed7772" iface="eth0" netns="/var/run/netns/cni-e740fd6f-7167-0f51-0815-8b0be6b8f238" May 17 00:48:35.021850 env[1452]: 2025-05-17 00:48:34.894 [INFO][3900] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="d02ec9e0916eb99bf802ca6be9e9a4731f876af349990f3a74d882c617ed7772" iface="eth0" netns="/var/run/netns/cni-e740fd6f-7167-0f51-0815-8b0be6b8f238" May 17 00:48:35.021850 env[1452]: 2025-05-17 00:48:34.894 [INFO][3900] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="d02ec9e0916eb99bf802ca6be9e9a4731f876af349990f3a74d882c617ed7772" iface="eth0" netns="/var/run/netns/cni-e740fd6f-7167-0f51-0815-8b0be6b8f238" May 17 00:48:35.021850 env[1452]: 2025-05-17 00:48:34.894 [INFO][3900] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="d02ec9e0916eb99bf802ca6be9e9a4731f876af349990f3a74d882c617ed7772" May 17 00:48:35.021850 env[1452]: 2025-05-17 00:48:34.894 [INFO][3900] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d02ec9e0916eb99bf802ca6be9e9a4731f876af349990f3a74d882c617ed7772" May 17 00:48:35.021850 env[1452]: 2025-05-17 00:48:34.974 [INFO][3950] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d02ec9e0916eb99bf802ca6be9e9a4731f876af349990f3a74d882c617ed7772" HandleID="k8s-pod-network.d02ec9e0916eb99bf802ca6be9e9a4731f876af349990f3a74d882c617ed7772" Workload="ci--3510.3.7--n--6523ff94dd-k8s-calico--apiserver--86b546bb5c--jpwk2-eth0" May 17 00:48:35.021850 env[1452]: 2025-05-17 00:48:34.974 [INFO][3950] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:48:35.021850 env[1452]: 2025-05-17 00:48:34.974 [INFO][3950] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:48:35.022246 env[1452]: 2025-05-17 00:48:35.006 [WARNING][3950] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d02ec9e0916eb99bf802ca6be9e9a4731f876af349990f3a74d882c617ed7772" HandleID="k8s-pod-network.d02ec9e0916eb99bf802ca6be9e9a4731f876af349990f3a74d882c617ed7772" Workload="ci--3510.3.7--n--6523ff94dd-k8s-calico--apiserver--86b546bb5c--jpwk2-eth0" May 17 00:48:35.022246 env[1452]: 2025-05-17 00:48:35.006 [INFO][3950] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d02ec9e0916eb99bf802ca6be9e9a4731f876af349990f3a74d882c617ed7772" HandleID="k8s-pod-network.d02ec9e0916eb99bf802ca6be9e9a4731f876af349990f3a74d882c617ed7772" Workload="ci--3510.3.7--n--6523ff94dd-k8s-calico--apiserver--86b546bb5c--jpwk2-eth0" May 17 00:48:35.022246 env[1452]: 2025-05-17 00:48:35.008 [INFO][3950] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:48:35.022246 env[1452]: 2025-05-17 00:48:35.020 [INFO][3900] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="d02ec9e0916eb99bf802ca6be9e9a4731f876af349990f3a74d882c617ed7772" May 17 00:48:35.023272 env[1452]: time="2025-05-17T00:48:35.023234117Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6cdf59f477-fr7wb,Uid:e98971c7-2262-4242-8532-c18d59231219,Namespace:calico-system,Attempt:1,}" May 17 00:48:35.029173 env[1452]: time="2025-05-17T00:48:35.029121325Z" level=info msg="TearDown network for sandbox \"d02ec9e0916eb99bf802ca6be9e9a4731f876af349990f3a74d882c617ed7772\" successfully" May 17 00:48:35.029173 env[1452]: time="2025-05-17T00:48:35.029167765Z" level=info msg="StopPodSandbox for \"d02ec9e0916eb99bf802ca6be9e9a4731f876af349990f3a74d882c617ed7772\" returns successfully" May 17 00:48:35.031235 env[1452]: time="2025-05-17T00:48:35.030993915Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-86b546bb5c-jpwk2,Uid:82f2f80c-103d-408f-831d-8869219e2fae,Namespace:calico-apiserver,Attempt:1,}" May 17 00:48:35.139089 systemd[1]: run-netns-cni\x2d455a3e1c\x2d9f79\x2d49f3\x2de12b\x2d61e508243bcb.mount: Deactivated successfully. May 17 00:48:35.139187 systemd[1]: run-netns-cni\x2de740fd6f\x2d7167\x2d0f51\x2d0815\x2d8b0be6b8f238.mount: Deactivated successfully. May 17 00:48:35.482636 systemd-networkd[1609]: vxlan.calico: Link UP May 17 00:48:35.482643 systemd-networkd[1609]: vxlan.calico: Gained carrier May 17 00:48:35.509000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.509000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.509000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.509000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.509000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.509000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.509000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.509000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.509000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.509000 audit: BPF prog-id=152 op=LOAD May 17 00:48:35.509000 audit[3981]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd21227e8 a2=98 a3=ffffd21227d8 items=0 ppid=3751 pid=3981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:35.509000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:48:35.513000 audit: BPF prog-id=152 op=UNLOAD May 17 00:48:35.513000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.513000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.513000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.513000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.513000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.513000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.513000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.513000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.513000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.513000 audit: BPF prog-id=153 op=LOAD May 17 00:48:35.513000 audit[3981]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd21224c8 a2=74 a3=95 items=0 ppid=3751 pid=3981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:35.513000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:48:35.513000 audit: BPF prog-id=153 op=UNLOAD May 17 00:48:35.513000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.513000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.513000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.513000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.513000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.513000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.513000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.513000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.513000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.513000 audit: BPF prog-id=154 op=LOAD May 17 00:48:35.513000 audit[3981]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd2122528 a2=94 a3=2 items=0 ppid=3751 pid=3981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:35.513000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:48:35.513000 audit: BPF prog-id=154 op=UNLOAD May 17 00:48:35.513000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.513000 audit[3981]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffd2122558 a2=28 a3=ffffd2122688 items=0 ppid=3751 pid=3981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:35.513000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:48:35.513000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.513000 audit[3981]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd2122588 a2=28 a3=ffffd21226b8 items=0 ppid=3751 pid=3981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:35.513000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:48:35.513000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.513000 audit[3981]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd2122438 a2=28 a3=ffffd2122568 items=0 ppid=3751 pid=3981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:35.513000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:48:35.513000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.513000 audit[3981]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffd21225a8 a2=28 a3=ffffd21226d8 items=0 ppid=3751 pid=3981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:35.513000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:48:35.513000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.513000 audit[3981]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffd2122588 a2=28 a3=ffffd21226b8 items=0 ppid=3751 pid=3981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:35.513000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:48:35.513000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.513000 audit[3981]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffd2122578 a2=28 a3=ffffd21226a8 items=0 ppid=3751 pid=3981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:35.513000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:48:35.513000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.513000 audit[3981]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffd21225a8 a2=28 a3=ffffd21226d8 items=0 ppid=3751 pid=3981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:35.513000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:48:35.513000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.513000 audit[3981]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd2122588 a2=28 a3=ffffd21226b8 items=0 ppid=3751 pid=3981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:35.513000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:48:35.513000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.513000 audit[3981]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd21225a8 a2=28 a3=ffffd21226d8 items=0 ppid=3751 pid=3981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:35.513000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:48:35.513000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.513000 audit[3981]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd2122578 a2=28 a3=ffffd21226a8 items=0 ppid=3751 pid=3981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:35.513000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:48:35.513000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.513000 audit[3981]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffd21225f8 a2=28 a3=ffffd2122738 items=0 ppid=3751 pid=3981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:35.513000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:48:35.513000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.513000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.513000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.513000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.513000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.513000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.513000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.513000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.513000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.513000 audit: BPF prog-id=155 op=LOAD May 17 00:48:35.513000 audit[3981]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffd2122418 a2=40 a3=ffffd2122448 items=0 ppid=3751 pid=3981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:35.513000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:48:35.513000 audit: BPF prog-id=155 op=UNLOAD May 17 00:48:35.514000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.514000 audit[3981]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=ffffd2122440 a2=50 a3=0 items=0 ppid=3751 pid=3981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:35.514000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:48:35.516000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.516000 audit[3981]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=0 a1=ffffd2122440 a2=50 a3=0 items=0 ppid=3751 pid=3981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:35.516000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:48:35.517000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.517000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.517000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.517000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.517000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.517000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.517000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.517000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.517000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.517000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.517000 audit: BPF prog-id=156 op=LOAD May 17 00:48:35.517000 audit[3981]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffd2121ba8 a2=94 a3=2 items=0 ppid=3751 pid=3981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:35.517000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:48:35.517000 audit: BPF prog-id=156 op=UNLOAD May 17 00:48:35.517000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.517000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.517000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.517000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.517000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.517000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.517000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.517000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.517000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.517000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.517000 audit: BPF prog-id=157 op=LOAD May 17 00:48:35.517000 audit[3981]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffd2121d38 a2=94 a3=30 items=0 ppid=3751 pid=3981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:35.517000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:48:35.525000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.525000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.525000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.525000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.525000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.525000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.525000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.525000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.525000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.525000 audit: BPF prog-id=158 op=LOAD May 17 00:48:35.525000 audit[3985]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffffe19f828 a2=98 a3=fffffe19f818 items=0 ppid=3751 pid=3985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:35.525000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:48:35.526000 audit: BPF prog-id=158 op=UNLOAD May 17 00:48:35.526000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.526000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.526000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.526000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.526000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.526000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.526000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.526000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.526000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.526000 audit: BPF prog-id=159 op=LOAD May 17 00:48:35.526000 audit[3985]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffffe19f4b8 a2=74 a3=95 items=0 ppid=3751 pid=3985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:35.526000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:48:35.526000 audit: BPF prog-id=159 op=UNLOAD May 17 00:48:35.526000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.526000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.526000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.526000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.526000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.526000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.526000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.526000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.526000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.526000 audit: BPF prog-id=160 op=LOAD May 17 00:48:35.526000 audit[3985]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffffe19f518 a2=94 a3=2 items=0 ppid=3751 pid=3985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:35.526000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:48:35.527000 audit: BPF prog-id=160 op=UNLOAD May 17 00:48:35.635613 env[1452]: time="2025-05-17T00:48:35.635533457Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:48:35.641973 env[1452]: time="2025-05-17T00:48:35.641896983Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:48:35.647075 kubelet[2511]: E0517 00:48:35.647006 2511 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:48:35.647075 kubelet[2511]: E0517 00:48:35.647077 2511 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:48:35.647458 kubelet[2511]: E0517 00:48:35.647226 2511 kuberuntime_manager.go:1274] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.0,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:f515ef07f4944df1b53f071bfd4a71b4,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-98cxh,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-5c6b5ff985-qsbbb_calico-system(1034e955-0d22-4661-9e47-81fdd9a27aa3): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:48:35.649661 env[1452]: time="2025-05-17T00:48:35.649600822Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\"" May 17 00:48:35.689000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.689000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.689000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.689000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.689000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.689000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.689000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.689000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.689000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.689000 audit: BPF prog-id=161 op=LOAD May 17 00:48:35.689000 audit[3985]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffffe19f4d8 a2=40 a3=fffffe19f508 items=0 ppid=3751 pid=3985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:35.689000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:48:35.690000 audit: BPF prog-id=161 op=UNLOAD May 17 00:48:35.690000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.690000 audit[3985]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=fffffe19f5f0 a2=50 a3=0 items=0 ppid=3751 pid=3985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:35.690000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:48:35.702000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.702000 audit[3985]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffe19f548 a2=28 a3=fffffe19f678 items=0 ppid=3751 pid=3985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:35.702000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:48:35.702000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.702000 audit[3985]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffe19f578 a2=28 a3=fffffe19f6a8 items=0 ppid=3751 pid=3985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:35.702000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:48:35.702000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.702000 audit[3985]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffe19f428 a2=28 a3=fffffe19f558 items=0 ppid=3751 pid=3985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:35.702000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:48:35.703000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.703000 audit[3985]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffe19f598 a2=28 a3=fffffe19f6c8 items=0 ppid=3751 pid=3985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:35.703000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:48:35.703000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.703000 audit[3985]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffe19f578 a2=28 a3=fffffe19f6a8 items=0 ppid=3751 pid=3985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:35.703000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:48:35.703000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.703000 audit[3985]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffe19f568 a2=28 a3=fffffe19f698 items=0 ppid=3751 pid=3985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:35.703000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:48:35.703000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.703000 audit[3985]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffe19f598 a2=28 a3=fffffe19f6c8 items=0 ppid=3751 pid=3985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:35.703000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:48:35.704000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.704000 audit[3985]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffe19f578 a2=28 a3=fffffe19f6a8 items=0 ppid=3751 pid=3985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:35.704000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:48:35.704000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.704000 audit[3985]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffe19f598 a2=28 a3=fffffe19f6c8 items=0 ppid=3751 pid=3985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:35.704000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:48:35.704000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.704000 audit[3985]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffe19f568 a2=28 a3=fffffe19f698 items=0 ppid=3751 pid=3985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:35.704000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:48:35.704000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.704000 audit[3985]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffe19f5e8 a2=28 a3=fffffe19f728 items=0 ppid=3751 pid=3985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:35.704000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:48:35.704000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.704000 audit[3985]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=fffffe19f320 a2=50 a3=0 items=0 ppid=3751 pid=3985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:35.704000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:48:35.705000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.705000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.705000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.705000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.705000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.705000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.705000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.705000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.705000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.705000 audit: BPF prog-id=162 op=LOAD May 17 00:48:35.705000 audit[3985]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=fffffe19f328 a2=94 a3=5 items=0 ppid=3751 pid=3985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:35.705000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:48:35.705000 audit: BPF prog-id=162 op=UNLOAD May 17 00:48:35.705000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.705000 audit[3985]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=fffffe19f430 a2=50 a3=0 items=0 ppid=3751 pid=3985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:35.705000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:48:35.706000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.706000 audit[3985]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=fffffe19f578 a2=4 a3=3 items=0 ppid=3751 pid=3985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:35.706000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:48:35.706000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.706000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.706000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.706000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.706000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.706000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.706000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.706000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.706000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.706000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.706000 audit[3985]: AVC avc: denied { confidentiality } for pid=3985 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:48:35.706000 audit[3985]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffffe19f558 a2=94 a3=6 items=0 ppid=3751 pid=3985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:35.706000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:48:35.707000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.707000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.707000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.707000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.707000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.707000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.707000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.707000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.707000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.707000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.707000 audit[3985]: AVC avc: denied { confidentiality } for pid=3985 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:48:35.707000 audit[3985]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffffe19ed28 a2=94 a3=83 items=0 ppid=3751 pid=3985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:35.707000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:48:35.708000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.708000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.708000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.708000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.708000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.708000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.708000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.708000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.708000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.708000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.708000 audit[3985]: AVC avc: denied { confidentiality } for pid=3985 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:48:35.708000 audit[3985]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffffe19ed28 a2=94 a3=83 items=0 ppid=3751 pid=3985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:35.708000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:48:35.709000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.709000 audit[3985]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffffe1a0768 a2=10 a3=fffffe1a0858 items=0 ppid=3751 pid=3985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:35.709000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:48:35.710000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.710000 audit[3985]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffffe1a0628 a2=10 a3=fffffe1a0718 items=0 ppid=3751 pid=3985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:35.710000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:48:35.710000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.710000 audit[3985]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffffe1a0598 a2=10 a3=fffffe1a0718 items=0 ppid=3751 pid=3985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:35.710000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:48:35.710000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.710000 audit[3985]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffffe1a0598 a2=10 a3=fffffe1a0718 items=0 ppid=3751 pid=3985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:35.710000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:48:35.719000 audit: BPF prog-id=157 op=UNLOAD May 17 00:48:35.754902 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calicae6a0ef99d: link becomes ready May 17 00:48:35.758267 systemd-networkd[1609]: calicae6a0ef99d: Link UP May 17 00:48:35.758467 systemd-networkd[1609]: calicae6a0ef99d: Gained carrier May 17 00:48:35.774659 env[1452]: 2025-05-17 00:48:35.634 [INFO][3986] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--6523ff94dd-k8s-calico--apiserver--86b546bb5c--jpwk2-eth0 calico-apiserver-86b546bb5c- calico-apiserver 82f2f80c-103d-408f-831d-8869219e2fae 926 0 2025-05-17 00:48:06 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:86b546bb5c projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.7-n-6523ff94dd calico-apiserver-86b546bb5c-jpwk2 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calicae6a0ef99d [] [] }} ContainerID="64768cfde28b6138611a687f8b053d38d744ed122aa149a291af662d525e2956" Namespace="calico-apiserver" Pod="calico-apiserver-86b546bb5c-jpwk2" WorkloadEndpoint="ci--3510.3.7--n--6523ff94dd-k8s-calico--apiserver--86b546bb5c--jpwk2-" May 17 00:48:35.774659 env[1452]: 2025-05-17 00:48:35.635 [INFO][3986] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="64768cfde28b6138611a687f8b053d38d744ed122aa149a291af662d525e2956" Namespace="calico-apiserver" Pod="calico-apiserver-86b546bb5c-jpwk2" WorkloadEndpoint="ci--3510.3.7--n--6523ff94dd-k8s-calico--apiserver--86b546bb5c--jpwk2-eth0" May 17 00:48:35.774659 env[1452]: 2025-05-17 00:48:35.681 [INFO][4008] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="64768cfde28b6138611a687f8b053d38d744ed122aa149a291af662d525e2956" HandleID="k8s-pod-network.64768cfde28b6138611a687f8b053d38d744ed122aa149a291af662d525e2956" Workload="ci--3510.3.7--n--6523ff94dd-k8s-calico--apiserver--86b546bb5c--jpwk2-eth0" May 17 00:48:35.774924 env[1452]: 2025-05-17 00:48:35.682 [INFO][4008] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="64768cfde28b6138611a687f8b053d38d744ed122aa149a291af662d525e2956" HandleID="k8s-pod-network.64768cfde28b6138611a687f8b053d38d744ed122aa149a291af662d525e2956" Workload="ci--3510.3.7--n--6523ff94dd-k8s-calico--apiserver--86b546bb5c--jpwk2-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002cf890), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.7-n-6523ff94dd", "pod":"calico-apiserver-86b546bb5c-jpwk2", "timestamp":"2025-05-17 00:48:35.68189009 +0000 UTC"}, Hostname:"ci-3510.3.7-n-6523ff94dd", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:48:35.774924 env[1452]: 2025-05-17 00:48:35.682 [INFO][4008] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:48:35.774924 env[1452]: 2025-05-17 00:48:35.682 [INFO][4008] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:48:35.774924 env[1452]: 2025-05-17 00:48:35.682 [INFO][4008] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-6523ff94dd' May 17 00:48:35.774924 env[1452]: 2025-05-17 00:48:35.692 [INFO][4008] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.64768cfde28b6138611a687f8b053d38d744ed122aa149a291af662d525e2956" host="ci-3510.3.7-n-6523ff94dd" May 17 00:48:35.774924 env[1452]: 2025-05-17 00:48:35.699 [INFO][4008] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.7-n-6523ff94dd" May 17 00:48:35.774924 env[1452]: 2025-05-17 00:48:35.703 [INFO][4008] ipam/ipam.go 511: Trying affinity for 192.168.38.192/26 host="ci-3510.3.7-n-6523ff94dd" May 17 00:48:35.774924 env[1452]: 2025-05-17 00:48:35.705 [INFO][4008] ipam/ipam.go 158: Attempting to load block cidr=192.168.38.192/26 host="ci-3510.3.7-n-6523ff94dd" May 17 00:48:35.774924 env[1452]: 2025-05-17 00:48:35.707 [INFO][4008] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.38.192/26 host="ci-3510.3.7-n-6523ff94dd" May 17 00:48:35.775140 env[1452]: 2025-05-17 00:48:35.708 [INFO][4008] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.38.192/26 handle="k8s-pod-network.64768cfde28b6138611a687f8b053d38d744ed122aa149a291af662d525e2956" host="ci-3510.3.7-n-6523ff94dd" May 17 00:48:35.775140 env[1452]: 2025-05-17 00:48:35.709 [INFO][4008] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.64768cfde28b6138611a687f8b053d38d744ed122aa149a291af662d525e2956 May 17 00:48:35.775140 env[1452]: 2025-05-17 00:48:35.717 [INFO][4008] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.38.192/26 handle="k8s-pod-network.64768cfde28b6138611a687f8b053d38d744ed122aa149a291af662d525e2956" host="ci-3510.3.7-n-6523ff94dd" May 17 00:48:35.775140 env[1452]: 2025-05-17 00:48:35.727 [INFO][4008] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.38.194/26] block=192.168.38.192/26 handle="k8s-pod-network.64768cfde28b6138611a687f8b053d38d744ed122aa149a291af662d525e2956" host="ci-3510.3.7-n-6523ff94dd" May 17 00:48:35.775140 env[1452]: 2025-05-17 00:48:35.727 [INFO][4008] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.38.194/26] handle="k8s-pod-network.64768cfde28b6138611a687f8b053d38d744ed122aa149a291af662d525e2956" host="ci-3510.3.7-n-6523ff94dd" May 17 00:48:35.775140 env[1452]: 2025-05-17 00:48:35.727 [INFO][4008] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:48:35.775140 env[1452]: 2025-05-17 00:48:35.727 [INFO][4008] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.38.194/26] IPv6=[] ContainerID="64768cfde28b6138611a687f8b053d38d744ed122aa149a291af662d525e2956" HandleID="k8s-pod-network.64768cfde28b6138611a687f8b053d38d744ed122aa149a291af662d525e2956" Workload="ci--3510.3.7--n--6523ff94dd-k8s-calico--apiserver--86b546bb5c--jpwk2-eth0" May 17 00:48:35.775304 env[1452]: 2025-05-17 00:48:35.730 [INFO][3986] cni-plugin/k8s.go 418: Populated endpoint ContainerID="64768cfde28b6138611a687f8b053d38d744ed122aa149a291af662d525e2956" Namespace="calico-apiserver" Pod="calico-apiserver-86b546bb5c-jpwk2" WorkloadEndpoint="ci--3510.3.7--n--6523ff94dd-k8s-calico--apiserver--86b546bb5c--jpwk2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--6523ff94dd-k8s-calico--apiserver--86b546bb5c--jpwk2-eth0", GenerateName:"calico-apiserver-86b546bb5c-", Namespace:"calico-apiserver", SelfLink:"", UID:"82f2f80c-103d-408f-831d-8869219e2fae", ResourceVersion:"926", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 48, 6, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"86b546bb5c", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-6523ff94dd", ContainerID:"", Pod:"calico-apiserver-86b546bb5c-jpwk2", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.38.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calicae6a0ef99d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:48:35.775359 env[1452]: 2025-05-17 00:48:35.730 [INFO][3986] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.38.194/32] ContainerID="64768cfde28b6138611a687f8b053d38d744ed122aa149a291af662d525e2956" Namespace="calico-apiserver" Pod="calico-apiserver-86b546bb5c-jpwk2" WorkloadEndpoint="ci--3510.3.7--n--6523ff94dd-k8s-calico--apiserver--86b546bb5c--jpwk2-eth0" May 17 00:48:35.775359 env[1452]: 2025-05-17 00:48:35.730 [INFO][3986] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calicae6a0ef99d ContainerID="64768cfde28b6138611a687f8b053d38d744ed122aa149a291af662d525e2956" Namespace="calico-apiserver" Pod="calico-apiserver-86b546bb5c-jpwk2" WorkloadEndpoint="ci--3510.3.7--n--6523ff94dd-k8s-calico--apiserver--86b546bb5c--jpwk2-eth0" May 17 00:48:35.775359 env[1452]: 2025-05-17 00:48:35.755 [INFO][3986] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="64768cfde28b6138611a687f8b053d38d744ed122aa149a291af662d525e2956" Namespace="calico-apiserver" Pod="calico-apiserver-86b546bb5c-jpwk2" WorkloadEndpoint="ci--3510.3.7--n--6523ff94dd-k8s-calico--apiserver--86b546bb5c--jpwk2-eth0" May 17 00:48:35.775424 env[1452]: 2025-05-17 00:48:35.759 [INFO][3986] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="64768cfde28b6138611a687f8b053d38d744ed122aa149a291af662d525e2956" Namespace="calico-apiserver" Pod="calico-apiserver-86b546bb5c-jpwk2" WorkloadEndpoint="ci--3510.3.7--n--6523ff94dd-k8s-calico--apiserver--86b546bb5c--jpwk2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--6523ff94dd-k8s-calico--apiserver--86b546bb5c--jpwk2-eth0", GenerateName:"calico-apiserver-86b546bb5c-", Namespace:"calico-apiserver", SelfLink:"", UID:"82f2f80c-103d-408f-831d-8869219e2fae", ResourceVersion:"926", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 48, 6, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"86b546bb5c", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-6523ff94dd", ContainerID:"64768cfde28b6138611a687f8b053d38d744ed122aa149a291af662d525e2956", Pod:"calico-apiserver-86b546bb5c-jpwk2", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.38.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calicae6a0ef99d", MAC:"42:70:d6:30:34:d6", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:48:35.775473 env[1452]: 2025-05-17 00:48:35.771 [INFO][3986] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="64768cfde28b6138611a687f8b053d38d744ed122aa149a291af662d525e2956" Namespace="calico-apiserver" Pod="calico-apiserver-86b546bb5c-jpwk2" WorkloadEndpoint="ci--3510.3.7--n--6523ff94dd-k8s-calico--apiserver--86b546bb5c--jpwk2-eth0" May 17 00:48:35.806805 env[1452]: time="2025-05-17T00:48:35.806715706Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:48:35.809963 env[1452]: time="2025-05-17T00:48:35.806845545Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:48:35.809963 env[1452]: time="2025-05-17T00:48:35.807934219Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:48:35.810277 env[1452]: time="2025-05-17T00:48:35.810241927Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/64768cfde28b6138611a687f8b053d38d744ed122aa149a291af662d525e2956 pid=4049 runtime=io.containerd.runc.v2 May 17 00:48:35.828606 systemd[1]: Started cri-containerd-64768cfde28b6138611a687f8b053d38d744ed122aa149a291af662d525e2956.scope. May 17 00:48:35.830020 env[1452]: time="2025-05-17T00:48:35.829976422Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:48:35.836438 env[1452]: time="2025-05-17T00:48:35.836380788Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:48:35.836769 kubelet[2511]: E0517 00:48:35.836729 2511 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:48:35.836839 kubelet[2511]: E0517 00:48:35.836778 2511 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:48:35.836970 kubelet[2511]: E0517 00:48:35.836909 2511 kuberuntime_manager.go:1274] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-98cxh,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-5c6b5ff985-qsbbb_calico-system(1034e955-0d22-4661-9e47-81fdd9a27aa3): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:48:35.838762 kubelet[2511]: E0517 00:48:35.838697 2511 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-5c6b5ff985-qsbbb" podUID="1034e955-0d22-4661-9e47-81fdd9a27aa3" May 17 00:48:35.852278 systemd-networkd[1609]: calidb2c5fa104b: Link UP May 17 00:48:35.860935 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calidb2c5fa104b: link becomes ready May 17 00:48:35.860697 systemd-networkd[1609]: calidb2c5fa104b: Gained carrier May 17 00:48:35.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.862000 audit: BPF prog-id=163 op=LOAD May 17 00:48:35.863000 audit[4058]: AVC avc: denied { bpf } for pid=4058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.863000 audit[4058]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4049 pid=4058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:35.863000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634373638636664653238623631333836313161363837663862303533 May 17 00:48:35.863000 audit[4058]: AVC avc: denied { perfmon } for pid=4058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.863000 audit[4058]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4049 pid=4058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:35.863000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634373638636664653238623631333836313161363837663862303533 May 17 00:48:35.864000 audit[4058]: AVC avc: denied { bpf } for pid=4058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.864000 audit[4058]: AVC avc: denied { bpf } for pid=4058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.864000 audit[4058]: AVC avc: denied { bpf } for pid=4058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.864000 audit[4058]: AVC avc: denied { perfmon } for pid=4058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.864000 audit[4058]: AVC avc: denied { perfmon } for pid=4058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.864000 audit[4058]: AVC avc: denied { perfmon } for pid=4058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.864000 audit[4058]: AVC avc: denied { perfmon } for pid=4058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.864000 audit[4058]: AVC avc: denied { perfmon } for pid=4058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.864000 audit[4058]: AVC avc: denied { bpf } for pid=4058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.864000 audit[4058]: AVC avc: denied { bpf } for pid=4058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.864000 audit: BPF prog-id=164 op=LOAD May 17 00:48:35.864000 audit[4058]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4049 pid=4058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:35.864000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634373638636664653238623631333836313161363837663862303533 May 17 00:48:35.864000 audit[4058]: AVC avc: denied { bpf } for pid=4058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.864000 audit[4058]: AVC avc: denied { bpf } for pid=4058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.864000 audit[4058]: AVC avc: denied { perfmon } for pid=4058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.864000 audit[4058]: AVC avc: denied { perfmon } for pid=4058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.864000 audit[4058]: AVC avc: denied { perfmon } for pid=4058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.864000 audit[4058]: AVC avc: denied { perfmon } for pid=4058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.864000 audit[4058]: AVC avc: denied { perfmon } for pid=4058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.864000 audit[4058]: AVC avc: denied { bpf } for pid=4058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.864000 audit[4058]: AVC avc: denied { bpf } for pid=4058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.864000 audit: BPF prog-id=165 op=LOAD May 17 00:48:35.864000 audit[4058]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4049 pid=4058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:35.864000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634373638636664653238623631333836313161363837663862303533 May 17 00:48:35.865000 audit: BPF prog-id=165 op=UNLOAD May 17 00:48:35.865000 audit: BPF prog-id=164 op=UNLOAD May 17 00:48:35.865000 audit[4058]: AVC avc: denied { bpf } for pid=4058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.865000 audit[4058]: AVC avc: denied { bpf } for pid=4058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.865000 audit[4058]: AVC avc: denied { bpf } for pid=4058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.865000 audit[4058]: AVC avc: denied { perfmon } for pid=4058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.865000 audit[4058]: AVC avc: denied { perfmon } for pid=4058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.865000 audit[4058]: AVC avc: denied { perfmon } for pid=4058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.865000 audit[4058]: AVC avc: denied { perfmon } for pid=4058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.865000 audit[4058]: AVC avc: denied { perfmon } for pid=4058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.865000 audit[4058]: AVC avc: denied { bpf } for pid=4058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.865000 audit[4058]: AVC avc: denied { bpf } for pid=4058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.865000 audit: BPF prog-id=166 op=LOAD May 17 00:48:35.865000 audit[4058]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4049 pid=4058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:35.865000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634373638636664653238623631333836313161363837663862303533 May 17 00:48:35.881272 env[1452]: 2025-05-17 00:48:35.675 [INFO][3997] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--6523ff94dd-k8s-calico--kube--controllers--6cdf59f477--fr7wb-eth0 calico-kube-controllers-6cdf59f477- calico-system e98971c7-2262-4242-8532-c18d59231219 925 0 2025-05-17 00:48:11 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:6cdf59f477 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510.3.7-n-6523ff94dd calico-kube-controllers-6cdf59f477-fr7wb eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] calidb2c5fa104b [] [] }} ContainerID="8925fd6e64a3dc4ec37266016fd876d1279e0907a71ce05ff983c83919308c9a" Namespace="calico-system" Pod="calico-kube-controllers-6cdf59f477-fr7wb" WorkloadEndpoint="ci--3510.3.7--n--6523ff94dd-k8s-calico--kube--controllers--6cdf59f477--fr7wb-" May 17 00:48:35.881272 env[1452]: 2025-05-17 00:48:35.675 [INFO][3997] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="8925fd6e64a3dc4ec37266016fd876d1279e0907a71ce05ff983c83919308c9a" Namespace="calico-system" Pod="calico-kube-controllers-6cdf59f477-fr7wb" WorkloadEndpoint="ci--3510.3.7--n--6523ff94dd-k8s-calico--kube--controllers--6cdf59f477--fr7wb-eth0" May 17 00:48:35.881272 env[1452]: 2025-05-17 00:48:35.767 [INFO][4017] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="8925fd6e64a3dc4ec37266016fd876d1279e0907a71ce05ff983c83919308c9a" HandleID="k8s-pod-network.8925fd6e64a3dc4ec37266016fd876d1279e0907a71ce05ff983c83919308c9a" Workload="ci--3510.3.7--n--6523ff94dd-k8s-calico--kube--controllers--6cdf59f477--fr7wb-eth0" May 17 00:48:35.881544 env[1452]: 2025-05-17 00:48:35.768 [INFO][4017] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="8925fd6e64a3dc4ec37266016fd876d1279e0907a71ce05ff983c83919308c9a" HandleID="k8s-pod-network.8925fd6e64a3dc4ec37266016fd876d1279e0907a71ce05ff983c83919308c9a" Workload="ci--3510.3.7--n--6523ff94dd-k8s-calico--kube--controllers--6cdf59f477--fr7wb-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40003ad200), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.7-n-6523ff94dd", "pod":"calico-kube-controllers-6cdf59f477-fr7wb", "timestamp":"2025-05-17 00:48:35.767818673 +0000 UTC"}, Hostname:"ci-3510.3.7-n-6523ff94dd", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:48:35.881544 env[1452]: 2025-05-17 00:48:35.768 [INFO][4017] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:48:35.881544 env[1452]: 2025-05-17 00:48:35.768 [INFO][4017] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:48:35.881544 env[1452]: 2025-05-17 00:48:35.768 [INFO][4017] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-6523ff94dd' May 17 00:48:35.881544 env[1452]: 2025-05-17 00:48:35.794 [INFO][4017] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.8925fd6e64a3dc4ec37266016fd876d1279e0907a71ce05ff983c83919308c9a" host="ci-3510.3.7-n-6523ff94dd" May 17 00:48:35.881544 env[1452]: 2025-05-17 00:48:35.799 [INFO][4017] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.7-n-6523ff94dd" May 17 00:48:35.881544 env[1452]: 2025-05-17 00:48:35.803 [INFO][4017] ipam/ipam.go 511: Trying affinity for 192.168.38.192/26 host="ci-3510.3.7-n-6523ff94dd" May 17 00:48:35.881544 env[1452]: 2025-05-17 00:48:35.806 [INFO][4017] ipam/ipam.go 158: Attempting to load block cidr=192.168.38.192/26 host="ci-3510.3.7-n-6523ff94dd" May 17 00:48:35.881544 env[1452]: 2025-05-17 00:48:35.815 [INFO][4017] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.38.192/26 host="ci-3510.3.7-n-6523ff94dd" May 17 00:48:35.881777 env[1452]: 2025-05-17 00:48:35.815 [INFO][4017] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.38.192/26 handle="k8s-pod-network.8925fd6e64a3dc4ec37266016fd876d1279e0907a71ce05ff983c83919308c9a" host="ci-3510.3.7-n-6523ff94dd" May 17 00:48:35.881777 env[1452]: 2025-05-17 00:48:35.817 [INFO][4017] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.8925fd6e64a3dc4ec37266016fd876d1279e0907a71ce05ff983c83919308c9a May 17 00:48:35.881777 env[1452]: 2025-05-17 00:48:35.822 [INFO][4017] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.38.192/26 handle="k8s-pod-network.8925fd6e64a3dc4ec37266016fd876d1279e0907a71ce05ff983c83919308c9a" host="ci-3510.3.7-n-6523ff94dd" May 17 00:48:35.881777 env[1452]: 2025-05-17 00:48:35.834 [INFO][4017] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.38.195/26] block=192.168.38.192/26 handle="k8s-pod-network.8925fd6e64a3dc4ec37266016fd876d1279e0907a71ce05ff983c83919308c9a" host="ci-3510.3.7-n-6523ff94dd" May 17 00:48:35.881777 env[1452]: 2025-05-17 00:48:35.834 [INFO][4017] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.38.195/26] handle="k8s-pod-network.8925fd6e64a3dc4ec37266016fd876d1279e0907a71ce05ff983c83919308c9a" host="ci-3510.3.7-n-6523ff94dd" May 17 00:48:35.881777 env[1452]: 2025-05-17 00:48:35.834 [INFO][4017] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:48:35.881777 env[1452]: 2025-05-17 00:48:35.834 [INFO][4017] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.38.195/26] IPv6=[] ContainerID="8925fd6e64a3dc4ec37266016fd876d1279e0907a71ce05ff983c83919308c9a" HandleID="k8s-pod-network.8925fd6e64a3dc4ec37266016fd876d1279e0907a71ce05ff983c83919308c9a" Workload="ci--3510.3.7--n--6523ff94dd-k8s-calico--kube--controllers--6cdf59f477--fr7wb-eth0" May 17 00:48:35.881944 env[1452]: 2025-05-17 00:48:35.837 [INFO][3997] cni-plugin/k8s.go 418: Populated endpoint ContainerID="8925fd6e64a3dc4ec37266016fd876d1279e0907a71ce05ff983c83919308c9a" Namespace="calico-system" Pod="calico-kube-controllers-6cdf59f477-fr7wb" WorkloadEndpoint="ci--3510.3.7--n--6523ff94dd-k8s-calico--kube--controllers--6cdf59f477--fr7wb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--6523ff94dd-k8s-calico--kube--controllers--6cdf59f477--fr7wb-eth0", GenerateName:"calico-kube-controllers-6cdf59f477-", Namespace:"calico-system", SelfLink:"", UID:"e98971c7-2262-4242-8532-c18d59231219", ResourceVersion:"925", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 48, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6cdf59f477", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-6523ff94dd", ContainerID:"", Pod:"calico-kube-controllers-6cdf59f477-fr7wb", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.38.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calidb2c5fa104b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:48:35.881998 env[1452]: 2025-05-17 00:48:35.837 [INFO][3997] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.38.195/32] ContainerID="8925fd6e64a3dc4ec37266016fd876d1279e0907a71ce05ff983c83919308c9a" Namespace="calico-system" Pod="calico-kube-controllers-6cdf59f477-fr7wb" WorkloadEndpoint="ci--3510.3.7--n--6523ff94dd-k8s-calico--kube--controllers--6cdf59f477--fr7wb-eth0" May 17 00:48:35.881998 env[1452]: 2025-05-17 00:48:35.837 [INFO][3997] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calidb2c5fa104b ContainerID="8925fd6e64a3dc4ec37266016fd876d1279e0907a71ce05ff983c83919308c9a" Namespace="calico-system" Pod="calico-kube-controllers-6cdf59f477-fr7wb" WorkloadEndpoint="ci--3510.3.7--n--6523ff94dd-k8s-calico--kube--controllers--6cdf59f477--fr7wb-eth0" May 17 00:48:35.881998 env[1452]: 2025-05-17 00:48:35.862 [INFO][3997] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="8925fd6e64a3dc4ec37266016fd876d1279e0907a71ce05ff983c83919308c9a" Namespace="calico-system" Pod="calico-kube-controllers-6cdf59f477-fr7wb" WorkloadEndpoint="ci--3510.3.7--n--6523ff94dd-k8s-calico--kube--controllers--6cdf59f477--fr7wb-eth0" May 17 00:48:35.882064 env[1452]: 2025-05-17 00:48:35.864 [INFO][3997] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="8925fd6e64a3dc4ec37266016fd876d1279e0907a71ce05ff983c83919308c9a" Namespace="calico-system" Pod="calico-kube-controllers-6cdf59f477-fr7wb" WorkloadEndpoint="ci--3510.3.7--n--6523ff94dd-k8s-calico--kube--controllers--6cdf59f477--fr7wb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--6523ff94dd-k8s-calico--kube--controllers--6cdf59f477--fr7wb-eth0", GenerateName:"calico-kube-controllers-6cdf59f477-", Namespace:"calico-system", SelfLink:"", UID:"e98971c7-2262-4242-8532-c18d59231219", ResourceVersion:"925", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 48, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6cdf59f477", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-6523ff94dd", ContainerID:"8925fd6e64a3dc4ec37266016fd876d1279e0907a71ce05ff983c83919308c9a", Pod:"calico-kube-controllers-6cdf59f477-fr7wb", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.38.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calidb2c5fa104b", MAC:"be:db:47:98:af:51", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:48:35.882116 env[1452]: 2025-05-17 00:48:35.879 [INFO][3997] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="8925fd6e64a3dc4ec37266016fd876d1279e0907a71ce05ff983c83919308c9a" Namespace="calico-system" Pod="calico-kube-controllers-6cdf59f477-fr7wb" WorkloadEndpoint="ci--3510.3.7--n--6523ff94dd-k8s-calico--kube--controllers--6cdf59f477--fr7wb-eth0" May 17 00:48:35.899350 env[1452]: time="2025-05-17T00:48:35.899295573Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-86b546bb5c-jpwk2,Uid:82f2f80c-103d-408f-831d-8869219e2fae,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"64768cfde28b6138611a687f8b053d38d744ed122aa149a291af662d525e2956\"" May 17 00:48:35.903884 env[1452]: time="2025-05-17T00:48:35.903828669Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\"" May 17 00:48:35.921087 kubelet[2511]: E0517 00:48:35.920838 2511 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\"\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\"\"]" pod="calico-system/whisker-5c6b5ff985-qsbbb" podUID="1034e955-0d22-4661-9e47-81fdd9a27aa3" May 17 00:48:35.925949 env[1452]: time="2025-05-17T00:48:35.925882111Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:48:35.926142 env[1452]: time="2025-05-17T00:48:35.926118670Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:48:35.926250 env[1452]: time="2025-05-17T00:48:35.926227949Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:48:35.926489 env[1452]: time="2025-05-17T00:48:35.926459348Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8925fd6e64a3dc4ec37266016fd876d1279e0907a71ce05ff983c83919308c9a pid=4103 runtime=io.containerd.runc.v2 May 17 00:48:35.954880 systemd[1]: Started cri-containerd-8925fd6e64a3dc4ec37266016fd876d1279e0907a71ce05ff983c83919308c9a.scope. May 17 00:48:35.965000 audit[4133]: NETFILTER_CFG table=filter:106 family=2 entries=20 op=nft_register_rule pid=4133 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:48:35.965000 audit[4133]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=7480 a0=3 a1=ffffc3a0c800 a2=0 a3=1 items=0 ppid=2658 pid=4133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:35.965000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:48:35.969000 audit[4133]: NETFILTER_CFG table=nat:107 family=2 entries=14 op=nft_register_rule pid=4133 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:48:35.969000 audit[4133]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3468 a0=3 a1=ffffc3a0c800 a2=0 a3=1 items=0 ppid=2658 pid=4133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:35.969000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:48:35.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.974000 audit: BPF prog-id=167 op=LOAD May 17 00:48:35.974000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.974000 audit[4116]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4103 pid=4116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:35.974000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839323566643665363461336463346563333732363630313666643837 May 17 00:48:35.974000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.974000 audit[4116]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4103 pid=4116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:35.974000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839323566643665363461336463346563333732363630313666643837 May 17 00:48:35.974000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.974000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.974000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.974000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.974000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.974000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.974000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.974000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.974000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.974000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.974000 audit: BPF prog-id=168 op=LOAD May 17 00:48:35.974000 audit[4116]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4103 pid=4116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:35.974000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839323566643665363461336463346563333732363630313666643837 May 17 00:48:35.975000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.975000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.975000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.975000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.975000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.975000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.975000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.975000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.975000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.975000 audit: BPF prog-id=169 op=LOAD May 17 00:48:35.975000 audit[4116]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4103 pid=4116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:35.975000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839323566643665363461336463346563333732363630313666643837 May 17 00:48:35.975000 audit: BPF prog-id=169 op=UNLOAD May 17 00:48:35.975000 audit: BPF prog-id=168 op=UNLOAD May 17 00:48:35.975000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.975000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.975000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.975000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.975000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.975000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.975000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.975000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.975000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.975000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:35.975000 audit: BPF prog-id=170 op=LOAD May 17 00:48:35.975000 audit[4116]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4103 pid=4116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:35.975000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839323566643665363461336463346563333732363630313666643837 May 17 00:48:35.981000 audit[4139]: NETFILTER_CFG table=mangle:108 family=2 entries=16 op=nft_register_chain pid=4139 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:48:35.981000 audit[4139]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=ffffd6f03360 a2=0 a3=ffffa530ffa8 items=0 ppid=3751 pid=4139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:35.981000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:48:36.001131 env[1452]: time="2025-05-17T00:48:36.001078911Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6cdf59f477-fr7wb,Uid:e98971c7-2262-4242-8532-c18d59231219,Namespace:calico-system,Attempt:1,} returns sandbox id \"8925fd6e64a3dc4ec37266016fd876d1279e0907a71ce05ff983c83919308c9a\"" May 17 00:48:36.037000 audit[4137]: NETFILTER_CFG table=raw:109 family=2 entries=21 op=nft_register_chain pid=4137 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:48:36.037000 audit[4137]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8452 a0=3 a1=ffffea7c2d70 a2=0 a3=ffff97685fa8 items=0 ppid=3751 pid=4137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:36.037000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:48:36.048000 audit[4138]: NETFILTER_CFG table=nat:110 family=2 entries=15 op=nft_register_chain pid=4138 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:48:36.048000 audit[4138]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=ffffe57660c0 a2=0 a3=ffff9e56afa8 items=0 ppid=3751 pid=4138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:36.048000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:48:36.050000 audit[4141]: NETFILTER_CFG table=filter:111 family=2 entries=94 op=nft_register_chain pid=4141 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:48:36.050000 audit[4141]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=53116 a0=3 a1=ffffc1e256d0 a2=0 a3=ffffa7b00fa8 items=0 ppid=3751 pid=4141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:36.050000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:48:36.127000 audit[4158]: NETFILTER_CFG table=filter:112 family=2 entries=84 op=nft_register_chain pid=4158 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:48:36.127000 audit[4158]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=47736 a0=3 a1=fffffd58b520 a2=0 a3=ffff8000ffa8 items=0 ppid=3751 pid=4158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:36.127000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:48:36.148040 systemd-networkd[1609]: calic1f2e7d9995: Gained IPv6LL May 17 00:48:36.720192 env[1452]: time="2025-05-17T00:48:36.720149385Z" level=info msg="StopPodSandbox for \"7d9b2695c89cace7b088158899257805f4aea18a8ebb6524ddaf08908fb5e1fe\"" May 17 00:48:36.721227 env[1452]: time="2025-05-17T00:48:36.721197099Z" level=info msg="StopPodSandbox for \"9712dac8e71cec13cad3378b92a933b51563f4bbcc4dfb040aa59ed700ab5798\"" May 17 00:48:36.721558 env[1452]: time="2025-05-17T00:48:36.721016380Z" level=info msg="StopPodSandbox for \"6187f80c6b1af2e633e0e670cc928a5e6ea0345fcde66621998a6df50bd22af1\"" May 17 00:48:36.882710 env[1452]: 2025-05-17 00:48:36.801 [INFO][4192] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="9712dac8e71cec13cad3378b92a933b51563f4bbcc4dfb040aa59ed700ab5798" May 17 00:48:36.882710 env[1452]: 2025-05-17 00:48:36.801 [INFO][4192] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="9712dac8e71cec13cad3378b92a933b51563f4bbcc4dfb040aa59ed700ab5798" iface="eth0" netns="/var/run/netns/cni-a42a751e-36c7-3135-1f0a-3dc02f4c3460" May 17 00:48:36.882710 env[1452]: 2025-05-17 00:48:36.801 [INFO][4192] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="9712dac8e71cec13cad3378b92a933b51563f4bbcc4dfb040aa59ed700ab5798" iface="eth0" netns="/var/run/netns/cni-a42a751e-36c7-3135-1f0a-3dc02f4c3460" May 17 00:48:36.882710 env[1452]: 2025-05-17 00:48:36.802 [INFO][4192] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="9712dac8e71cec13cad3378b92a933b51563f4bbcc4dfb040aa59ed700ab5798" iface="eth0" netns="/var/run/netns/cni-a42a751e-36c7-3135-1f0a-3dc02f4c3460" May 17 00:48:36.882710 env[1452]: 2025-05-17 00:48:36.802 [INFO][4192] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="9712dac8e71cec13cad3378b92a933b51563f4bbcc4dfb040aa59ed700ab5798" May 17 00:48:36.882710 env[1452]: 2025-05-17 00:48:36.802 [INFO][4192] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9712dac8e71cec13cad3378b92a933b51563f4bbcc4dfb040aa59ed700ab5798" May 17 00:48:36.882710 env[1452]: 2025-05-17 00:48:36.849 [INFO][4210] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9712dac8e71cec13cad3378b92a933b51563f4bbcc4dfb040aa59ed700ab5798" HandleID="k8s-pod-network.9712dac8e71cec13cad3378b92a933b51563f4bbcc4dfb040aa59ed700ab5798" Workload="ci--3510.3.7--n--6523ff94dd-k8s-coredns--7c65d6cfc9--9bbtw-eth0" May 17 00:48:36.882710 env[1452]: 2025-05-17 00:48:36.850 [INFO][4210] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:48:36.882710 env[1452]: 2025-05-17 00:48:36.850 [INFO][4210] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:48:36.883098 env[1452]: 2025-05-17 00:48:36.873 [WARNING][4210] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9712dac8e71cec13cad3378b92a933b51563f4bbcc4dfb040aa59ed700ab5798" HandleID="k8s-pod-network.9712dac8e71cec13cad3378b92a933b51563f4bbcc4dfb040aa59ed700ab5798" Workload="ci--3510.3.7--n--6523ff94dd-k8s-coredns--7c65d6cfc9--9bbtw-eth0" May 17 00:48:36.883098 env[1452]: 2025-05-17 00:48:36.874 [INFO][4210] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9712dac8e71cec13cad3378b92a933b51563f4bbcc4dfb040aa59ed700ab5798" HandleID="k8s-pod-network.9712dac8e71cec13cad3378b92a933b51563f4bbcc4dfb040aa59ed700ab5798" Workload="ci--3510.3.7--n--6523ff94dd-k8s-coredns--7c65d6cfc9--9bbtw-eth0" May 17 00:48:36.883098 env[1452]: 2025-05-17 00:48:36.875 [INFO][4210] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:48:36.883098 env[1452]: 2025-05-17 00:48:36.877 [INFO][4192] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="9712dac8e71cec13cad3378b92a933b51563f4bbcc4dfb040aa59ed700ab5798" May 17 00:48:36.885794 systemd[1]: run-netns-cni\x2da42a751e\x2d36c7\x2d3135\x2d1f0a\x2d3dc02f4c3460.mount: Deactivated successfully. May 17 00:48:36.887716 env[1452]: time="2025-05-17T00:48:36.887146790Z" level=info msg="TearDown network for sandbox \"9712dac8e71cec13cad3378b92a933b51563f4bbcc4dfb040aa59ed700ab5798\" successfully" May 17 00:48:36.887716 env[1452]: time="2025-05-17T00:48:36.887215990Z" level=info msg="StopPodSandbox for \"9712dac8e71cec13cad3378b92a933b51563f4bbcc4dfb040aa59ed700ab5798\" returns successfully" May 17 00:48:36.889137 env[1452]: time="2025-05-17T00:48:36.888718262Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-9bbtw,Uid:6fb16588-55b1-4adf-9d05-4d2e2212101f,Namespace:kube-system,Attempt:1,}" May 17 00:48:36.897714 env[1452]: 2025-05-17 00:48:36.806 [INFO][4193] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="7d9b2695c89cace7b088158899257805f4aea18a8ebb6524ddaf08908fb5e1fe" May 17 00:48:36.897714 env[1452]: 2025-05-17 00:48:36.806 [INFO][4193] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="7d9b2695c89cace7b088158899257805f4aea18a8ebb6524ddaf08908fb5e1fe" iface="eth0" netns="/var/run/netns/cni-a56a4ddb-28fa-8c2a-9e18-0c6742f0930c" May 17 00:48:36.897714 env[1452]: 2025-05-17 00:48:36.806 [INFO][4193] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="7d9b2695c89cace7b088158899257805f4aea18a8ebb6524ddaf08908fb5e1fe" iface="eth0" netns="/var/run/netns/cni-a56a4ddb-28fa-8c2a-9e18-0c6742f0930c" May 17 00:48:36.897714 env[1452]: 2025-05-17 00:48:36.808 [INFO][4193] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="7d9b2695c89cace7b088158899257805f4aea18a8ebb6524ddaf08908fb5e1fe" iface="eth0" netns="/var/run/netns/cni-a56a4ddb-28fa-8c2a-9e18-0c6742f0930c" May 17 00:48:36.897714 env[1452]: 2025-05-17 00:48:36.808 [INFO][4193] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="7d9b2695c89cace7b088158899257805f4aea18a8ebb6524ddaf08908fb5e1fe" May 17 00:48:36.897714 env[1452]: 2025-05-17 00:48:36.808 [INFO][4193] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7d9b2695c89cace7b088158899257805f4aea18a8ebb6524ddaf08908fb5e1fe" May 17 00:48:36.897714 env[1452]: 2025-05-17 00:48:36.856 [INFO][4215] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7d9b2695c89cace7b088158899257805f4aea18a8ebb6524ddaf08908fb5e1fe" HandleID="k8s-pod-network.7d9b2695c89cace7b088158899257805f4aea18a8ebb6524ddaf08908fb5e1fe" Workload="ci--3510.3.7--n--6523ff94dd-k8s-calico--apiserver--86b546bb5c--f9pmr-eth0" May 17 00:48:36.897714 env[1452]: 2025-05-17 00:48:36.857 [INFO][4215] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:48:36.897714 env[1452]: 2025-05-17 00:48:36.875 [INFO][4215] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:48:36.898018 env[1452]: 2025-05-17 00:48:36.888 [WARNING][4215] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7d9b2695c89cace7b088158899257805f4aea18a8ebb6524ddaf08908fb5e1fe" HandleID="k8s-pod-network.7d9b2695c89cace7b088158899257805f4aea18a8ebb6524ddaf08908fb5e1fe" Workload="ci--3510.3.7--n--6523ff94dd-k8s-calico--apiserver--86b546bb5c--f9pmr-eth0" May 17 00:48:36.898018 env[1452]: 2025-05-17 00:48:36.888 [INFO][4215] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7d9b2695c89cace7b088158899257805f4aea18a8ebb6524ddaf08908fb5e1fe" HandleID="k8s-pod-network.7d9b2695c89cace7b088158899257805f4aea18a8ebb6524ddaf08908fb5e1fe" Workload="ci--3510.3.7--n--6523ff94dd-k8s-calico--apiserver--86b546bb5c--f9pmr-eth0" May 17 00:48:36.898018 env[1452]: 2025-05-17 00:48:36.890 [INFO][4215] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:48:36.898018 env[1452]: 2025-05-17 00:48:36.892 [INFO][4193] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="7d9b2695c89cace7b088158899257805f4aea18a8ebb6524ddaf08908fb5e1fe" May 17 00:48:36.900459 systemd[1]: run-netns-cni\x2da56a4ddb\x2d28fa\x2d8c2a\x2d9e18\x2d0c6742f0930c.mount: Deactivated successfully. May 17 00:48:36.901416 env[1452]: time="2025-05-17T00:48:36.901377556Z" level=info msg="TearDown network for sandbox \"7d9b2695c89cace7b088158899257805f4aea18a8ebb6524ddaf08908fb5e1fe\" successfully" May 17 00:48:36.901515 env[1452]: time="2025-05-17T00:48:36.901495515Z" level=info msg="StopPodSandbox for \"7d9b2695c89cace7b088158899257805f4aea18a8ebb6524ddaf08908fb5e1fe\" returns successfully" May 17 00:48:36.902378 env[1452]: time="2025-05-17T00:48:36.902339511Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-86b546bb5c-f9pmr,Uid:7629aa25-d93a-483f-b781-91e28432ed09,Namespace:calico-apiserver,Attempt:1,}" May 17 00:48:36.910109 env[1452]: 2025-05-17 00:48:36.825 [INFO][4191] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="6187f80c6b1af2e633e0e670cc928a5e6ea0345fcde66621998a6df50bd22af1" May 17 00:48:36.910109 env[1452]: 2025-05-17 00:48:36.825 [INFO][4191] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="6187f80c6b1af2e633e0e670cc928a5e6ea0345fcde66621998a6df50bd22af1" iface="eth0" netns="/var/run/netns/cni-532ed517-ad3e-c8fb-98df-b99d8cfd0a34" May 17 00:48:36.910109 env[1452]: 2025-05-17 00:48:36.825 [INFO][4191] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="6187f80c6b1af2e633e0e670cc928a5e6ea0345fcde66621998a6df50bd22af1" iface="eth0" netns="/var/run/netns/cni-532ed517-ad3e-c8fb-98df-b99d8cfd0a34" May 17 00:48:36.910109 env[1452]: 2025-05-17 00:48:36.825 [INFO][4191] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="6187f80c6b1af2e633e0e670cc928a5e6ea0345fcde66621998a6df50bd22af1" iface="eth0" netns="/var/run/netns/cni-532ed517-ad3e-c8fb-98df-b99d8cfd0a34" May 17 00:48:36.910109 env[1452]: 2025-05-17 00:48:36.826 [INFO][4191] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="6187f80c6b1af2e633e0e670cc928a5e6ea0345fcde66621998a6df50bd22af1" May 17 00:48:36.910109 env[1452]: 2025-05-17 00:48:36.826 [INFO][4191] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6187f80c6b1af2e633e0e670cc928a5e6ea0345fcde66621998a6df50bd22af1" May 17 00:48:36.910109 env[1452]: 2025-05-17 00:48:36.879 [INFO][4221] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6187f80c6b1af2e633e0e670cc928a5e6ea0345fcde66621998a6df50bd22af1" HandleID="k8s-pod-network.6187f80c6b1af2e633e0e670cc928a5e6ea0345fcde66621998a6df50bd22af1" Workload="ci--3510.3.7--n--6523ff94dd-k8s-csi--node--driver--mqsn2-eth0" May 17 00:48:36.910109 env[1452]: 2025-05-17 00:48:36.879 [INFO][4221] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:48:36.910109 env[1452]: 2025-05-17 00:48:36.891 [INFO][4221] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:48:36.910897 env[1452]: 2025-05-17 00:48:36.904 [WARNING][4221] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6187f80c6b1af2e633e0e670cc928a5e6ea0345fcde66621998a6df50bd22af1" HandleID="k8s-pod-network.6187f80c6b1af2e633e0e670cc928a5e6ea0345fcde66621998a6df50bd22af1" Workload="ci--3510.3.7--n--6523ff94dd-k8s-csi--node--driver--mqsn2-eth0" May 17 00:48:36.910897 env[1452]: 2025-05-17 00:48:36.904 [INFO][4221] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6187f80c6b1af2e633e0e670cc928a5e6ea0345fcde66621998a6df50bd22af1" HandleID="k8s-pod-network.6187f80c6b1af2e633e0e670cc928a5e6ea0345fcde66621998a6df50bd22af1" Workload="ci--3510.3.7--n--6523ff94dd-k8s-csi--node--driver--mqsn2-eth0" May 17 00:48:36.910897 env[1452]: 2025-05-17 00:48:36.906 [INFO][4221] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:48:36.910897 env[1452]: 2025-05-17 00:48:36.908 [INFO][4191] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="6187f80c6b1af2e633e0e670cc928a5e6ea0345fcde66621998a6df50bd22af1" May 17 00:48:36.913875 systemd[1]: run-netns-cni\x2d532ed517\x2dad3e\x2dc8fb\x2d98df\x2db99d8cfd0a34.mount: Deactivated successfully. May 17 00:48:36.915394 env[1452]: time="2025-05-17T00:48:36.915343802Z" level=info msg="TearDown network for sandbox \"6187f80c6b1af2e633e0e670cc928a5e6ea0345fcde66621998a6df50bd22af1\" successfully" May 17 00:48:36.915491 env[1452]: time="2025-05-17T00:48:36.915473802Z" level=info msg="StopPodSandbox for \"6187f80c6b1af2e633e0e670cc928a5e6ea0345fcde66621998a6df50bd22af1\" returns successfully" May 17 00:48:36.916255 systemd-networkd[1609]: calicae6a0ef99d: Gained IPv6LL May 17 00:48:36.917045 env[1452]: time="2025-05-17T00:48:36.916409917Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-mqsn2,Uid:ca23fe46-c12b-49ed-aa7e-a638ad594bbf,Namespace:calico-system,Attempt:1,}" May 17 00:48:36.924727 kubelet[2511]: E0517 00:48:36.924695 2511 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\"\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\"\"]" pod="calico-system/whisker-5c6b5ff985-qsbbb" podUID="1034e955-0d22-4661-9e47-81fdd9a27aa3" May 17 00:48:37.173533 systemd-networkd[1609]: vxlan.calico: Gained IPv6LL May 17 00:48:37.260380 systemd-networkd[1609]: cali72210455a87: Link UP May 17 00:48:37.280105 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:48:37.280220 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali72210455a87: link becomes ready May 17 00:48:37.282241 systemd-networkd[1609]: cali72210455a87: Gained carrier May 17 00:48:37.296802 env[1452]: 2025-05-17 00:48:37.142 [INFO][4230] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--6523ff94dd-k8s-coredns--7c65d6cfc9--9bbtw-eth0 coredns-7c65d6cfc9- kube-system 6fb16588-55b1-4adf-9d05-4d2e2212101f 954 0 2025-05-17 00:47:55 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7c65d6cfc9 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.7-n-6523ff94dd coredns-7c65d6cfc9-9bbtw eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali72210455a87 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] [] }} ContainerID="f06c5f78e775b60fe2efa48f0057c045e9152b9dbe46bb8c5baa0dbda5df3d3d" Namespace="kube-system" Pod="coredns-7c65d6cfc9-9bbtw" WorkloadEndpoint="ci--3510.3.7--n--6523ff94dd-k8s-coredns--7c65d6cfc9--9bbtw-" May 17 00:48:37.296802 env[1452]: 2025-05-17 00:48:37.143 [INFO][4230] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="f06c5f78e775b60fe2efa48f0057c045e9152b9dbe46bb8c5baa0dbda5df3d3d" Namespace="kube-system" Pod="coredns-7c65d6cfc9-9bbtw" WorkloadEndpoint="ci--3510.3.7--n--6523ff94dd-k8s-coredns--7c65d6cfc9--9bbtw-eth0" May 17 00:48:37.296802 env[1452]: 2025-05-17 00:48:37.198 [INFO][4251] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f06c5f78e775b60fe2efa48f0057c045e9152b9dbe46bb8c5baa0dbda5df3d3d" HandleID="k8s-pod-network.f06c5f78e775b60fe2efa48f0057c045e9152b9dbe46bb8c5baa0dbda5df3d3d" Workload="ci--3510.3.7--n--6523ff94dd-k8s-coredns--7c65d6cfc9--9bbtw-eth0" May 17 00:48:37.297061 env[1452]: 2025-05-17 00:48:37.198 [INFO][4251] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="f06c5f78e775b60fe2efa48f0057c045e9152b9dbe46bb8c5baa0dbda5df3d3d" HandleID="k8s-pod-network.f06c5f78e775b60fe2efa48f0057c045e9152b9dbe46bb8c5baa0dbda5df3d3d" Workload="ci--3510.3.7--n--6523ff94dd-k8s-coredns--7c65d6cfc9--9bbtw-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002cf030), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.7-n-6523ff94dd", "pod":"coredns-7c65d6cfc9-9bbtw", "timestamp":"2025-05-17 00:48:37.198645855 +0000 UTC"}, Hostname:"ci-3510.3.7-n-6523ff94dd", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:48:37.297061 env[1452]: 2025-05-17 00:48:37.199 [INFO][4251] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:48:37.297061 env[1452]: 2025-05-17 00:48:37.199 [INFO][4251] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:48:37.297061 env[1452]: 2025-05-17 00:48:37.199 [INFO][4251] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-6523ff94dd' May 17 00:48:37.297061 env[1452]: 2025-05-17 00:48:37.210 [INFO][4251] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.f06c5f78e775b60fe2efa48f0057c045e9152b9dbe46bb8c5baa0dbda5df3d3d" host="ci-3510.3.7-n-6523ff94dd" May 17 00:48:37.297061 env[1452]: 2025-05-17 00:48:37.220 [INFO][4251] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.7-n-6523ff94dd" May 17 00:48:37.297061 env[1452]: 2025-05-17 00:48:37.226 [INFO][4251] ipam/ipam.go 511: Trying affinity for 192.168.38.192/26 host="ci-3510.3.7-n-6523ff94dd" May 17 00:48:37.297061 env[1452]: 2025-05-17 00:48:37.228 [INFO][4251] ipam/ipam.go 158: Attempting to load block cidr=192.168.38.192/26 host="ci-3510.3.7-n-6523ff94dd" May 17 00:48:37.297061 env[1452]: 2025-05-17 00:48:37.230 [INFO][4251] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.38.192/26 host="ci-3510.3.7-n-6523ff94dd" May 17 00:48:37.297267 env[1452]: 2025-05-17 00:48:37.230 [INFO][4251] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.38.192/26 handle="k8s-pod-network.f06c5f78e775b60fe2efa48f0057c045e9152b9dbe46bb8c5baa0dbda5df3d3d" host="ci-3510.3.7-n-6523ff94dd" May 17 00:48:37.297267 env[1452]: 2025-05-17 00:48:37.232 [INFO][4251] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.f06c5f78e775b60fe2efa48f0057c045e9152b9dbe46bb8c5baa0dbda5df3d3d May 17 00:48:37.297267 env[1452]: 2025-05-17 00:48:37.238 [INFO][4251] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.38.192/26 handle="k8s-pod-network.f06c5f78e775b60fe2efa48f0057c045e9152b9dbe46bb8c5baa0dbda5df3d3d" host="ci-3510.3.7-n-6523ff94dd" May 17 00:48:37.297267 env[1452]: 2025-05-17 00:48:37.252 [INFO][4251] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.38.196/26] block=192.168.38.192/26 handle="k8s-pod-network.f06c5f78e775b60fe2efa48f0057c045e9152b9dbe46bb8c5baa0dbda5df3d3d" host="ci-3510.3.7-n-6523ff94dd" May 17 00:48:37.297267 env[1452]: 2025-05-17 00:48:37.252 [INFO][4251] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.38.196/26] handle="k8s-pod-network.f06c5f78e775b60fe2efa48f0057c045e9152b9dbe46bb8c5baa0dbda5df3d3d" host="ci-3510.3.7-n-6523ff94dd" May 17 00:48:37.297267 env[1452]: 2025-05-17 00:48:37.252 [INFO][4251] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:48:37.297267 env[1452]: 2025-05-17 00:48:37.252 [INFO][4251] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.38.196/26] IPv6=[] ContainerID="f06c5f78e775b60fe2efa48f0057c045e9152b9dbe46bb8c5baa0dbda5df3d3d" HandleID="k8s-pod-network.f06c5f78e775b60fe2efa48f0057c045e9152b9dbe46bb8c5baa0dbda5df3d3d" Workload="ci--3510.3.7--n--6523ff94dd-k8s-coredns--7c65d6cfc9--9bbtw-eth0" May 17 00:48:37.297418 env[1452]: 2025-05-17 00:48:37.253 [INFO][4230] cni-plugin/k8s.go 418: Populated endpoint ContainerID="f06c5f78e775b60fe2efa48f0057c045e9152b9dbe46bb8c5baa0dbda5df3d3d" Namespace="kube-system" Pod="coredns-7c65d6cfc9-9bbtw" WorkloadEndpoint="ci--3510.3.7--n--6523ff94dd-k8s-coredns--7c65d6cfc9--9bbtw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--6523ff94dd-k8s-coredns--7c65d6cfc9--9bbtw-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"6fb16588-55b1-4adf-9d05-4d2e2212101f", ResourceVersion:"954", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 47, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-6523ff94dd", ContainerID:"", Pod:"coredns-7c65d6cfc9-9bbtw", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.38.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali72210455a87", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:48:37.297418 env[1452]: 2025-05-17 00:48:37.254 [INFO][4230] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.38.196/32] ContainerID="f06c5f78e775b60fe2efa48f0057c045e9152b9dbe46bb8c5baa0dbda5df3d3d" Namespace="kube-system" Pod="coredns-7c65d6cfc9-9bbtw" WorkloadEndpoint="ci--3510.3.7--n--6523ff94dd-k8s-coredns--7c65d6cfc9--9bbtw-eth0" May 17 00:48:37.297418 env[1452]: 2025-05-17 00:48:37.254 [INFO][4230] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali72210455a87 ContainerID="f06c5f78e775b60fe2efa48f0057c045e9152b9dbe46bb8c5baa0dbda5df3d3d" Namespace="kube-system" Pod="coredns-7c65d6cfc9-9bbtw" WorkloadEndpoint="ci--3510.3.7--n--6523ff94dd-k8s-coredns--7c65d6cfc9--9bbtw-eth0" May 17 00:48:37.297418 env[1452]: 2025-05-17 00:48:37.283 [INFO][4230] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="f06c5f78e775b60fe2efa48f0057c045e9152b9dbe46bb8c5baa0dbda5df3d3d" Namespace="kube-system" Pod="coredns-7c65d6cfc9-9bbtw" WorkloadEndpoint="ci--3510.3.7--n--6523ff94dd-k8s-coredns--7c65d6cfc9--9bbtw-eth0" May 17 00:48:37.297418 env[1452]: 2025-05-17 00:48:37.284 [INFO][4230] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="f06c5f78e775b60fe2efa48f0057c045e9152b9dbe46bb8c5baa0dbda5df3d3d" Namespace="kube-system" Pod="coredns-7c65d6cfc9-9bbtw" WorkloadEndpoint="ci--3510.3.7--n--6523ff94dd-k8s-coredns--7c65d6cfc9--9bbtw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--6523ff94dd-k8s-coredns--7c65d6cfc9--9bbtw-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"6fb16588-55b1-4adf-9d05-4d2e2212101f", ResourceVersion:"954", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 47, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-6523ff94dd", ContainerID:"f06c5f78e775b60fe2efa48f0057c045e9152b9dbe46bb8c5baa0dbda5df3d3d", Pod:"coredns-7c65d6cfc9-9bbtw", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.38.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali72210455a87", MAC:"9e:61:5d:ce:27:86", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:48:37.297418 env[1452]: 2025-05-17 00:48:37.295 [INFO][4230] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="f06c5f78e775b60fe2efa48f0057c045e9152b9dbe46bb8c5baa0dbda5df3d3d" Namespace="kube-system" Pod="coredns-7c65d6cfc9-9bbtw" WorkloadEndpoint="ci--3510.3.7--n--6523ff94dd-k8s-coredns--7c65d6cfc9--9bbtw-eth0" May 17 00:48:37.316330 env[1452]: time="2025-05-17T00:48:37.315596772Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:48:37.316330 env[1452]: time="2025-05-17T00:48:37.315655732Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:48:37.316330 env[1452]: time="2025-05-17T00:48:37.315666772Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:48:37.316330 env[1452]: time="2025-05-17T00:48:37.315802291Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f06c5f78e775b60fe2efa48f0057c045e9152b9dbe46bb8c5baa0dbda5df3d3d pid=4306 runtime=io.containerd.runc.v2 May 17 00:48:37.334058 systemd[1]: Started cri-containerd-f06c5f78e775b60fe2efa48f0057c045e9152b9dbe46bb8c5baa0dbda5df3d3d.scope. May 17 00:48:37.345944 systemd[1]: run-containerd-runc-k8s.io-f06c5f78e775b60fe2efa48f0057c045e9152b9dbe46bb8c5baa0dbda5df3d3d-runc.ZtvoHs.mount: Deactivated successfully. May 17 00:48:37.367889 kernel: kauditd_printk_skb: 728 callbacks suppressed May 17 00:48:37.368022 kernel: audit: type=1325 audit(1747442917.349:1147): table=filter:113 family=2 entries=46 op=nft_register_chain pid=4328 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:48:37.349000 audit[4328]: NETFILTER_CFG table=filter:113 family=2 entries=46 op=nft_register_chain pid=4328 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:48:37.364095 systemd-networkd[1609]: calidb2c5fa104b: Gained IPv6LL May 17 00:48:37.349000 audit[4328]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=23724 a0=3 a1=fffff8b89420 a2=0 a3=ffff83f93fa8 items=0 ppid=3751 pid=4328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.402472 kernel: audit: type=1300 audit(1747442917.349:1147): arch=c00000b7 syscall=211 success=yes exit=23724 a0=3 a1=fffff8b89420 a2=0 a3=ffff83f93fa8 items=0 ppid=3751 pid=4328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.349000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:48:37.419981 kernel: audit: type=1327 audit(1747442917.349:1147): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:48:37.440679 kernel: audit: type=1400 audit(1747442917.421:1148): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.440885 kernel: audit: type=1400 audit(1747442917.421:1149): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.476714 kernel: audit: type=1400 audit(1747442917.421:1150): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.480330 systemd-networkd[1609]: cali910798fd005: Link UP May 17 00:48:37.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.504746 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali910798fd005: link becomes ready May 17 00:48:37.504852 kernel: audit: type=1400 audit(1747442917.421:1151): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.505116 systemd-networkd[1609]: cali910798fd005: Gained carrier May 17 00:48:37.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.535476 kernel: audit: type=1400 audit(1747442917.421:1152): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.561313 kernel: audit: type=1400 audit(1747442917.421:1153): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.566088 env[1452]: 2025-05-17 00:48:37.193 [INFO][4243] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--6523ff94dd-k8s-calico--apiserver--86b546bb5c--f9pmr-eth0 calico-apiserver-86b546bb5c- calico-apiserver 7629aa25-d93a-483f-b781-91e28432ed09 955 0 2025-05-17 00:48:06 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:86b546bb5c projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.7-n-6523ff94dd calico-apiserver-86b546bb5c-f9pmr eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali910798fd005 [] [] }} ContainerID="45c8a9cd9085e31d07f45cbaf34e304420f5d4d2755c96bcc4ae2e21e9693cd8" Namespace="calico-apiserver" Pod="calico-apiserver-86b546bb5c-f9pmr" WorkloadEndpoint="ci--3510.3.7--n--6523ff94dd-k8s-calico--apiserver--86b546bb5c--f9pmr-" May 17 00:48:37.566088 env[1452]: 2025-05-17 00:48:37.193 [INFO][4243] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="45c8a9cd9085e31d07f45cbaf34e304420f5d4d2755c96bcc4ae2e21e9693cd8" Namespace="calico-apiserver" Pod="calico-apiserver-86b546bb5c-f9pmr" WorkloadEndpoint="ci--3510.3.7--n--6523ff94dd-k8s-calico--apiserver--86b546bb5c--f9pmr-eth0" May 17 00:48:37.566088 env[1452]: 2025-05-17 00:48:37.258 [INFO][4275] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="45c8a9cd9085e31d07f45cbaf34e304420f5d4d2755c96bcc4ae2e21e9693cd8" HandleID="k8s-pod-network.45c8a9cd9085e31d07f45cbaf34e304420f5d4d2755c96bcc4ae2e21e9693cd8" Workload="ci--3510.3.7--n--6523ff94dd-k8s-calico--apiserver--86b546bb5c--f9pmr-eth0" May 17 00:48:37.566088 env[1452]: 2025-05-17 00:48:37.259 [INFO][4275] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="45c8a9cd9085e31d07f45cbaf34e304420f5d4d2755c96bcc4ae2e21e9693cd8" HandleID="k8s-pod-network.45c8a9cd9085e31d07f45cbaf34e304420f5d4d2755c96bcc4ae2e21e9693cd8" Workload="ci--3510.3.7--n--6523ff94dd-k8s-calico--apiserver--86b546bb5c--f9pmr-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002d7630), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.7-n-6523ff94dd", "pod":"calico-apiserver-86b546bb5c-f9pmr", "timestamp":"2025-05-17 00:48:37.258793825 +0000 UTC"}, Hostname:"ci-3510.3.7-n-6523ff94dd", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:48:37.566088 env[1452]: 2025-05-17 00:48:37.259 [INFO][4275] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:48:37.566088 env[1452]: 2025-05-17 00:48:37.259 [INFO][4275] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:48:37.566088 env[1452]: 2025-05-17 00:48:37.259 [INFO][4275] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-6523ff94dd' May 17 00:48:37.566088 env[1452]: 2025-05-17 00:48:37.311 [INFO][4275] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.45c8a9cd9085e31d07f45cbaf34e304420f5d4d2755c96bcc4ae2e21e9693cd8" host="ci-3510.3.7-n-6523ff94dd" May 17 00:48:37.566088 env[1452]: 2025-05-17 00:48:37.322 [INFO][4275] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.7-n-6523ff94dd" May 17 00:48:37.566088 env[1452]: 2025-05-17 00:48:37.328 [INFO][4275] ipam/ipam.go 511: Trying affinity for 192.168.38.192/26 host="ci-3510.3.7-n-6523ff94dd" May 17 00:48:37.566088 env[1452]: 2025-05-17 00:48:37.331 [INFO][4275] ipam/ipam.go 158: Attempting to load block cidr=192.168.38.192/26 host="ci-3510.3.7-n-6523ff94dd" May 17 00:48:37.566088 env[1452]: 2025-05-17 00:48:37.347 [INFO][4275] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.38.192/26 host="ci-3510.3.7-n-6523ff94dd" May 17 00:48:37.566088 env[1452]: 2025-05-17 00:48:37.347 [INFO][4275] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.38.192/26 handle="k8s-pod-network.45c8a9cd9085e31d07f45cbaf34e304420f5d4d2755c96bcc4ae2e21e9693cd8" host="ci-3510.3.7-n-6523ff94dd" May 17 00:48:37.566088 env[1452]: 2025-05-17 00:48:37.355 [INFO][4275] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.45c8a9cd9085e31d07f45cbaf34e304420f5d4d2755c96bcc4ae2e21e9693cd8 May 17 00:48:37.566088 env[1452]: 2025-05-17 00:48:37.403 [INFO][4275] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.38.192/26 handle="k8s-pod-network.45c8a9cd9085e31d07f45cbaf34e304420f5d4d2755c96bcc4ae2e21e9693cd8" host="ci-3510.3.7-n-6523ff94dd" May 17 00:48:37.566088 env[1452]: 2025-05-17 00:48:37.459 [INFO][4275] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.38.197/26] block=192.168.38.192/26 handle="k8s-pod-network.45c8a9cd9085e31d07f45cbaf34e304420f5d4d2755c96bcc4ae2e21e9693cd8" host="ci-3510.3.7-n-6523ff94dd" May 17 00:48:37.566088 env[1452]: 2025-05-17 00:48:37.459 [INFO][4275] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.38.197/26] handle="k8s-pod-network.45c8a9cd9085e31d07f45cbaf34e304420f5d4d2755c96bcc4ae2e21e9693cd8" host="ci-3510.3.7-n-6523ff94dd" May 17 00:48:37.566088 env[1452]: 2025-05-17 00:48:37.459 [INFO][4275] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:48:37.566088 env[1452]: 2025-05-17 00:48:37.459 [INFO][4275] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.38.197/26] IPv6=[] ContainerID="45c8a9cd9085e31d07f45cbaf34e304420f5d4d2755c96bcc4ae2e21e9693cd8" HandleID="k8s-pod-network.45c8a9cd9085e31d07f45cbaf34e304420f5d4d2755c96bcc4ae2e21e9693cd8" Workload="ci--3510.3.7--n--6523ff94dd-k8s-calico--apiserver--86b546bb5c--f9pmr-eth0" May 17 00:48:37.566653 env[1452]: 2025-05-17 00:48:37.478 [INFO][4243] cni-plugin/k8s.go 418: Populated endpoint ContainerID="45c8a9cd9085e31d07f45cbaf34e304420f5d4d2755c96bcc4ae2e21e9693cd8" Namespace="calico-apiserver" Pod="calico-apiserver-86b546bb5c-f9pmr" WorkloadEndpoint="ci--3510.3.7--n--6523ff94dd-k8s-calico--apiserver--86b546bb5c--f9pmr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--6523ff94dd-k8s-calico--apiserver--86b546bb5c--f9pmr-eth0", GenerateName:"calico-apiserver-86b546bb5c-", Namespace:"calico-apiserver", SelfLink:"", UID:"7629aa25-d93a-483f-b781-91e28432ed09", ResourceVersion:"955", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 48, 6, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"86b546bb5c", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-6523ff94dd", ContainerID:"", Pod:"calico-apiserver-86b546bb5c-f9pmr", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.38.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali910798fd005", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:48:37.566653 env[1452]: 2025-05-17 00:48:37.478 [INFO][4243] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.38.197/32] ContainerID="45c8a9cd9085e31d07f45cbaf34e304420f5d4d2755c96bcc4ae2e21e9693cd8" Namespace="calico-apiserver" Pod="calico-apiserver-86b546bb5c-f9pmr" WorkloadEndpoint="ci--3510.3.7--n--6523ff94dd-k8s-calico--apiserver--86b546bb5c--f9pmr-eth0" May 17 00:48:37.566653 env[1452]: 2025-05-17 00:48:37.478 [INFO][4243] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali910798fd005 ContainerID="45c8a9cd9085e31d07f45cbaf34e304420f5d4d2755c96bcc4ae2e21e9693cd8" Namespace="calico-apiserver" Pod="calico-apiserver-86b546bb5c-f9pmr" WorkloadEndpoint="ci--3510.3.7--n--6523ff94dd-k8s-calico--apiserver--86b546bb5c--f9pmr-eth0" May 17 00:48:37.566653 env[1452]: 2025-05-17 00:48:37.513 [INFO][4243] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="45c8a9cd9085e31d07f45cbaf34e304420f5d4d2755c96bcc4ae2e21e9693cd8" Namespace="calico-apiserver" Pod="calico-apiserver-86b546bb5c-f9pmr" WorkloadEndpoint="ci--3510.3.7--n--6523ff94dd-k8s-calico--apiserver--86b546bb5c--f9pmr-eth0" May 17 00:48:37.566653 env[1452]: 2025-05-17 00:48:37.514 [INFO][4243] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="45c8a9cd9085e31d07f45cbaf34e304420f5d4d2755c96bcc4ae2e21e9693cd8" Namespace="calico-apiserver" Pod="calico-apiserver-86b546bb5c-f9pmr" WorkloadEndpoint="ci--3510.3.7--n--6523ff94dd-k8s-calico--apiserver--86b546bb5c--f9pmr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--6523ff94dd-k8s-calico--apiserver--86b546bb5c--f9pmr-eth0", GenerateName:"calico-apiserver-86b546bb5c-", Namespace:"calico-apiserver", SelfLink:"", UID:"7629aa25-d93a-483f-b781-91e28432ed09", ResourceVersion:"955", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 48, 6, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"86b546bb5c", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-6523ff94dd", ContainerID:"45c8a9cd9085e31d07f45cbaf34e304420f5d4d2755c96bcc4ae2e21e9693cd8", Pod:"calico-apiserver-86b546bb5c-f9pmr", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.38.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali910798fd005", MAC:"ea:55:94:6f:5b:84", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:48:37.566653 env[1452]: 2025-05-17 00:48:37.541 [INFO][4243] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="45c8a9cd9085e31d07f45cbaf34e304420f5d4d2755c96bcc4ae2e21e9693cd8" Namespace="calico-apiserver" Pod="calico-apiserver-86b546bb5c-f9pmr" WorkloadEndpoint="ci--3510.3.7--n--6523ff94dd-k8s-calico--apiserver--86b546bb5c--f9pmr-eth0" May 17 00:48:37.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.585793 kernel: audit: type=1400 audit(1747442917.421:1154): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.443000 audit: BPF prog-id=171 op=LOAD May 17 00:48:37.459000 audit[4317]: AVC avc: denied { bpf } for pid=4317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.459000 audit[4317]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4306 pid=4317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.459000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630366335663738653737356236306665326566613438663030353763 May 17 00:48:37.459000 audit[4317]: AVC avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.459000 audit[4317]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4306 pid=4317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.459000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630366335663738653737356236306665326566613438663030353763 May 17 00:48:37.460000 audit[4317]: AVC avc: denied { bpf } for pid=4317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.460000 audit[4317]: AVC avc: denied { bpf } for pid=4317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.460000 audit[4317]: AVC avc: denied { bpf } for pid=4317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.460000 audit[4317]: AVC avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.460000 audit[4317]: AVC avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.460000 audit[4317]: AVC avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.460000 audit[4317]: AVC avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.460000 audit[4317]: AVC avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.460000 audit[4317]: AVC avc: denied { bpf } for pid=4317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.460000 audit[4317]: AVC avc: denied { bpf } for pid=4317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.460000 audit: BPF prog-id=172 op=LOAD May 17 00:48:37.460000 audit[4317]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4306 pid=4317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.460000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630366335663738653737356236306665326566613438663030353763 May 17 00:48:37.476000 audit[4317]: AVC avc: denied { bpf } for pid=4317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.476000 audit[4317]: AVC avc: denied { bpf } for pid=4317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.476000 audit[4317]: AVC avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.476000 audit[4317]: AVC avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.476000 audit[4317]: AVC avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.476000 audit[4317]: AVC avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.476000 audit[4317]: AVC avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.476000 audit[4317]: AVC avc: denied { bpf } for pid=4317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.476000 audit[4317]: AVC avc: denied { bpf } for pid=4317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.476000 audit: BPF prog-id=173 op=LOAD May 17 00:48:37.476000 audit[4317]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4306 pid=4317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.476000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630366335663738653737356236306665326566613438663030353763 May 17 00:48:37.476000 audit: BPF prog-id=173 op=UNLOAD May 17 00:48:37.587970 env[1452]: time="2025-05-17T00:48:37.587251132Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-9bbtw,Uid:6fb16588-55b1-4adf-9d05-4d2e2212101f,Namespace:kube-system,Attempt:1,} returns sandbox id \"f06c5f78e775b60fe2efa48f0057c045e9152b9dbe46bb8c5baa0dbda5df3d3d\"" May 17 00:48:37.476000 audit: BPF prog-id=172 op=UNLOAD May 17 00:48:37.476000 audit[4317]: AVC avc: denied { bpf } for pid=4317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.476000 audit[4317]: AVC avc: denied { bpf } for pid=4317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.476000 audit[4317]: AVC avc: denied { bpf } for pid=4317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.476000 audit[4317]: AVC avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.476000 audit[4317]: AVC avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.476000 audit[4317]: AVC avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.476000 audit[4317]: AVC avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.476000 audit[4317]: AVC avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.476000 audit[4317]: AVC avc: denied { bpf } for pid=4317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.476000 audit[4317]: AVC avc: denied { bpf } for pid=4317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.476000 audit: BPF prog-id=174 op=LOAD May 17 00:48:37.476000 audit[4317]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4306 pid=4317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.476000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630366335663738653737356236306665326566613438663030353763 May 17 00:48:37.561000 audit[4341]: NETFILTER_CFG table=filter:114 family=2 entries=45 op=nft_register_chain pid=4341 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:48:37.561000 audit[4341]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=24248 a0=3 a1=ffffd77e8ed0 a2=0 a3=ffff96c4bfa8 items=0 ppid=3751 pid=4341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.561000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:48:37.595478 env[1452]: time="2025-05-17T00:48:37.594787734Z" level=info msg="CreateContainer within sandbox \"f06c5f78e775b60fe2efa48f0057c045e9152b9dbe46bb8c5baa0dbda5df3d3d\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 17 00:48:37.607921 env[1452]: time="2025-05-17T00:48:37.607832746Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:48:37.608191 env[1452]: time="2025-05-17T00:48:37.608096265Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:48:37.608312 env[1452]: time="2025-05-17T00:48:37.608287744Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:48:37.608576 env[1452]: time="2025-05-17T00:48:37.608532783Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/45c8a9cd9085e31d07f45cbaf34e304420f5d4d2755c96bcc4ae2e21e9693cd8 pid=4359 runtime=io.containerd.runc.v2 May 17 00:48:37.636615 systemd[1]: Started cri-containerd-45c8a9cd9085e31d07f45cbaf34e304420f5d4d2755c96bcc4ae2e21e9693cd8.scope. May 17 00:48:37.658102 systemd-networkd[1609]: cali405cf323ce2: Link UP May 17 00:48:37.669109 systemd-networkd[1609]: cali405cf323ce2: Gained carrier May 17 00:48:37.669993 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali405cf323ce2: link becomes ready May 17 00:48:37.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.681000 audit: BPF prog-id=175 op=LOAD May 17 00:48:37.683404 env[1452]: time="2025-05-17T00:48:37.682571361Z" level=info msg="CreateContainer within sandbox \"f06c5f78e775b60fe2efa48f0057c045e9152b9dbe46bb8c5baa0dbda5df3d3d\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"752e858208c508d9c208f5f55eadb3f5180cbb1b529d822ee643f346762a7217\"" May 17 00:48:37.683823 env[1452]: time="2025-05-17T00:48:37.683792955Z" level=info msg="StartContainer for \"752e858208c508d9c208f5f55eadb3f5180cbb1b529d822ee643f346762a7217\"" May 17 00:48:37.682000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.682000 audit[4370]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4359 pid=4370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.682000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435633861396364393038356533316430376634356362616633346533 May 17 00:48:37.682000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.682000 audit[4370]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4359 pid=4370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.682000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435633861396364393038356533316430376634356362616633346533 May 17 00:48:37.683000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.683000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.683000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.683000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.683000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.683000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.683000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.683000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.683000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.683000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.683000 audit: BPF prog-id=176 op=LOAD May 17 00:48:37.683000 audit[4370]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4359 pid=4370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.683000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435633861396364393038356533316430376634356362616633346533 May 17 00:48:37.683000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.683000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.683000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.683000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.683000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.683000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.683000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.683000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.683000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.683000 audit: BPF prog-id=177 op=LOAD May 17 00:48:37.683000 audit[4370]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4359 pid=4370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.683000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435633861396364393038356533316430376634356362616633346533 May 17 00:48:37.683000 audit: BPF prog-id=177 op=UNLOAD May 17 00:48:37.683000 audit: BPF prog-id=176 op=UNLOAD May 17 00:48:37.683000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.683000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.683000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.683000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.683000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.683000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.683000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.683000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.683000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.683000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.683000 audit: BPF prog-id=178 op=LOAD May 17 00:48:37.683000 audit[4370]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4359 pid=4370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.683000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435633861396364393038356533316430376634356362616633346533 May 17 00:48:37.695201 env[1452]: 2025-05-17 00:48:37.226 [INFO][4257] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--6523ff94dd-k8s-csi--node--driver--mqsn2-eth0 csi-node-driver- calico-system ca23fe46-c12b-49ed-aa7e-a638ad594bbf 956 0 2025-05-17 00:48:10 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:68bf44dd5 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s ci-3510.3.7-n-6523ff94dd csi-node-driver-mqsn2 eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali405cf323ce2 [] [] }} ContainerID="4e365bb20e73cc0c965632b0c053ad24a604d474456376a6ab88d66dc05a83c9" Namespace="calico-system" Pod="csi-node-driver-mqsn2" WorkloadEndpoint="ci--3510.3.7--n--6523ff94dd-k8s-csi--node--driver--mqsn2-" May 17 00:48:37.695201 env[1452]: 2025-05-17 00:48:37.226 [INFO][4257] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="4e365bb20e73cc0c965632b0c053ad24a604d474456376a6ab88d66dc05a83c9" Namespace="calico-system" Pod="csi-node-driver-mqsn2" WorkloadEndpoint="ci--3510.3.7--n--6523ff94dd-k8s-csi--node--driver--mqsn2-eth0" May 17 00:48:37.695201 env[1452]: 2025-05-17 00:48:37.288 [INFO][4282] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="4e365bb20e73cc0c965632b0c053ad24a604d474456376a6ab88d66dc05a83c9" HandleID="k8s-pod-network.4e365bb20e73cc0c965632b0c053ad24a604d474456376a6ab88d66dc05a83c9" Workload="ci--3510.3.7--n--6523ff94dd-k8s-csi--node--driver--mqsn2-eth0" May 17 00:48:37.695201 env[1452]: 2025-05-17 00:48:37.288 [INFO][4282] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="4e365bb20e73cc0c965632b0c053ad24a604d474456376a6ab88d66dc05a83c9" HandleID="k8s-pod-network.4e365bb20e73cc0c965632b0c053ad24a604d474456376a6ab88d66dc05a83c9" Workload="ci--3510.3.7--n--6523ff94dd-k8s-csi--node--driver--mqsn2-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002a9bd0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.7-n-6523ff94dd", "pod":"csi-node-driver-mqsn2", "timestamp":"2025-05-17 00:48:37.288709511 +0000 UTC"}, Hostname:"ci-3510.3.7-n-6523ff94dd", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:48:37.695201 env[1452]: 2025-05-17 00:48:37.289 [INFO][4282] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:48:37.695201 env[1452]: 2025-05-17 00:48:37.477 [INFO][4282] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:48:37.695201 env[1452]: 2025-05-17 00:48:37.477 [INFO][4282] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-6523ff94dd' May 17 00:48:37.695201 env[1452]: 2025-05-17 00:48:37.586 [INFO][4282] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.4e365bb20e73cc0c965632b0c053ad24a604d474456376a6ab88d66dc05a83c9" host="ci-3510.3.7-n-6523ff94dd" May 17 00:48:37.695201 env[1452]: 2025-05-17 00:48:37.594 [INFO][4282] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.7-n-6523ff94dd" May 17 00:48:37.695201 env[1452]: 2025-05-17 00:48:37.600 [INFO][4282] ipam/ipam.go 511: Trying affinity for 192.168.38.192/26 host="ci-3510.3.7-n-6523ff94dd" May 17 00:48:37.695201 env[1452]: 2025-05-17 00:48:37.603 [INFO][4282] ipam/ipam.go 158: Attempting to load block cidr=192.168.38.192/26 host="ci-3510.3.7-n-6523ff94dd" May 17 00:48:37.695201 env[1452]: 2025-05-17 00:48:37.613 [INFO][4282] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.38.192/26 host="ci-3510.3.7-n-6523ff94dd" May 17 00:48:37.695201 env[1452]: 2025-05-17 00:48:37.613 [INFO][4282] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.38.192/26 handle="k8s-pod-network.4e365bb20e73cc0c965632b0c053ad24a604d474456376a6ab88d66dc05a83c9" host="ci-3510.3.7-n-6523ff94dd" May 17 00:48:37.695201 env[1452]: 2025-05-17 00:48:37.615 [INFO][4282] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.4e365bb20e73cc0c965632b0c053ad24a604d474456376a6ab88d66dc05a83c9 May 17 00:48:37.695201 env[1452]: 2025-05-17 00:48:37.623 [INFO][4282] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.38.192/26 handle="k8s-pod-network.4e365bb20e73cc0c965632b0c053ad24a604d474456376a6ab88d66dc05a83c9" host="ci-3510.3.7-n-6523ff94dd" May 17 00:48:37.695201 env[1452]: 2025-05-17 00:48:37.642 [INFO][4282] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.38.198/26] block=192.168.38.192/26 handle="k8s-pod-network.4e365bb20e73cc0c965632b0c053ad24a604d474456376a6ab88d66dc05a83c9" host="ci-3510.3.7-n-6523ff94dd" May 17 00:48:37.695201 env[1452]: 2025-05-17 00:48:37.642 [INFO][4282] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.38.198/26] handle="k8s-pod-network.4e365bb20e73cc0c965632b0c053ad24a604d474456376a6ab88d66dc05a83c9" host="ci-3510.3.7-n-6523ff94dd" May 17 00:48:37.695201 env[1452]: 2025-05-17 00:48:37.642 [INFO][4282] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:48:37.695201 env[1452]: 2025-05-17 00:48:37.642 [INFO][4282] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.38.198/26] IPv6=[] ContainerID="4e365bb20e73cc0c965632b0c053ad24a604d474456376a6ab88d66dc05a83c9" HandleID="k8s-pod-network.4e365bb20e73cc0c965632b0c053ad24a604d474456376a6ab88d66dc05a83c9" Workload="ci--3510.3.7--n--6523ff94dd-k8s-csi--node--driver--mqsn2-eth0" May 17 00:48:37.695780 env[1452]: 2025-05-17 00:48:37.644 [INFO][4257] cni-plugin/k8s.go 418: Populated endpoint ContainerID="4e365bb20e73cc0c965632b0c053ad24a604d474456376a6ab88d66dc05a83c9" Namespace="calico-system" Pod="csi-node-driver-mqsn2" WorkloadEndpoint="ci--3510.3.7--n--6523ff94dd-k8s-csi--node--driver--mqsn2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--6523ff94dd-k8s-csi--node--driver--mqsn2-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ca23fe46-c12b-49ed-aa7e-a638ad594bbf", ResourceVersion:"956", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 48, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"68bf44dd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-6523ff94dd", ContainerID:"", Pod:"csi-node-driver-mqsn2", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.38.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali405cf323ce2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:48:37.695780 env[1452]: 2025-05-17 00:48:37.644 [INFO][4257] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.38.198/32] ContainerID="4e365bb20e73cc0c965632b0c053ad24a604d474456376a6ab88d66dc05a83c9" Namespace="calico-system" Pod="csi-node-driver-mqsn2" WorkloadEndpoint="ci--3510.3.7--n--6523ff94dd-k8s-csi--node--driver--mqsn2-eth0" May 17 00:48:37.695780 env[1452]: 2025-05-17 00:48:37.644 [INFO][4257] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali405cf323ce2 ContainerID="4e365bb20e73cc0c965632b0c053ad24a604d474456376a6ab88d66dc05a83c9" Namespace="calico-system" Pod="csi-node-driver-mqsn2" WorkloadEndpoint="ci--3510.3.7--n--6523ff94dd-k8s-csi--node--driver--mqsn2-eth0" May 17 00:48:37.695780 env[1452]: 2025-05-17 00:48:37.656 [INFO][4257] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="4e365bb20e73cc0c965632b0c053ad24a604d474456376a6ab88d66dc05a83c9" Namespace="calico-system" Pod="csi-node-driver-mqsn2" WorkloadEndpoint="ci--3510.3.7--n--6523ff94dd-k8s-csi--node--driver--mqsn2-eth0" May 17 00:48:37.695780 env[1452]: 2025-05-17 00:48:37.669 [INFO][4257] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="4e365bb20e73cc0c965632b0c053ad24a604d474456376a6ab88d66dc05a83c9" Namespace="calico-system" Pod="csi-node-driver-mqsn2" WorkloadEndpoint="ci--3510.3.7--n--6523ff94dd-k8s-csi--node--driver--mqsn2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--6523ff94dd-k8s-csi--node--driver--mqsn2-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ca23fe46-c12b-49ed-aa7e-a638ad594bbf", ResourceVersion:"956", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 48, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"68bf44dd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-6523ff94dd", ContainerID:"4e365bb20e73cc0c965632b0c053ad24a604d474456376a6ab88d66dc05a83c9", Pod:"csi-node-driver-mqsn2", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.38.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali405cf323ce2", MAC:"8e:3b:1d:88:b8:7f", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:48:37.695780 env[1452]: 2025-05-17 00:48:37.691 [INFO][4257] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="4e365bb20e73cc0c965632b0c053ad24a604d474456376a6ab88d66dc05a83c9" Namespace="calico-system" Pod="csi-node-driver-mqsn2" WorkloadEndpoint="ci--3510.3.7--n--6523ff94dd-k8s-csi--node--driver--mqsn2-eth0" May 17 00:48:37.715053 systemd[1]: Started cri-containerd-752e858208c508d9c208f5f55eadb3f5180cbb1b529d822ee643f346762a7217.scope. May 17 00:48:37.720062 env[1452]: time="2025-05-17T00:48:37.720013048Z" level=info msg="StopPodSandbox for \"89662f2be62f79066c314f694f3a1cd60e7d20a67c1c3bdbbb11635180c5037a\"" May 17 00:48:37.732428 env[1452]: time="2025-05-17T00:48:37.732332585Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:48:37.732428 env[1452]: time="2025-05-17T00:48:37.732379784Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:48:37.734064 env[1452]: time="2025-05-17T00:48:37.732390584Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:48:37.734064 env[1452]: time="2025-05-17T00:48:37.733288780Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4e365bb20e73cc0c965632b0c053ad24a604d474456376a6ab88d66dc05a83c9 pid=4423 runtime=io.containerd.runc.v2 May 17 00:48:37.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.740000 audit: BPF prog-id=179 op=LOAD May 17 00:48:37.741000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.741000 audit[4397]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000117b38 a2=10 a3=0 items=0 ppid=4306 pid=4397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.741000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735326538353832303863353038643963323038663566353565616462 May 17 00:48:37.741000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.741000 audit[4397]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001175a0 a2=3c a3=0 items=0 ppid=4306 pid=4397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.741000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735326538353832303863353038643963323038663566353565616462 May 17 00:48:37.741000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.741000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.741000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.741000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.741000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.741000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.741000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.741000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.741000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.741000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.741000 audit: BPF prog-id=180 op=LOAD May 17 00:48:37.741000 audit[4397]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001178e0 a2=78 a3=0 items=0 ppid=4306 pid=4397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.741000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735326538353832303863353038643963323038663566353565616462 May 17 00:48:37.741000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.741000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.741000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.741000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.741000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.741000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.741000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.741000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.741000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.741000 audit: BPF prog-id=181 op=LOAD May 17 00:48:37.741000 audit[4397]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000117670 a2=78 a3=0 items=0 ppid=4306 pid=4397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.741000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735326538353832303863353038643963323038663566353565616462 May 17 00:48:37.741000 audit: BPF prog-id=181 op=UNLOAD May 17 00:48:37.741000 audit: BPF prog-id=180 op=UNLOAD May 17 00:48:37.741000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.741000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.741000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.741000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.741000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.741000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.741000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.741000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.741000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.741000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.741000 audit: BPF prog-id=182 op=LOAD May 17 00:48:37.741000 audit[4397]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000117b40 a2=78 a3=0 items=0 ppid=4306 pid=4397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.741000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735326538353832303863353038643963323038663566353565616462 May 17 00:48:37.784208 systemd[1]: Started cri-containerd-4e365bb20e73cc0c965632b0c053ad24a604d474456376a6ab88d66dc05a83c9.scope. May 17 00:48:37.786000 audit[4459]: NETFILTER_CFG table=filter:115 family=2 entries=48 op=nft_register_chain pid=4459 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:48:37.786000 audit[4459]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=23124 a0=3 a1=ffffc512bc40 a2=0 a3=ffffb3a6cfa8 items=0 ppid=3751 pid=4459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.786000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:48:37.807281 env[1452]: time="2025-05-17T00:48:37.807192239Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-86b546bb5c-f9pmr,Uid:7629aa25-d93a-483f-b781-91e28432ed09,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"45c8a9cd9085e31d07f45cbaf34e304420f5d4d2755c96bcc4ae2e21e9693cd8\"" May 17 00:48:37.814063 env[1452]: time="2025-05-17T00:48:37.813655166Z" level=info msg="StartContainer for \"752e858208c508d9c208f5f55eadb3f5180cbb1b529d822ee643f346762a7217\" returns successfully" May 17 00:48:37.828000 audit[4422]: AVC avc: denied { getattr } for pid=4422 comm="coredns" path="cgroup:[4026532669]" dev="nsfs" ino=4026532669 scontext=system_u:system_r:svirt_lxc_net_t:s0:c787,c821 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 May 17 00:48:37.828000 audit[4422]: SYSCALL arch=c00000b7 syscall=79 success=no exit=-13 a0=ffffffffffffff9c a1=40000566f0 a2=400014c578 a3=0 items=0 ppid=4306 pid=4422 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c787,c821 key=(null) May 17 00:48:37.828000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 May 17 00:48:37.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.867000 audit: BPF prog-id=183 op=LOAD May 17 00:48:37.867000 audit[4444]: AVC avc: denied { bpf } for pid=4444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.867000 audit[4444]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=4423 pid=4444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.867000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465333635626232306537336363306339363536333262306330353361 May 17 00:48:37.868000 audit[4444]: AVC avc: denied { perfmon } for pid=4444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.868000 audit[4444]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=4423 pid=4444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.868000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465333635626232306537336363306339363536333262306330353361 May 17 00:48:37.868000 audit[4444]: AVC avc: denied { bpf } for pid=4444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.868000 audit[4444]: AVC avc: denied { bpf } for pid=4444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.868000 audit[4444]: AVC avc: denied { bpf } for pid=4444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.868000 audit[4444]: AVC avc: denied { perfmon } for pid=4444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.868000 audit[4444]: AVC avc: denied { perfmon } for pid=4444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.868000 audit[4444]: AVC avc: denied { perfmon } for pid=4444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.868000 audit[4444]: AVC avc: denied { perfmon } for pid=4444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.868000 audit[4444]: AVC avc: denied { perfmon } for pid=4444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.868000 audit[4444]: AVC avc: denied { bpf } for pid=4444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.868000 audit[4444]: AVC avc: denied { bpf } for pid=4444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.868000 audit: BPF prog-id=184 op=LOAD May 17 00:48:37.868000 audit[4444]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=4423 pid=4444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.868000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465333635626232306537336363306339363536333262306330353361 May 17 00:48:37.868000 audit[4444]: AVC avc: denied { bpf } for pid=4444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.868000 audit[4444]: AVC avc: denied { bpf } for pid=4444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.868000 audit[4444]: AVC avc: denied { perfmon } for pid=4444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.868000 audit[4444]: AVC avc: denied { perfmon } for pid=4444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.868000 audit[4444]: AVC avc: denied { perfmon } for pid=4444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.868000 audit[4444]: AVC avc: denied { perfmon } for pid=4444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.868000 audit[4444]: AVC avc: denied { perfmon } for pid=4444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.868000 audit[4444]: AVC avc: denied { bpf } for pid=4444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.868000 audit[4444]: AVC avc: denied { bpf } for pid=4444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.868000 audit: BPF prog-id=185 op=LOAD May 17 00:48:37.868000 audit[4444]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=4423 pid=4444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.868000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465333635626232306537336363306339363536333262306330353361 May 17 00:48:37.868000 audit: BPF prog-id=185 op=UNLOAD May 17 00:48:37.868000 audit: BPF prog-id=184 op=UNLOAD May 17 00:48:37.868000 audit[4444]: AVC avc: denied { bpf } for pid=4444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.868000 audit[4444]: AVC avc: denied { bpf } for pid=4444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.868000 audit[4444]: AVC avc: denied { bpf } for pid=4444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.868000 audit[4444]: AVC avc: denied { perfmon } for pid=4444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.868000 audit[4444]: AVC avc: denied { perfmon } for pid=4444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.868000 audit[4444]: AVC avc: denied { perfmon } for pid=4444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.868000 audit[4444]: AVC avc: denied { perfmon } for pid=4444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.868000 audit[4444]: AVC avc: denied { perfmon } for pid=4444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.868000 audit[4444]: AVC avc: denied { bpf } for pid=4444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.868000 audit[4444]: AVC avc: denied { bpf } for pid=4444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:37.868000 audit: BPF prog-id=186 op=LOAD May 17 00:48:37.868000 audit[4444]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=4423 pid=4444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.868000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465333635626232306537336363306339363536333262306330353361 May 17 00:48:37.927074 env[1452]: time="2025-05-17T00:48:37.927031781Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-mqsn2,Uid:ca23fe46-c12b-49ed-aa7e-a638ad594bbf,Namespace:calico-system,Attempt:1,} returns sandbox id \"4e365bb20e73cc0c965632b0c053ad24a604d474456376a6ab88d66dc05a83c9\"" May 17 00:48:37.960823 env[1452]: 2025-05-17 00:48:37.852 [INFO][4449] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="89662f2be62f79066c314f694f3a1cd60e7d20a67c1c3bdbbb11635180c5037a" May 17 00:48:37.960823 env[1452]: 2025-05-17 00:48:37.852 [INFO][4449] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="89662f2be62f79066c314f694f3a1cd60e7d20a67c1c3bdbbb11635180c5037a" iface="eth0" netns="/var/run/netns/cni-71f6adc1-704c-b4c2-0063-0241670b356b" May 17 00:48:37.960823 env[1452]: 2025-05-17 00:48:37.852 [INFO][4449] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="89662f2be62f79066c314f694f3a1cd60e7d20a67c1c3bdbbb11635180c5037a" iface="eth0" netns="/var/run/netns/cni-71f6adc1-704c-b4c2-0063-0241670b356b" May 17 00:48:37.960823 env[1452]: 2025-05-17 00:48:37.852 [INFO][4449] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="89662f2be62f79066c314f694f3a1cd60e7d20a67c1c3bdbbb11635180c5037a" iface="eth0" netns="/var/run/netns/cni-71f6adc1-704c-b4c2-0063-0241670b356b" May 17 00:48:37.960823 env[1452]: 2025-05-17 00:48:37.852 [INFO][4449] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="89662f2be62f79066c314f694f3a1cd60e7d20a67c1c3bdbbb11635180c5037a" May 17 00:48:37.960823 env[1452]: 2025-05-17 00:48:37.852 [INFO][4449] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="89662f2be62f79066c314f694f3a1cd60e7d20a67c1c3bdbbb11635180c5037a" May 17 00:48:37.960823 env[1452]: 2025-05-17 00:48:37.894 [INFO][4483] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="89662f2be62f79066c314f694f3a1cd60e7d20a67c1c3bdbbb11635180c5037a" HandleID="k8s-pod-network.89662f2be62f79066c314f694f3a1cd60e7d20a67c1c3bdbbb11635180c5037a" Workload="ci--3510.3.7--n--6523ff94dd-k8s-coredns--7c65d6cfc9--ljkjl-eth0" May 17 00:48:37.960823 env[1452]: 2025-05-17 00:48:37.895 [INFO][4483] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:48:37.960823 env[1452]: 2025-05-17 00:48:37.895 [INFO][4483] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:48:37.960823 env[1452]: 2025-05-17 00:48:37.943 [WARNING][4483] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="89662f2be62f79066c314f694f3a1cd60e7d20a67c1c3bdbbb11635180c5037a" HandleID="k8s-pod-network.89662f2be62f79066c314f694f3a1cd60e7d20a67c1c3bdbbb11635180c5037a" Workload="ci--3510.3.7--n--6523ff94dd-k8s-coredns--7c65d6cfc9--ljkjl-eth0" May 17 00:48:37.960823 env[1452]: 2025-05-17 00:48:37.943 [INFO][4483] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="89662f2be62f79066c314f694f3a1cd60e7d20a67c1c3bdbbb11635180c5037a" HandleID="k8s-pod-network.89662f2be62f79066c314f694f3a1cd60e7d20a67c1c3bdbbb11635180c5037a" Workload="ci--3510.3.7--n--6523ff94dd-k8s-coredns--7c65d6cfc9--ljkjl-eth0" May 17 00:48:37.960823 env[1452]: 2025-05-17 00:48:37.946 [INFO][4483] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:48:37.960823 env[1452]: 2025-05-17 00:48:37.956 [INFO][4449] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="89662f2be62f79066c314f694f3a1cd60e7d20a67c1c3bdbbb11635180c5037a" May 17 00:48:37.964694 env[1452]: time="2025-05-17T00:48:37.964591188Z" level=info msg="TearDown network for sandbox \"89662f2be62f79066c314f694f3a1cd60e7d20a67c1c3bdbbb11635180c5037a\" successfully" May 17 00:48:37.964694 env[1452]: time="2025-05-17T00:48:37.964665827Z" level=info msg="StopPodSandbox for \"89662f2be62f79066c314f694f3a1cd60e7d20a67c1c3bdbbb11635180c5037a\" returns successfully" May 17 00:48:37.965656 env[1452]: time="2025-05-17T00:48:37.965608502Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-ljkjl,Uid:6c68e9fc-8024-41fc-851a-e97b8196dc2e,Namespace:kube-system,Attempt:1,}" May 17 00:48:37.972506 kubelet[2511]: I0517 00:48:37.972408 2511 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7c65d6cfc9-9bbtw" podStartSLOduration=42.972262188 podStartE2EDuration="42.972262188s" podCreationTimestamp="2025-05-17 00:47:55 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:48:37.972198669 +0000 UTC m=+47.652938105" watchObservedRunningTime="2025-05-17 00:48:37.972262188 +0000 UTC m=+47.653001624" May 17 00:48:37.990000 audit[4499]: NETFILTER_CFG table=filter:116 family=2 entries=20 op=nft_register_rule pid=4499 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:48:37.990000 audit[4499]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=7480 a0=3 a1=ffffc614b440 a2=0 a3=1 items=0 ppid=2658 pid=4499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.990000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:48:37.998000 audit[4499]: NETFILTER_CFG table=nat:117 family=2 entries=14 op=nft_register_rule pid=4499 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:48:37.998000 audit[4499]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3468 a0=3 a1=ffffc614b440 a2=0 a3=1 items=0 ppid=2658 pid=4499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.998000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:48:38.019000 audit[4501]: NETFILTER_CFG table=filter:118 family=2 entries=17 op=nft_register_rule pid=4501 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:48:38.019000 audit[4501]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5248 a0=3 a1=ffffde673f20 a2=0 a3=1 items=0 ppid=2658 pid=4501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:38.019000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:48:38.035000 audit[4501]: NETFILTER_CFG table=nat:119 family=2 entries=35 op=nft_register_chain pid=4501 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:48:38.035000 audit[4501]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14196 a0=3 a1=ffffde673f20 a2=0 a3=1 items=0 ppid=2658 pid=4501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:38.035000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:48:38.142129 systemd[1]: run-netns-cni\x2d71f6adc1\x2d704c\x2db4c2\x2d0063\x2d0241670b356b.mount: Deactivated successfully. May 17 00:48:38.273299 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia974a4d14a1: link becomes ready May 17 00:48:38.271389 systemd-networkd[1609]: calia974a4d14a1: Link UP May 17 00:48:38.271511 systemd-networkd[1609]: calia974a4d14a1: Gained carrier May 17 00:48:38.292598 env[1452]: 2025-05-17 00:48:38.172 [INFO][4504] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--6523ff94dd-k8s-coredns--7c65d6cfc9--ljkjl-eth0 coredns-7c65d6cfc9- kube-system 6c68e9fc-8024-41fc-851a-e97b8196dc2e 980 0 2025-05-17 00:47:55 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7c65d6cfc9 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.7-n-6523ff94dd coredns-7c65d6cfc9-ljkjl eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calia974a4d14a1 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] [] }} ContainerID="eb78cd9fb958205b4e47a5dd602ff7196a3af026e6f0b204578476b758ad5084" Namespace="kube-system" Pod="coredns-7c65d6cfc9-ljkjl" WorkloadEndpoint="ci--3510.3.7--n--6523ff94dd-k8s-coredns--7c65d6cfc9--ljkjl-" May 17 00:48:38.292598 env[1452]: 2025-05-17 00:48:38.172 [INFO][4504] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="eb78cd9fb958205b4e47a5dd602ff7196a3af026e6f0b204578476b758ad5084" Namespace="kube-system" Pod="coredns-7c65d6cfc9-ljkjl" WorkloadEndpoint="ci--3510.3.7--n--6523ff94dd-k8s-coredns--7c65d6cfc9--ljkjl-eth0" May 17 00:48:38.292598 env[1452]: 2025-05-17 00:48:38.205 [INFO][4515] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="eb78cd9fb958205b4e47a5dd602ff7196a3af026e6f0b204578476b758ad5084" HandleID="k8s-pod-network.eb78cd9fb958205b4e47a5dd602ff7196a3af026e6f0b204578476b758ad5084" Workload="ci--3510.3.7--n--6523ff94dd-k8s-coredns--7c65d6cfc9--ljkjl-eth0" May 17 00:48:38.292598 env[1452]: 2025-05-17 00:48:38.206 [INFO][4515] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="eb78cd9fb958205b4e47a5dd602ff7196a3af026e6f0b204578476b758ad5084" HandleID="k8s-pod-network.eb78cd9fb958205b4e47a5dd602ff7196a3af026e6f0b204578476b758ad5084" Workload="ci--3510.3.7--n--6523ff94dd-k8s-coredns--7c65d6cfc9--ljkjl-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002cf020), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.7-n-6523ff94dd", "pod":"coredns-7c65d6cfc9-ljkjl", "timestamp":"2025-05-17 00:48:38.205940401 +0000 UTC"}, Hostname:"ci-3510.3.7-n-6523ff94dd", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:48:38.292598 env[1452]: 2025-05-17 00:48:38.206 [INFO][4515] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:48:38.292598 env[1452]: 2025-05-17 00:48:38.206 [INFO][4515] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:48:38.292598 env[1452]: 2025-05-17 00:48:38.206 [INFO][4515] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-6523ff94dd' May 17 00:48:38.292598 env[1452]: 2025-05-17 00:48:38.217 [INFO][4515] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.eb78cd9fb958205b4e47a5dd602ff7196a3af026e6f0b204578476b758ad5084" host="ci-3510.3.7-n-6523ff94dd" May 17 00:48:38.292598 env[1452]: 2025-05-17 00:48:38.222 [INFO][4515] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.7-n-6523ff94dd" May 17 00:48:38.292598 env[1452]: 2025-05-17 00:48:38.232 [INFO][4515] ipam/ipam.go 511: Trying affinity for 192.168.38.192/26 host="ci-3510.3.7-n-6523ff94dd" May 17 00:48:38.292598 env[1452]: 2025-05-17 00:48:38.234 [INFO][4515] ipam/ipam.go 158: Attempting to load block cidr=192.168.38.192/26 host="ci-3510.3.7-n-6523ff94dd" May 17 00:48:38.292598 env[1452]: 2025-05-17 00:48:38.237 [INFO][4515] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.38.192/26 host="ci-3510.3.7-n-6523ff94dd" May 17 00:48:38.292598 env[1452]: 2025-05-17 00:48:38.238 [INFO][4515] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.38.192/26 handle="k8s-pod-network.eb78cd9fb958205b4e47a5dd602ff7196a3af026e6f0b204578476b758ad5084" host="ci-3510.3.7-n-6523ff94dd" May 17 00:48:38.292598 env[1452]: 2025-05-17 00:48:38.239 [INFO][4515] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.eb78cd9fb958205b4e47a5dd602ff7196a3af026e6f0b204578476b758ad5084 May 17 00:48:38.292598 env[1452]: 2025-05-17 00:48:38.245 [INFO][4515] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.38.192/26 handle="k8s-pod-network.eb78cd9fb958205b4e47a5dd602ff7196a3af026e6f0b204578476b758ad5084" host="ci-3510.3.7-n-6523ff94dd" May 17 00:48:38.292598 env[1452]: 2025-05-17 00:48:38.253 [INFO][4515] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.38.199/26] block=192.168.38.192/26 handle="k8s-pod-network.eb78cd9fb958205b4e47a5dd602ff7196a3af026e6f0b204578476b758ad5084" host="ci-3510.3.7-n-6523ff94dd" May 17 00:48:38.292598 env[1452]: 2025-05-17 00:48:38.253 [INFO][4515] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.38.199/26] handle="k8s-pod-network.eb78cd9fb958205b4e47a5dd602ff7196a3af026e6f0b204578476b758ad5084" host="ci-3510.3.7-n-6523ff94dd" May 17 00:48:38.292598 env[1452]: 2025-05-17 00:48:38.253 [INFO][4515] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:48:38.292598 env[1452]: 2025-05-17 00:48:38.253 [INFO][4515] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.38.199/26] IPv6=[] ContainerID="eb78cd9fb958205b4e47a5dd602ff7196a3af026e6f0b204578476b758ad5084" HandleID="k8s-pod-network.eb78cd9fb958205b4e47a5dd602ff7196a3af026e6f0b204578476b758ad5084" Workload="ci--3510.3.7--n--6523ff94dd-k8s-coredns--7c65d6cfc9--ljkjl-eth0" May 17 00:48:38.293266 env[1452]: 2025-05-17 00:48:38.257 [INFO][4504] cni-plugin/k8s.go 418: Populated endpoint ContainerID="eb78cd9fb958205b4e47a5dd602ff7196a3af026e6f0b204578476b758ad5084" Namespace="kube-system" Pod="coredns-7c65d6cfc9-ljkjl" WorkloadEndpoint="ci--3510.3.7--n--6523ff94dd-k8s-coredns--7c65d6cfc9--ljkjl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--6523ff94dd-k8s-coredns--7c65d6cfc9--ljkjl-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"6c68e9fc-8024-41fc-851a-e97b8196dc2e", ResourceVersion:"980", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 47, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-6523ff94dd", ContainerID:"", Pod:"coredns-7c65d6cfc9-ljkjl", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.38.199/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia974a4d14a1", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:48:38.293266 env[1452]: 2025-05-17 00:48:38.257 [INFO][4504] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.38.199/32] ContainerID="eb78cd9fb958205b4e47a5dd602ff7196a3af026e6f0b204578476b758ad5084" Namespace="kube-system" Pod="coredns-7c65d6cfc9-ljkjl" WorkloadEndpoint="ci--3510.3.7--n--6523ff94dd-k8s-coredns--7c65d6cfc9--ljkjl-eth0" May 17 00:48:38.293266 env[1452]: 2025-05-17 00:48:38.257 [INFO][4504] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calia974a4d14a1 ContainerID="eb78cd9fb958205b4e47a5dd602ff7196a3af026e6f0b204578476b758ad5084" Namespace="kube-system" Pod="coredns-7c65d6cfc9-ljkjl" WorkloadEndpoint="ci--3510.3.7--n--6523ff94dd-k8s-coredns--7c65d6cfc9--ljkjl-eth0" May 17 00:48:38.293266 env[1452]: 2025-05-17 00:48:38.273 [INFO][4504] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="eb78cd9fb958205b4e47a5dd602ff7196a3af026e6f0b204578476b758ad5084" Namespace="kube-system" Pod="coredns-7c65d6cfc9-ljkjl" WorkloadEndpoint="ci--3510.3.7--n--6523ff94dd-k8s-coredns--7c65d6cfc9--ljkjl-eth0" May 17 00:48:38.293266 env[1452]: 2025-05-17 00:48:38.279 [INFO][4504] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="eb78cd9fb958205b4e47a5dd602ff7196a3af026e6f0b204578476b758ad5084" Namespace="kube-system" Pod="coredns-7c65d6cfc9-ljkjl" WorkloadEndpoint="ci--3510.3.7--n--6523ff94dd-k8s-coredns--7c65d6cfc9--ljkjl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--6523ff94dd-k8s-coredns--7c65d6cfc9--ljkjl-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"6c68e9fc-8024-41fc-851a-e97b8196dc2e", ResourceVersion:"980", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 47, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-6523ff94dd", ContainerID:"eb78cd9fb958205b4e47a5dd602ff7196a3af026e6f0b204578476b758ad5084", Pod:"coredns-7c65d6cfc9-ljkjl", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.38.199/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia974a4d14a1", MAC:"9e:f3:90:7f:8c:5a", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:48:38.293266 env[1452]: 2025-05-17 00:48:38.290 [INFO][4504] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="eb78cd9fb958205b4e47a5dd602ff7196a3af026e6f0b204578476b758ad5084" Namespace="kube-system" Pod="coredns-7c65d6cfc9-ljkjl" WorkloadEndpoint="ci--3510.3.7--n--6523ff94dd-k8s-coredns--7c65d6cfc9--ljkjl-eth0" May 17 00:48:38.317885 env[1452]: time="2025-05-17T00:48:38.317693554Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:48:38.318094 env[1452]: time="2025-05-17T00:48:38.317910473Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:48:38.318148 env[1452]: time="2025-05-17T00:48:38.318110312Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:48:38.318383 env[1452]: time="2025-05-17T00:48:38.318324990Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/eb78cd9fb958205b4e47a5dd602ff7196a3af026e6f0b204578476b758ad5084 pid=4539 runtime=io.containerd.runc.v2 May 17 00:48:38.333000 audit[4530]: NETFILTER_CFG table=filter:120 family=2 entries=48 op=nft_register_chain pid=4530 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:48:38.333000 audit[4530]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=22704 a0=3 a1=ffffff21e090 a2=0 a3=ffff88b6cfa8 items=0 ppid=3751 pid=4530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:38.333000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:48:38.340537 systemd[1]: Started cri-containerd-eb78cd9fb958205b4e47a5dd602ff7196a3af026e6f0b204578476b758ad5084.scope. May 17 00:48:38.347300 systemd[1]: run-containerd-runc-k8s.io-eb78cd9fb958205b4e47a5dd602ff7196a3af026e6f0b204578476b758ad5084-runc.tQSCc7.mount: Deactivated successfully. May 17 00:48:38.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.368000 audit: BPF prog-id=187 op=LOAD May 17 00:48:38.369000 audit[4548]: AVC avc: denied { bpf } for pid=4548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.369000 audit[4548]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014db38 a2=10 a3=0 items=0 ppid=4539 pid=4548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:38.369000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562373863643966623935383230356234653437613564643630326666 May 17 00:48:38.370000 audit[4548]: AVC avc: denied { perfmon } for pid=4548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.370000 audit[4548]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=4539 pid=4548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:38.370000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562373863643966623935383230356234653437613564643630326666 May 17 00:48:38.371000 audit[4548]: AVC avc: denied { bpf } for pid=4548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.371000 audit[4548]: AVC avc: denied { bpf } for pid=4548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.371000 audit[4548]: AVC avc: denied { bpf } for pid=4548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.371000 audit[4548]: AVC avc: denied { perfmon } for pid=4548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.371000 audit[4548]: AVC avc: denied { perfmon } for pid=4548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.371000 audit[4548]: AVC avc: denied { perfmon } for pid=4548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.371000 audit[4548]: AVC avc: denied { perfmon } for pid=4548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.371000 audit[4548]: AVC avc: denied { perfmon } for pid=4548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.371000 audit[4548]: AVC avc: denied { bpf } for pid=4548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.371000 audit[4548]: AVC avc: denied { bpf } for pid=4548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.371000 audit: BPF prog-id=188 op=LOAD May 17 00:48:38.371000 audit[4548]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=4539 pid=4548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:38.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562373863643966623935383230356234653437613564643630326666 May 17 00:48:38.371000 audit[4548]: AVC avc: denied { bpf } for pid=4548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.371000 audit[4548]: AVC avc: denied { bpf } for pid=4548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.371000 audit[4548]: AVC avc: denied { perfmon } for pid=4548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.371000 audit[4548]: AVC avc: denied { perfmon } for pid=4548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.371000 audit[4548]: AVC avc: denied { perfmon } for pid=4548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.371000 audit[4548]: AVC avc: denied { perfmon } for pid=4548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.371000 audit[4548]: AVC avc: denied { perfmon } for pid=4548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.371000 audit[4548]: AVC avc: denied { bpf } for pid=4548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.371000 audit[4548]: AVC avc: denied { bpf } for pid=4548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.371000 audit: BPF prog-id=189 op=LOAD May 17 00:48:38.371000 audit[4548]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=4539 pid=4548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:38.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562373863643966623935383230356234653437613564643630326666 May 17 00:48:38.372000 audit: BPF prog-id=189 op=UNLOAD May 17 00:48:38.372000 audit: BPF prog-id=188 op=UNLOAD May 17 00:48:38.372000 audit[4548]: AVC avc: denied { bpf } for pid=4548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.372000 audit[4548]: AVC avc: denied { bpf } for pid=4548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.372000 audit[4548]: AVC avc: denied { bpf } for pid=4548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.372000 audit[4548]: AVC avc: denied { perfmon } for pid=4548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.372000 audit[4548]: AVC avc: denied { perfmon } for pid=4548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.372000 audit[4548]: AVC avc: denied { perfmon } for pid=4548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.372000 audit[4548]: AVC avc: denied { perfmon } for pid=4548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.372000 audit[4548]: AVC avc: denied { perfmon } for pid=4548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.372000 audit[4548]: AVC avc: denied { bpf } for pid=4548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.372000 audit[4548]: AVC avc: denied { bpf } for pid=4548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.372000 audit: BPF prog-id=190 op=LOAD May 17 00:48:38.372000 audit[4548]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=4539 pid=4548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:38.372000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562373863643966623935383230356234653437613564643630326666 May 17 00:48:38.396110 env[1452]: time="2025-05-17T00:48:38.396054316Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-ljkjl,Uid:6c68e9fc-8024-41fc-851a-e97b8196dc2e,Namespace:kube-system,Attempt:1,} returns sandbox id \"eb78cd9fb958205b4e47a5dd602ff7196a3af026e6f0b204578476b758ad5084\"" May 17 00:48:38.401018 env[1452]: time="2025-05-17T00:48:38.400966051Z" level=info msg="CreateContainer within sandbox \"eb78cd9fb958205b4e47a5dd602ff7196a3af026e6f0b204578476b758ad5084\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 17 00:48:38.609480 env[1452]: time="2025-05-17T00:48:38.606880967Z" level=info msg="CreateContainer within sandbox \"eb78cd9fb958205b4e47a5dd602ff7196a3af026e6f0b204578476b758ad5084\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"d94beede76bddbe5b8af7a9cd6e72730f71374919ff49aebfcae588002088f1c\"" May 17 00:48:38.610299 env[1452]: time="2025-05-17T00:48:38.610263510Z" level=info msg="StartContainer for \"d94beede76bddbe5b8af7a9cd6e72730f71374919ff49aebfcae588002088f1c\"" May 17 00:48:38.633007 systemd[1]: Started cri-containerd-d94beede76bddbe5b8af7a9cd6e72730f71374919ff49aebfcae588002088f1c.scope. May 17 00:48:38.644040 systemd-networkd[1609]: cali910798fd005: Gained IPv6LL May 17 00:48:38.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.651000 audit: BPF prog-id=191 op=LOAD May 17 00:48:38.652000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.652000 audit[4581]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=4539 pid=4581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:38.652000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439346265656465373662646462653562386166376139636436653732 May 17 00:48:38.652000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.652000 audit[4581]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=4539 pid=4581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:38.652000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439346265656465373662646462653562386166376139636436653732 May 17 00:48:38.652000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.652000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.652000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.652000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.652000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.652000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.652000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.652000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.652000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.652000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.652000 audit: BPF prog-id=192 op=LOAD May 17 00:48:38.652000 audit[4581]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=4539 pid=4581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:38.652000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439346265656465373662646462653562386166376139636436653732 May 17 00:48:38.652000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.652000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.652000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.652000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.652000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.652000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.652000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.652000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.652000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.652000 audit: BPF prog-id=193 op=LOAD May 17 00:48:38.652000 audit[4581]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=4539 pid=4581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:38.652000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439346265656465373662646462653562386166376139636436653732 May 17 00:48:38.652000 audit: BPF prog-id=193 op=UNLOAD May 17 00:48:38.652000 audit: BPF prog-id=192 op=UNLOAD May 17 00:48:38.652000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.652000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.652000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.652000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.652000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.652000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.652000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.652000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.652000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.652000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.652000 audit: BPF prog-id=194 op=LOAD May 17 00:48:38.652000 audit[4581]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=4539 pid=4581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:38.652000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439346265656465373662646462653562386166376139636436653732 May 17 00:48:38.705561 env[1452]: time="2025-05-17T00:48:38.705471067Z" level=info msg="StartContainer for \"d94beede76bddbe5b8af7a9cd6e72730f71374919ff49aebfcae588002088f1c\" returns successfully" May 17 00:48:38.710000 audit[4591]: AVC avc: denied { getattr } for pid=4591 comm="coredns" path="cgroup:[4026532682]" dev="nsfs" ino=4026532682 scontext=system_u:system_r:svirt_lxc_net_t:s0:c469,c711 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 May 17 00:48:38.710000 audit[4591]: SYSCALL arch=c00000b7 syscall=79 success=no exit=-13 a0=ffffffffffffff9c a1=4000054798 a2=400014e578 a3=0 items=0 ppid=4539 pid=4591 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c469,c711 key=(null) May 17 00:48:38.710000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 May 17 00:48:38.903109 systemd-networkd[1609]: cali405cf323ce2: Gained IPv6LL May 17 00:48:38.964085 systemd-networkd[1609]: cali72210455a87: Gained IPv6LL May 17 00:48:38.998838 kubelet[2511]: I0517 00:48:38.998760 2511 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7c65d6cfc9-ljkjl" podStartSLOduration=43.998741819 podStartE2EDuration="43.998741819s" podCreationTimestamp="2025-05-17 00:47:55 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:48:38.971173559 +0000 UTC m=+48.651912995" watchObservedRunningTime="2025-05-17 00:48:38.998741819 +0000 UTC m=+48.679481255" May 17 00:48:39.041000 audit[4609]: NETFILTER_CFG table=filter:121 family=2 entries=14 op=nft_register_rule pid=4609 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:48:39.041000 audit[4609]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5248 a0=3 a1=ffffc68230b0 a2=0 a3=1 items=0 ppid=2658 pid=4609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:39.041000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:48:39.059000 audit[4609]: NETFILTER_CFG table=nat:122 family=2 entries=56 op=nft_register_chain pid=4609 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:48:39.059000 audit[4609]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19860 a0=3 a1=ffffc68230b0 a2=0 a3=1 items=0 ppid=2658 pid=4609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:39.059000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:48:39.140306 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1913324855.mount: Deactivated successfully. May 17 00:48:39.502442 env[1452]: time="2025-05-17T00:48:39.502389424Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:39.512510 env[1452]: time="2025-05-17T00:48:39.512435574Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0d503660232383641bf9af3b7e4ef066c0e96a8ec586f123e5b56b6a196c983d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:39.523256 env[1452]: time="2025-05-17T00:48:39.519944776Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:39.525810 env[1452]: time="2025-05-17T00:48:39.525107950Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:ad7d2e76f15777636c5d91c108d7655659b38fe8970255050ffa51223eb96ff4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:39.526461 env[1452]: time="2025-05-17T00:48:39.525742147Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\" returns image reference \"sha256:0d503660232383641bf9af3b7e4ef066c0e96a8ec586f123e5b56b6a196c983d\"" May 17 00:48:39.532426 env[1452]: time="2025-05-17T00:48:39.532374074Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.0\"" May 17 00:48:39.541351 env[1452]: time="2025-05-17T00:48:39.540690713Z" level=info msg="CreateContainer within sandbox \"64768cfde28b6138611a687f8b053d38d744ed122aa149a291af662d525e2956\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 17 00:48:39.575843 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2201726207.mount: Deactivated successfully. May 17 00:48:39.591939 env[1452]: time="2025-05-17T00:48:39.591880897Z" level=info msg="CreateContainer within sandbox \"64768cfde28b6138611a687f8b053d38d744ed122aa149a291af662d525e2956\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"da16b2949520484b57f05e5896db79a574f3d57d1040439656f0227686b5294c\"" May 17 00:48:39.592943 env[1452]: time="2025-05-17T00:48:39.592914412Z" level=info msg="StartContainer for \"da16b2949520484b57f05e5896db79a574f3d57d1040439656f0227686b5294c\"" May 17 00:48:39.620309 systemd[1]: Started cri-containerd-da16b2949520484b57f05e5896db79a574f3d57d1040439656f0227686b5294c.scope. May 17 00:48:39.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.633000 audit: BPF prog-id=195 op=LOAD May 17 00:48:39.634000 audit[4619]: AVC avc: denied { bpf } for pid=4619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.634000 audit[4619]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4049 pid=4619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:39.634000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461313662323934393532303438346235376630356535383936646237 May 17 00:48:39.634000 audit[4619]: AVC avc: denied { perfmon } for pid=4619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.634000 audit[4619]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4049 pid=4619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:39.634000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461313662323934393532303438346235376630356535383936646237 May 17 00:48:39.634000 audit[4619]: AVC avc: denied { bpf } for pid=4619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.634000 audit[4619]: AVC avc: denied { bpf } for pid=4619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.634000 audit[4619]: AVC avc: denied { bpf } for pid=4619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.634000 audit[4619]: AVC avc: denied { perfmon } for pid=4619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.634000 audit[4619]: AVC avc: denied { perfmon } for pid=4619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.634000 audit[4619]: AVC avc: denied { perfmon } for pid=4619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.634000 audit[4619]: AVC avc: denied { perfmon } for pid=4619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.634000 audit[4619]: AVC avc: denied { perfmon } for pid=4619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.634000 audit[4619]: AVC avc: denied { bpf } for pid=4619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.634000 audit[4619]: AVC avc: denied { bpf } for pid=4619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.634000 audit: BPF prog-id=196 op=LOAD May 17 00:48:39.634000 audit[4619]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4049 pid=4619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:39.634000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461313662323934393532303438346235376630356535383936646237 May 17 00:48:39.634000 audit[4619]: AVC avc: denied { bpf } for pid=4619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.634000 audit[4619]: AVC avc: denied { bpf } for pid=4619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.634000 audit[4619]: AVC avc: denied { perfmon } for pid=4619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.634000 audit[4619]: AVC avc: denied { perfmon } for pid=4619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.634000 audit[4619]: AVC avc: denied { perfmon } for pid=4619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.634000 audit[4619]: AVC avc: denied { perfmon } for pid=4619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.634000 audit[4619]: AVC avc: denied { perfmon } for pid=4619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.634000 audit[4619]: AVC avc: denied { bpf } for pid=4619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.634000 audit[4619]: AVC avc: denied { bpf } for pid=4619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.634000 audit: BPF prog-id=197 op=LOAD May 17 00:48:39.634000 audit[4619]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4049 pid=4619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:39.634000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461313662323934393532303438346235376630356535383936646237 May 17 00:48:39.634000 audit: BPF prog-id=197 op=UNLOAD May 17 00:48:39.634000 audit: BPF prog-id=196 op=UNLOAD May 17 00:48:39.634000 audit[4619]: AVC avc: denied { bpf } for pid=4619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.634000 audit[4619]: AVC avc: denied { bpf } for pid=4619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.634000 audit[4619]: AVC avc: denied { bpf } for pid=4619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.634000 audit[4619]: AVC avc: denied { perfmon } for pid=4619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.634000 audit[4619]: AVC avc: denied { perfmon } for pid=4619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.634000 audit[4619]: AVC avc: denied { perfmon } for pid=4619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.634000 audit[4619]: AVC avc: denied { perfmon } for pid=4619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.634000 audit[4619]: AVC avc: denied { perfmon } for pid=4619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.634000 audit[4619]: AVC avc: denied { bpf } for pid=4619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.634000 audit[4619]: AVC avc: denied { bpf } for pid=4619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.634000 audit: BPF prog-id=198 op=LOAD May 17 00:48:39.634000 audit[4619]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4049 pid=4619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:39.634000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461313662323934393532303438346235376630356535383936646237 May 17 00:48:39.722473 env[1452]: time="2025-05-17T00:48:39.722406565Z" level=info msg="StopPodSandbox for \"3d8e0a399d4f9326b0d1779c026ca35d8d47037f09a348582946804ef659f1a7\"" May 17 00:48:39.861908 env[1452]: 2025-05-17 00:48:39.791 [INFO][4657] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="3d8e0a399d4f9326b0d1779c026ca35d8d47037f09a348582946804ef659f1a7" May 17 00:48:39.861908 env[1452]: 2025-05-17 00:48:39.809 [INFO][4657] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="3d8e0a399d4f9326b0d1779c026ca35d8d47037f09a348582946804ef659f1a7" iface="eth0" netns="/var/run/netns/cni-d089ac85-763b-7009-c864-ee5abba333e5" May 17 00:48:39.861908 env[1452]: 2025-05-17 00:48:39.810 [INFO][4657] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="3d8e0a399d4f9326b0d1779c026ca35d8d47037f09a348582946804ef659f1a7" iface="eth0" netns="/var/run/netns/cni-d089ac85-763b-7009-c864-ee5abba333e5" May 17 00:48:39.861908 env[1452]: 2025-05-17 00:48:39.810 [INFO][4657] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="3d8e0a399d4f9326b0d1779c026ca35d8d47037f09a348582946804ef659f1a7" iface="eth0" netns="/var/run/netns/cni-d089ac85-763b-7009-c864-ee5abba333e5" May 17 00:48:39.861908 env[1452]: 2025-05-17 00:48:39.810 [INFO][4657] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="3d8e0a399d4f9326b0d1779c026ca35d8d47037f09a348582946804ef659f1a7" May 17 00:48:39.861908 env[1452]: 2025-05-17 00:48:39.810 [INFO][4657] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3d8e0a399d4f9326b0d1779c026ca35d8d47037f09a348582946804ef659f1a7" May 17 00:48:39.861908 env[1452]: 2025-05-17 00:48:39.848 [INFO][4668] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3d8e0a399d4f9326b0d1779c026ca35d8d47037f09a348582946804ef659f1a7" HandleID="k8s-pod-network.3d8e0a399d4f9326b0d1779c026ca35d8d47037f09a348582946804ef659f1a7" Workload="ci--3510.3.7--n--6523ff94dd-k8s-goldmane--8f77d7b6c--78tx5-eth0" May 17 00:48:39.861908 env[1452]: 2025-05-17 00:48:39.848 [INFO][4668] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:48:39.861908 env[1452]: 2025-05-17 00:48:39.848 [INFO][4668] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:48:39.861908 env[1452]: 2025-05-17 00:48:39.857 [WARNING][4668] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3d8e0a399d4f9326b0d1779c026ca35d8d47037f09a348582946804ef659f1a7" HandleID="k8s-pod-network.3d8e0a399d4f9326b0d1779c026ca35d8d47037f09a348582946804ef659f1a7" Workload="ci--3510.3.7--n--6523ff94dd-k8s-goldmane--8f77d7b6c--78tx5-eth0" May 17 00:48:39.861908 env[1452]: 2025-05-17 00:48:39.857 [INFO][4668] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3d8e0a399d4f9326b0d1779c026ca35d8d47037f09a348582946804ef659f1a7" HandleID="k8s-pod-network.3d8e0a399d4f9326b0d1779c026ca35d8d47037f09a348582946804ef659f1a7" Workload="ci--3510.3.7--n--6523ff94dd-k8s-goldmane--8f77d7b6c--78tx5-eth0" May 17 00:48:39.861908 env[1452]: 2025-05-17 00:48:39.859 [INFO][4668] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:48:39.861908 env[1452]: 2025-05-17 00:48:39.860 [INFO][4657] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="3d8e0a399d4f9326b0d1779c026ca35d8d47037f09a348582946804ef659f1a7" May 17 00:48:39.862605 env[1452]: time="2025-05-17T00:48:39.862565705Z" level=info msg="TearDown network for sandbox \"3d8e0a399d4f9326b0d1779c026ca35d8d47037f09a348582946804ef659f1a7\" successfully" May 17 00:48:39.862691 env[1452]: time="2025-05-17T00:48:39.862673825Z" level=info msg="StopPodSandbox for \"3d8e0a399d4f9326b0d1779c026ca35d8d47037f09a348582946804ef659f1a7\" returns successfully" May 17 00:48:39.864168 env[1452]: time="2025-05-17T00:48:39.864134697Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-8f77d7b6c-78tx5,Uid:dc3b60ab-99b9-435e-bc94-f900356b518f,Namespace:calico-system,Attempt:1,}" May 17 00:48:39.964317 env[1452]: time="2025-05-17T00:48:39.964275757Z" level=info msg="StartContainer for \"da16b2949520484b57f05e5896db79a574f3d57d1040439656f0227686b5294c\" returns successfully" May 17 00:48:39.988065 systemd-networkd[1609]: calia974a4d14a1: Gained IPv6LL May 17 00:48:40.080000 audit[4676]: NETFILTER_CFG table=filter:123 family=2 entries=14 op=nft_register_rule pid=4676 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:48:40.080000 audit[4676]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5248 a0=3 a1=ffffcbbde1f0 a2=0 a3=1 items=0 ppid=2658 pid=4676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:40.080000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:48:40.084000 audit[4676]: NETFILTER_CFG table=nat:124 family=2 entries=20 op=nft_register_rule pid=4676 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:48:40.084000 audit[4676]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffcbbde1f0 a2=0 a3=1 items=0 ppid=2658 pid=4676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:40.084000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:48:40.139544 systemd[1]: run-containerd-runc-k8s.io-da16b2949520484b57f05e5896db79a574f3d57d1040439656f0227686b5294c-runc.kbZUh8.mount: Deactivated successfully. May 17 00:48:40.139974 systemd[1]: run-netns-cni\x2dd089ac85\x2d763b\x2d7009\x2dc864\x2dee5abba333e5.mount: Deactivated successfully. May 17 00:48:40.283273 kubelet[2511]: I0517 00:48:40.283228 2511 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:48:40.509795 systemd-networkd[1609]: cali8670511b544: Link UP May 17 00:48:40.523527 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:48:40.523695 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali8670511b544: link becomes ready May 17 00:48:40.524097 systemd-networkd[1609]: cali8670511b544: Gained carrier May 17 00:48:40.539133 env[1452]: 2025-05-17 00:48:40.399 [INFO][4695] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--6523ff94dd-k8s-goldmane--8f77d7b6c--78tx5-eth0 goldmane-8f77d7b6c- calico-system dc3b60ab-99b9-435e-bc94-f900356b518f 1012 0 2025-05-17 00:48:10 +0000 UTC map[app.kubernetes.io/name:goldmane k8s-app:goldmane pod-template-hash:8f77d7b6c projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:goldmane] map[] [] [] []} {k8s ci-3510.3.7-n-6523ff94dd goldmane-8f77d7b6c-78tx5 eth0 goldmane [] [] [kns.calico-system ksa.calico-system.goldmane] cali8670511b544 [] [] }} ContainerID="21cc1f9e313be8e483ccac87d0d40dba1493a54897f8d67cf571117db16106ec" Namespace="calico-system" Pod="goldmane-8f77d7b6c-78tx5" WorkloadEndpoint="ci--3510.3.7--n--6523ff94dd-k8s-goldmane--8f77d7b6c--78tx5-" May 17 00:48:40.539133 env[1452]: 2025-05-17 00:48:40.399 [INFO][4695] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="21cc1f9e313be8e483ccac87d0d40dba1493a54897f8d67cf571117db16106ec" Namespace="calico-system" Pod="goldmane-8f77d7b6c-78tx5" WorkloadEndpoint="ci--3510.3.7--n--6523ff94dd-k8s-goldmane--8f77d7b6c--78tx5-eth0" May 17 00:48:40.539133 env[1452]: 2025-05-17 00:48:40.427 [INFO][4712] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="21cc1f9e313be8e483ccac87d0d40dba1493a54897f8d67cf571117db16106ec" HandleID="k8s-pod-network.21cc1f9e313be8e483ccac87d0d40dba1493a54897f8d67cf571117db16106ec" Workload="ci--3510.3.7--n--6523ff94dd-k8s-goldmane--8f77d7b6c--78tx5-eth0" May 17 00:48:40.539133 env[1452]: 2025-05-17 00:48:40.427 [INFO][4712] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="21cc1f9e313be8e483ccac87d0d40dba1493a54897f8d67cf571117db16106ec" HandleID="k8s-pod-network.21cc1f9e313be8e483ccac87d0d40dba1493a54897f8d67cf571117db16106ec" Workload="ci--3510.3.7--n--6523ff94dd-k8s-goldmane--8f77d7b6c--78tx5-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400022f020), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.7-n-6523ff94dd", "pod":"goldmane-8f77d7b6c-78tx5", "timestamp":"2025-05-17 00:48:40.427354957 +0000 UTC"}, Hostname:"ci-3510.3.7-n-6523ff94dd", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:48:40.539133 env[1452]: 2025-05-17 00:48:40.427 [INFO][4712] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:48:40.539133 env[1452]: 2025-05-17 00:48:40.427 [INFO][4712] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:48:40.539133 env[1452]: 2025-05-17 00:48:40.427 [INFO][4712] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-6523ff94dd' May 17 00:48:40.539133 env[1452]: 2025-05-17 00:48:40.442 [INFO][4712] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.21cc1f9e313be8e483ccac87d0d40dba1493a54897f8d67cf571117db16106ec" host="ci-3510.3.7-n-6523ff94dd" May 17 00:48:40.539133 env[1452]: 2025-05-17 00:48:40.449 [INFO][4712] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.7-n-6523ff94dd" May 17 00:48:40.539133 env[1452]: 2025-05-17 00:48:40.469 [INFO][4712] ipam/ipam.go 511: Trying affinity for 192.168.38.192/26 host="ci-3510.3.7-n-6523ff94dd" May 17 00:48:40.539133 env[1452]: 2025-05-17 00:48:40.473 [INFO][4712] ipam/ipam.go 158: Attempting to load block cidr=192.168.38.192/26 host="ci-3510.3.7-n-6523ff94dd" May 17 00:48:40.539133 env[1452]: 2025-05-17 00:48:40.477 [INFO][4712] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.38.192/26 host="ci-3510.3.7-n-6523ff94dd" May 17 00:48:40.539133 env[1452]: 2025-05-17 00:48:40.477 [INFO][4712] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.38.192/26 handle="k8s-pod-network.21cc1f9e313be8e483ccac87d0d40dba1493a54897f8d67cf571117db16106ec" host="ci-3510.3.7-n-6523ff94dd" May 17 00:48:40.539133 env[1452]: 2025-05-17 00:48:40.482 [INFO][4712] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.21cc1f9e313be8e483ccac87d0d40dba1493a54897f8d67cf571117db16106ec May 17 00:48:40.539133 env[1452]: 2025-05-17 00:48:40.487 [INFO][4712] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.38.192/26 handle="k8s-pod-network.21cc1f9e313be8e483ccac87d0d40dba1493a54897f8d67cf571117db16106ec" host="ci-3510.3.7-n-6523ff94dd" May 17 00:48:40.539133 env[1452]: 2025-05-17 00:48:40.497 [INFO][4712] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.38.200/26] block=192.168.38.192/26 handle="k8s-pod-network.21cc1f9e313be8e483ccac87d0d40dba1493a54897f8d67cf571117db16106ec" host="ci-3510.3.7-n-6523ff94dd" May 17 00:48:40.539133 env[1452]: 2025-05-17 00:48:40.497 [INFO][4712] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.38.200/26] handle="k8s-pod-network.21cc1f9e313be8e483ccac87d0d40dba1493a54897f8d67cf571117db16106ec" host="ci-3510.3.7-n-6523ff94dd" May 17 00:48:40.539133 env[1452]: 2025-05-17 00:48:40.497 [INFO][4712] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:48:40.539133 env[1452]: 2025-05-17 00:48:40.497 [INFO][4712] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.38.200/26] IPv6=[] ContainerID="21cc1f9e313be8e483ccac87d0d40dba1493a54897f8d67cf571117db16106ec" HandleID="k8s-pod-network.21cc1f9e313be8e483ccac87d0d40dba1493a54897f8d67cf571117db16106ec" Workload="ci--3510.3.7--n--6523ff94dd-k8s-goldmane--8f77d7b6c--78tx5-eth0" May 17 00:48:40.539944 env[1452]: 2025-05-17 00:48:40.498 [INFO][4695] cni-plugin/k8s.go 418: Populated endpoint ContainerID="21cc1f9e313be8e483ccac87d0d40dba1493a54897f8d67cf571117db16106ec" Namespace="calico-system" Pod="goldmane-8f77d7b6c-78tx5" WorkloadEndpoint="ci--3510.3.7--n--6523ff94dd-k8s-goldmane--8f77d7b6c--78tx5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--6523ff94dd-k8s-goldmane--8f77d7b6c--78tx5-eth0", GenerateName:"goldmane-8f77d7b6c-", Namespace:"calico-system", SelfLink:"", UID:"dc3b60ab-99b9-435e-bc94-f900356b518f", ResourceVersion:"1012", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 48, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"8f77d7b6c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-6523ff94dd", ContainerID:"", Pod:"goldmane-8f77d7b6c-78tx5", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.38.200/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali8670511b544", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:48:40.539944 env[1452]: 2025-05-17 00:48:40.499 [INFO][4695] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.38.200/32] ContainerID="21cc1f9e313be8e483ccac87d0d40dba1493a54897f8d67cf571117db16106ec" Namespace="calico-system" Pod="goldmane-8f77d7b6c-78tx5" WorkloadEndpoint="ci--3510.3.7--n--6523ff94dd-k8s-goldmane--8f77d7b6c--78tx5-eth0" May 17 00:48:40.539944 env[1452]: 2025-05-17 00:48:40.499 [INFO][4695] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali8670511b544 ContainerID="21cc1f9e313be8e483ccac87d0d40dba1493a54897f8d67cf571117db16106ec" Namespace="calico-system" Pod="goldmane-8f77d7b6c-78tx5" WorkloadEndpoint="ci--3510.3.7--n--6523ff94dd-k8s-goldmane--8f77d7b6c--78tx5-eth0" May 17 00:48:40.539944 env[1452]: 2025-05-17 00:48:40.524 [INFO][4695] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="21cc1f9e313be8e483ccac87d0d40dba1493a54897f8d67cf571117db16106ec" Namespace="calico-system" Pod="goldmane-8f77d7b6c-78tx5" WorkloadEndpoint="ci--3510.3.7--n--6523ff94dd-k8s-goldmane--8f77d7b6c--78tx5-eth0" May 17 00:48:40.539944 env[1452]: 2025-05-17 00:48:40.525 [INFO][4695] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="21cc1f9e313be8e483ccac87d0d40dba1493a54897f8d67cf571117db16106ec" Namespace="calico-system" Pod="goldmane-8f77d7b6c-78tx5" WorkloadEndpoint="ci--3510.3.7--n--6523ff94dd-k8s-goldmane--8f77d7b6c--78tx5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--6523ff94dd-k8s-goldmane--8f77d7b6c--78tx5-eth0", GenerateName:"goldmane-8f77d7b6c-", Namespace:"calico-system", SelfLink:"", UID:"dc3b60ab-99b9-435e-bc94-f900356b518f", ResourceVersion:"1012", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 48, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"8f77d7b6c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-6523ff94dd", ContainerID:"21cc1f9e313be8e483ccac87d0d40dba1493a54897f8d67cf571117db16106ec", Pod:"goldmane-8f77d7b6c-78tx5", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.38.200/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali8670511b544", MAC:"2e:fa:f6:28:c7:d4", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:48:40.539944 env[1452]: 2025-05-17 00:48:40.537 [INFO][4695] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="21cc1f9e313be8e483ccac87d0d40dba1493a54897f8d67cf571117db16106ec" Namespace="calico-system" Pod="goldmane-8f77d7b6c-78tx5" WorkloadEndpoint="ci--3510.3.7--n--6523ff94dd-k8s-goldmane--8f77d7b6c--78tx5-eth0" May 17 00:48:40.584032 env[1452]: time="2025-05-17T00:48:40.568245584Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:48:40.584032 env[1452]: time="2025-05-17T00:48:40.568312464Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:48:40.584032 env[1452]: time="2025-05-17T00:48:40.568323904Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:48:40.584032 env[1452]: time="2025-05-17T00:48:40.568474223Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/21cc1f9e313be8e483ccac87d0d40dba1493a54897f8d67cf571117db16106ec pid=4733 runtime=io.containerd.runc.v2 May 17 00:48:40.598458 systemd[1]: Started cri-containerd-21cc1f9e313be8e483ccac87d0d40dba1493a54897f8d67cf571117db16106ec.scope. May 17 00:48:40.636000 audit[4762]: NETFILTER_CFG table=filter:125 family=2 entries=64 op=nft_register_chain pid=4762 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:48:40.636000 audit[4762]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=31104 a0=3 a1=fffff84f7740 a2=0 a3=ffff9dc12fa8 items=0 ppid=3751 pid=4762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:40.636000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:48:40.646000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:40.646000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:40.646000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:40.646000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:40.646000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:40.646000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:40.646000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:40.646000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:40.646000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:40.646000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:40.646000 audit: BPF prog-id=199 op=LOAD May 17 00:48:40.647000 audit[4746]: AVC avc: denied { bpf } for pid=4746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:40.647000 audit[4746]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4733 pid=4746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:40.647000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231636331663965333133626538653438336363616338376430643430 May 17 00:48:40.647000 audit[4746]: AVC avc: denied { perfmon } for pid=4746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:40.647000 audit[4746]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4733 pid=4746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:40.647000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231636331663965333133626538653438336363616338376430643430 May 17 00:48:40.647000 audit[4746]: AVC avc: denied { bpf } for pid=4746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:40.647000 audit[4746]: AVC avc: denied { bpf } for pid=4746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:40.647000 audit[4746]: AVC avc: denied { bpf } for pid=4746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:40.647000 audit[4746]: AVC avc: denied { perfmon } for pid=4746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:40.647000 audit[4746]: AVC avc: denied { perfmon } for pid=4746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:40.647000 audit[4746]: AVC avc: denied { perfmon } for pid=4746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:40.647000 audit[4746]: AVC avc: denied { perfmon } for pid=4746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:40.647000 audit[4746]: AVC avc: denied { perfmon } for pid=4746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:40.647000 audit[4746]: AVC avc: denied { bpf } for pid=4746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:40.647000 audit[4746]: AVC avc: denied { bpf } for pid=4746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:40.647000 audit: BPF prog-id=200 op=LOAD May 17 00:48:40.647000 audit[4746]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4733 pid=4746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:40.647000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231636331663965333133626538653438336363616338376430643430 May 17 00:48:40.647000 audit[4746]: AVC avc: denied { bpf } for pid=4746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:40.647000 audit[4746]: AVC avc: denied { bpf } for pid=4746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:40.647000 audit[4746]: AVC avc: denied { perfmon } for pid=4746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:40.647000 audit[4746]: AVC avc: denied { perfmon } for pid=4746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:40.647000 audit[4746]: AVC avc: denied { perfmon } for pid=4746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:40.647000 audit[4746]: AVC avc: denied { perfmon } for pid=4746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:40.647000 audit[4746]: AVC avc: denied { perfmon } for pid=4746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:40.647000 audit[4746]: AVC avc: denied { bpf } for pid=4746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:40.647000 audit[4746]: AVC avc: denied { bpf } for pid=4746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:40.647000 audit: BPF prog-id=201 op=LOAD May 17 00:48:40.647000 audit[4746]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4733 pid=4746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:40.647000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231636331663965333133626538653438336363616338376430643430 May 17 00:48:40.647000 audit: BPF prog-id=201 op=UNLOAD May 17 00:48:40.647000 audit: BPF prog-id=200 op=UNLOAD May 17 00:48:40.647000 audit[4746]: AVC avc: denied { bpf } for pid=4746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:40.647000 audit[4746]: AVC avc: denied { bpf } for pid=4746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:40.647000 audit[4746]: AVC avc: denied { bpf } for pid=4746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:40.647000 audit[4746]: AVC avc: denied { perfmon } for pid=4746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:40.647000 audit[4746]: AVC avc: denied { perfmon } for pid=4746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:40.647000 audit[4746]: AVC avc: denied { perfmon } for pid=4746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:40.647000 audit[4746]: AVC avc: denied { perfmon } for pid=4746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:40.647000 audit[4746]: AVC avc: denied { perfmon } for pid=4746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:40.647000 audit[4746]: AVC avc: denied { bpf } for pid=4746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:40.647000 audit[4746]: AVC avc: denied { bpf } for pid=4746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:40.647000 audit: BPF prog-id=202 op=LOAD May 17 00:48:40.647000 audit[4746]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4733 pid=4746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:40.647000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231636331663965333133626538653438336363616338376430643430 May 17 00:48:40.672190 env[1452]: time="2025-05-17T00:48:40.672138433Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-8f77d7b6c-78tx5,Uid:dc3b60ab-99b9-435e-bc94-f900356b518f,Namespace:calico-system,Attempt:1,} returns sandbox id \"21cc1f9e313be8e483ccac87d0d40dba1493a54897f8d67cf571117db16106ec\"" May 17 00:48:40.989139 kubelet[2511]: I0517 00:48:40.989072 2511 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-86b546bb5c-jpwk2" podStartSLOduration=31.359039198 podStartE2EDuration="34.989054715s" podCreationTimestamp="2025-05-17 00:48:06 +0000 UTC" firstStartedPulling="2025-05-17 00:48:35.901085283 +0000 UTC m=+45.581824719" lastFinishedPulling="2025-05-17 00:48:39.5311008 +0000 UTC m=+49.211840236" observedRunningTime="2025-05-17 00:48:40.987743201 +0000 UTC m=+50.668482637" watchObservedRunningTime="2025-05-17 00:48:40.989054715 +0000 UTC m=+50.669794151" May 17 00:48:41.006000 audit[4792]: NETFILTER_CFG table=filter:126 family=2 entries=14 op=nft_register_rule pid=4792 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:48:41.006000 audit[4792]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5248 a0=3 a1=ffffed04d740 a2=0 a3=1 items=0 ppid=2658 pid=4792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:41.006000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:48:41.011000 audit[4792]: NETFILTER_CFG table=nat:127 family=2 entries=20 op=nft_register_rule pid=4792 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:48:41.011000 audit[4792]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffed04d740 a2=0 a3=1 items=0 ppid=2658 pid=4792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:41.011000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:48:41.575000 audit[4630]: AVC avc: denied { watch } for pid=4630 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_48_22.2326522322/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c599,c689 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c599,c689 tclass=file permissive=0 May 17 00:48:41.575000 audit[4630]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000782160 a2=fc6 a3=0 items=0 ppid=4049 pid=4630 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c599,c689 key=(null) May 17 00:48:41.575000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:48:41.975301 kubelet[2511]: I0517 00:48:41.974823 2511 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:48:42.356171 systemd-networkd[1609]: cali8670511b544: Gained IPv6LL May 17 00:48:43.509936 env[1452]: time="2025-05-17T00:48:43.509885167Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:43.518444 env[1452]: time="2025-05-17T00:48:43.518396806Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4188fe2931435deda58a0dc1767a2f6ad2bb27e47662ccec626bd07006f56373,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:43.531301 env[1452]: time="2025-05-17T00:48:43.531253786Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:43.537425 env[1452]: time="2025-05-17T00:48:43.537373877Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:eb5bc5c9e7a71f1d8ea69bbcc8e54b84fb7ec1e32d919c8b148f80b770f20182,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:43.538379 env[1452]: time="2025-05-17T00:48:43.538341913Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.0\" returns image reference \"sha256:4188fe2931435deda58a0dc1767a2f6ad2bb27e47662ccec626bd07006f56373\"" May 17 00:48:43.541583 env[1452]: time="2025-05-17T00:48:43.541506218Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\"" May 17 00:48:43.563241 env[1452]: time="2025-05-17T00:48:43.563195156Z" level=info msg="CreateContainer within sandbox \"8925fd6e64a3dc4ec37266016fd876d1279e0907a71ce05ff983c83919308c9a\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" May 17 00:48:43.626844 env[1452]: time="2025-05-17T00:48:43.626787577Z" level=info msg="CreateContainer within sandbox \"8925fd6e64a3dc4ec37266016fd876d1279e0907a71ce05ff983c83919308c9a\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"0fe041b6526005d27dff24254e42a99f0d13b50fa49aaf1ddfe85280a4329309\"" May 17 00:48:43.627979 env[1452]: time="2025-05-17T00:48:43.627939171Z" level=info msg="StartContainer for \"0fe041b6526005d27dff24254e42a99f0d13b50fa49aaf1ddfe85280a4329309\"" May 17 00:48:43.652130 systemd[1]: Started cri-containerd-0fe041b6526005d27dff24254e42a99f0d13b50fa49aaf1ddfe85280a4329309.scope. May 17 00:48:43.696377 kernel: kauditd_printk_skb: 500 callbacks suppressed May 17 00:48:43.696528 kernel: audit: type=1400 audit(1747442923.672:1309): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.723592 kernel: audit: type=1400 audit(1747442923.672:1310): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.752217 kernel: audit: type=1400 audit(1747442923.672:1311): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.781373 kernel: audit: type=1400 audit(1747442923.672:1312): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.805429 kernel: audit: type=1400 audit(1747442923.672:1313): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.805595 kernel: audit: type=1400 audit(1747442923.672:1314): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.842457 kernel: audit: type=1400 audit(1747442923.672:1315): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.860816 kernel: audit: type=1400 audit(1747442923.672:1316): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.880548 kernel: audit: type=1400 audit(1747442923.672:1317): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.905920 kernel: audit: type=1400 audit(1747442923.678:1318): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.678000 audit: BPF prog-id=203 op=LOAD May 17 00:48:43.696000 audit[4806]: AVC avc: denied { bpf } for pid=4806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.696000 audit[4806]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4103 pid=4806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:43.696000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066653034316236353236303035643237646666323432353465343261 May 17 00:48:43.696000 audit[4806]: AVC avc: denied { perfmon } for pid=4806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.696000 audit[4806]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4103 pid=4806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:43.696000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066653034316236353236303035643237646666323432353465343261 May 17 00:48:43.696000 audit[4806]: AVC avc: denied { bpf } for pid=4806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.696000 audit[4806]: AVC avc: denied { bpf } for pid=4806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.696000 audit[4806]: AVC avc: denied { bpf } for pid=4806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.696000 audit[4806]: AVC avc: denied { perfmon } for pid=4806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.696000 audit[4806]: AVC avc: denied { perfmon } for pid=4806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.696000 audit[4806]: AVC avc: denied { perfmon } for pid=4806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.696000 audit[4806]: AVC avc: denied { perfmon } for pid=4806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.696000 audit[4806]: AVC avc: denied { perfmon } for pid=4806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.696000 audit[4806]: AVC avc: denied { bpf } for pid=4806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.696000 audit[4806]: AVC avc: denied { bpf } for pid=4806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.696000 audit: BPF prog-id=204 op=LOAD May 17 00:48:43.696000 audit[4806]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4103 pid=4806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:43.696000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066653034316236353236303035643237646666323432353465343261 May 17 00:48:43.696000 audit[4806]: AVC avc: denied { bpf } for pid=4806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.696000 audit[4806]: AVC avc: denied { bpf } for pid=4806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.696000 audit[4806]: AVC avc: denied { perfmon } for pid=4806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.696000 audit[4806]: AVC avc: denied { perfmon } for pid=4806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.696000 audit[4806]: AVC avc: denied { perfmon } for pid=4806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.696000 audit[4806]: AVC avc: denied { perfmon } for pid=4806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.696000 audit[4806]: AVC avc: denied { perfmon } for pid=4806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.696000 audit[4806]: AVC avc: denied { bpf } for pid=4806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.696000 audit[4806]: AVC avc: denied { bpf } for pid=4806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.696000 audit: BPF prog-id=205 op=LOAD May 17 00:48:43.696000 audit[4806]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4103 pid=4806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:43.696000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066653034316236353236303035643237646666323432353465343261 May 17 00:48:43.696000 audit: BPF prog-id=205 op=UNLOAD May 17 00:48:43.696000 audit: BPF prog-id=204 op=UNLOAD May 17 00:48:43.696000 audit[4806]: AVC avc: denied { bpf } for pid=4806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.696000 audit[4806]: AVC avc: denied { bpf } for pid=4806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.696000 audit[4806]: AVC avc: denied { bpf } for pid=4806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.696000 audit[4806]: AVC avc: denied { perfmon } for pid=4806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.696000 audit[4806]: AVC avc: denied { perfmon } for pid=4806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.696000 audit[4806]: AVC avc: denied { perfmon } for pid=4806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.696000 audit[4806]: AVC avc: denied { perfmon } for pid=4806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.696000 audit[4806]: AVC avc: denied { perfmon } for pid=4806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.696000 audit[4806]: AVC avc: denied { bpf } for pid=4806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.696000 audit[4806]: AVC avc: denied { bpf } for pid=4806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.696000 audit: BPF prog-id=206 op=LOAD May 17 00:48:43.696000 audit[4806]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4103 pid=4806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:43.696000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066653034316236353236303035643237646666323432353465343261 May 17 00:48:43.933508 env[1452]: time="2025-05-17T00:48:43.933450134Z" level=info msg="StartContainer for \"0fe041b6526005d27dff24254e42a99f0d13b50fa49aaf1ddfe85280a4329309\" returns successfully" May 17 00:48:43.958185 env[1452]: time="2025-05-17T00:48:43.958116898Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:43.982010 env[1452]: time="2025-05-17T00:48:43.981964146Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:0d503660232383641bf9af3b7e4ef066c0e96a8ec586f123e5b56b6a196c983d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:43.990807 env[1452]: time="2025-05-17T00:48:43.990761065Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:43.997489 env[1452]: time="2025-05-17T00:48:43.997431394Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:ad7d2e76f15777636c5d91c108d7655659b38fe8970255050ffa51223eb96ff4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:43.997699 env[1452]: time="2025-05-17T00:48:43.997663752Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\" returns image reference \"sha256:0d503660232383641bf9af3b7e4ef066c0e96a8ec586f123e5b56b6a196c983d\"" May 17 00:48:44.000127 env[1452]: time="2025-05-17T00:48:44.000083581Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.0\"" May 17 00:48:44.001809 env[1452]: time="2025-05-17T00:48:44.001746293Z" level=info msg="CreateContainer within sandbox \"45c8a9cd9085e31d07f45cbaf34e304420f5d4d2755c96bcc4ae2e21e9693cd8\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 17 00:48:44.051235 env[1452]: time="2025-05-17T00:48:44.051096224Z" level=info msg="CreateContainer within sandbox \"45c8a9cd9085e31d07f45cbaf34e304420f5d4d2755c96bcc4ae2e21e9693cd8\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"e5a02011853c42194b6492df47e76dbe1077bc65227ace9fd63c267e9cfbbf0d\"" May 17 00:48:44.052259 env[1452]: time="2025-05-17T00:48:44.052219419Z" level=info msg="StartContainer for \"e5a02011853c42194b6492df47e76dbe1077bc65227ace9fd63c267e9cfbbf0d\"" May 17 00:48:44.078609 systemd[1]: Started cri-containerd-e5a02011853c42194b6492df47e76dbe1077bc65227ace9fd63c267e9cfbbf0d.scope. May 17 00:48:44.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:44.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:44.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:44.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:44.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:44.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:44.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:44.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:44.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:44.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:44.093000 audit: BPF prog-id=207 op=LOAD May 17 00:48:44.094000 audit[4866]: AVC avc: denied { bpf } for pid=4866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:44.094000 audit[4866]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4359 pid=4866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:44.094000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535613032303131383533633432313934623634393264663437653736 May 17 00:48:44.094000 audit[4866]: AVC avc: denied { perfmon } for pid=4866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:44.094000 audit[4866]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4359 pid=4866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:44.094000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535613032303131383533633432313934623634393264663437653736 May 17 00:48:44.095000 audit[4866]: AVC avc: denied { bpf } for pid=4866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:44.095000 audit[4866]: AVC avc: denied { bpf } for pid=4866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:44.095000 audit[4866]: AVC avc: denied { bpf } for pid=4866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:44.095000 audit[4866]: AVC avc: denied { perfmon } for pid=4866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:44.095000 audit[4866]: AVC avc: denied { perfmon } for pid=4866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:44.095000 audit[4866]: AVC avc: denied { perfmon } for pid=4866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:44.095000 audit[4866]: AVC avc: denied { perfmon } for pid=4866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:44.095000 audit[4866]: AVC avc: denied { perfmon } for pid=4866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:44.095000 audit[4866]: AVC avc: denied { bpf } for pid=4866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:44.095000 audit[4866]: AVC avc: denied { bpf } for pid=4866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:44.095000 audit: BPF prog-id=208 op=LOAD May 17 00:48:44.095000 audit[4866]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4359 pid=4866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:44.095000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535613032303131383533633432313934623634393264663437653736 May 17 00:48:44.096000 audit[4866]: AVC avc: denied { bpf } for pid=4866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:44.096000 audit[4866]: AVC avc: denied { bpf } for pid=4866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:44.096000 audit[4866]: AVC avc: denied { perfmon } for pid=4866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:44.096000 audit[4866]: AVC avc: denied { perfmon } for pid=4866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:44.096000 audit[4866]: AVC avc: denied { perfmon } for pid=4866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:44.096000 audit[4866]: AVC avc: denied { perfmon } for pid=4866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:44.096000 audit[4866]: AVC avc: denied { perfmon } for pid=4866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:44.096000 audit[4866]: AVC avc: denied { bpf } for pid=4866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:44.096000 audit[4866]: AVC avc: denied { bpf } for pid=4866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:44.096000 audit: BPF prog-id=209 op=LOAD May 17 00:48:44.096000 audit[4866]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4359 pid=4866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:44.096000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535613032303131383533633432313934623634393264663437653736 May 17 00:48:44.096000 audit: BPF prog-id=209 op=UNLOAD May 17 00:48:44.096000 audit: BPF prog-id=208 op=UNLOAD May 17 00:48:44.096000 audit[4866]: AVC avc: denied { bpf } for pid=4866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:44.096000 audit[4866]: AVC avc: denied { bpf } for pid=4866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:44.096000 audit[4866]: AVC avc: denied { bpf } for pid=4866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:44.096000 audit[4866]: AVC avc: denied { perfmon } for pid=4866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:44.096000 audit[4866]: AVC avc: denied { perfmon } for pid=4866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:44.096000 audit[4866]: AVC avc: denied { perfmon } for pid=4866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:44.096000 audit[4866]: AVC avc: denied { perfmon } for pid=4866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:44.096000 audit[4866]: AVC avc: denied { perfmon } for pid=4866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:44.096000 audit[4866]: AVC avc: denied { bpf } for pid=4866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:44.096000 audit[4866]: AVC avc: denied { bpf } for pid=4866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:44.096000 audit: BPF prog-id=210 op=LOAD May 17 00:48:44.096000 audit[4866]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4359 pid=4866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:44.096000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535613032303131383533633432313934623634393264663437653736 May 17 00:48:44.123891 env[1452]: time="2025-05-17T00:48:44.123816767Z" level=info msg="StartContainer for \"e5a02011853c42194b6492df47e76dbe1077bc65227ace9fd63c267e9cfbbf0d\" returns successfully" May 17 00:48:45.022229 systemd[1]: run-containerd-runc-k8s.io-0fe041b6526005d27dff24254e42a99f0d13b50fa49aaf1ddfe85280a4329309-runc.Q5SoyT.mount: Deactivated successfully. May 17 00:48:45.024344 kubelet[2511]: I0517 00:48:45.023971 2511 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-6cdf59f477-fr7wb" podStartSLOduration=26.485965557 podStartE2EDuration="34.023940196s" podCreationTimestamp="2025-05-17 00:48:11 +0000 UTC" firstStartedPulling="2025-05-17 00:48:36.002339664 +0000 UTC m=+45.683079100" lastFinishedPulling="2025-05-17 00:48:43.540313783 +0000 UTC m=+53.221053739" observedRunningTime="2025-05-17 00:48:44.007410987 +0000 UTC m=+53.688150383" watchObservedRunningTime="2025-05-17 00:48:45.023940196 +0000 UTC m=+54.704679632" May 17 00:48:45.060000 audit[4916]: NETFILTER_CFG table=filter:128 family=2 entries=14 op=nft_register_rule pid=4916 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:48:45.060000 audit[4916]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5248 a0=3 a1=ffffc25296e0 a2=0 a3=1 items=0 ppid=2658 pid=4916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:45.060000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:48:45.064000 audit[4916]: NETFILTER_CFG table=nat:129 family=2 entries=20 op=nft_register_rule pid=4916 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:48:45.064000 audit[4916]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffc25296e0 a2=0 a3=1 items=0 ppid=2658 pid=4916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:45.064000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:48:45.103297 kubelet[2511]: I0517 00:48:45.103209 2511 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-86b546bb5c-f9pmr" podStartSLOduration=32.914793269 podStartE2EDuration="39.103191634s" podCreationTimestamp="2025-05-17 00:48:06 +0000 UTC" firstStartedPulling="2025-05-17 00:48:37.8108435 +0000 UTC m=+47.491582936" lastFinishedPulling="2025-05-17 00:48:43.999241865 +0000 UTC m=+53.679981301" observedRunningTime="2025-05-17 00:48:45.025045351 +0000 UTC m=+54.705784747" watchObservedRunningTime="2025-05-17 00:48:45.103191634 +0000 UTC m=+54.783931070" May 17 00:48:45.618414 env[1452]: time="2025-05-17T00:48:45.618365319Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:45.627918 env[1452]: time="2025-05-17T00:48:45.627876595Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ebe7e098653491dec9f15f87d7f5d33f47b09d1d6f3ef83deeaaa6237024c045,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:45.644523 env[1452]: time="2025-05-17T00:48:45.644480599Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:45.652089 env[1452]: time="2025-05-17T00:48:45.652046445Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:27883a4104876fe239311dd93ce6efd0c4a87de7163d57a4c8d96bd65a287ffd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:45.652540 env[1452]: time="2025-05-17T00:48:45.652511163Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.0\" returns image reference \"sha256:ebe7e098653491dec9f15f87d7f5d33f47b09d1d6f3ef83deeaaa6237024c045\"" May 17 00:48:45.654683 env[1452]: time="2025-05-17T00:48:45.654651313Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\"" May 17 00:48:45.655587 env[1452]: time="2025-05-17T00:48:45.655555509Z" level=info msg="CreateContainer within sandbox \"4e365bb20e73cc0c965632b0c053ad24a604d474456376a6ab88d66dc05a83c9\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 17 00:48:45.730726 env[1452]: time="2025-05-17T00:48:45.730660645Z" level=info msg="CreateContainer within sandbox \"4e365bb20e73cc0c965632b0c053ad24a604d474456376a6ab88d66dc05a83c9\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"aaea6fb74c3e83ab8bb48a4e0c79ec773a6ef421049f1cdc166e02ac52f04e32\"" May 17 00:48:45.731730 env[1452]: time="2025-05-17T00:48:45.731699001Z" level=info msg="StartContainer for \"aaea6fb74c3e83ab8bb48a4e0c79ec773a6ef421049f1cdc166e02ac52f04e32\"" May 17 00:48:45.773612 systemd[1]: Started cri-containerd-aaea6fb74c3e83ab8bb48a4e0c79ec773a6ef421049f1cdc166e02ac52f04e32.scope. May 17 00:48:45.838000 audit[4931]: AVC avc: denied { perfmon } for pid=4931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:45.838000 audit[4931]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=4423 pid=4931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:45.838000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161656136666237346333653833616238626234386134653063373965 May 17 00:48:45.838000 audit[4931]: AVC avc: denied { bpf } for pid=4931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:45.838000 audit[4931]: AVC avc: denied { bpf } for pid=4931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:45.838000 audit[4931]: AVC avc: denied { bpf } for pid=4931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:45.838000 audit[4931]: AVC avc: denied { perfmon } for pid=4931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:45.838000 audit[4931]: AVC avc: denied { perfmon } for pid=4931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:45.838000 audit[4931]: AVC avc: denied { perfmon } for pid=4931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:45.838000 audit[4931]: AVC avc: denied { perfmon } for pid=4931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:45.838000 audit[4931]: AVC avc: denied { perfmon } for pid=4931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:45.838000 audit[4931]: AVC avc: denied { bpf } for pid=4931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:45.838000 audit[4931]: AVC avc: denied { bpf } for pid=4931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:45.838000 audit: BPF prog-id=211 op=LOAD May 17 00:48:45.838000 audit[4931]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=4423 pid=4931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:45.838000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161656136666237346333653833616238626234386134653063373965 May 17 00:48:45.838000 audit[4931]: AVC avc: denied { bpf } for pid=4931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:45.838000 audit[4931]: AVC avc: denied { bpf } for pid=4931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:45.838000 audit[4931]: AVC avc: denied { perfmon } for pid=4931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:45.838000 audit[4931]: AVC avc: denied { perfmon } for pid=4931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:45.838000 audit[4931]: AVC avc: denied { perfmon } for pid=4931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:45.838000 audit[4931]: AVC avc: denied { perfmon } for pid=4931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:45.838000 audit[4931]: AVC avc: denied { perfmon } for pid=4931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:45.838000 audit[4931]: AVC avc: denied { bpf } for pid=4931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:45.838000 audit[4931]: AVC avc: denied { bpf } for pid=4931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:45.838000 audit: BPF prog-id=212 op=LOAD May 17 00:48:45.838000 audit[4931]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=4423 pid=4931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:45.838000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161656136666237346333653833616238626234386134653063373965 May 17 00:48:45.838000 audit: BPF prog-id=212 op=UNLOAD May 17 00:48:45.838000 audit: BPF prog-id=211 op=UNLOAD May 17 00:48:45.838000 audit[4931]: AVC avc: denied { bpf } for pid=4931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:45.838000 audit[4931]: AVC avc: denied { bpf } for pid=4931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:45.838000 audit[4931]: AVC avc: denied { bpf } for pid=4931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:45.838000 audit[4931]: AVC avc: denied { perfmon } for pid=4931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:45.838000 audit[4931]: AVC avc: denied { perfmon } for pid=4931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:45.838000 audit[4931]: AVC avc: denied { perfmon } for pid=4931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:45.838000 audit[4931]: AVC avc: denied { perfmon } for pid=4931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:45.838000 audit[4931]: AVC avc: denied { perfmon } for pid=4931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:45.838000 audit[4931]: AVC avc: denied { bpf } for pid=4931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:45.838000 audit[4931]: AVC avc: denied { bpf } for pid=4931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:45.838000 audit: BPF prog-id=213 op=LOAD May 17 00:48:45.838000 audit[4931]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=4423 pid=4931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:45.838000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161656136666237346333653833616238626234386134653063373965 May 17 00:48:45.850794 env[1452]: time="2025-05-17T00:48:45.850740256Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:48:45.856078 env[1452]: time="2025-05-17T00:48:45.856004792Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:48:45.857276 kubelet[2511]: E0517 00:48:45.857212 2511 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:48:45.857399 kubelet[2511]: E0517 00:48:45.857285 2511 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:48:45.857535 kubelet[2511]: E0517 00:48:45.857459 2511 kuberuntime_manager.go:1274] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-p6jf5,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-8f77d7b6c-78tx5_calico-system(dc3b60ab-99b9-435e-bc94-f900356b518f): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:48:45.859744 kubelet[2511]: E0517 00:48:45.859677 2511 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-8f77d7b6c-78tx5" podUID="dc3b60ab-99b9-435e-bc94-f900356b518f" May 17 00:48:45.873532 env[1452]: time="2025-05-17T00:48:45.873429513Z" level=info msg="StartContainer for \"aaea6fb74c3e83ab8bb48a4e0c79ec773a6ef421049f1cdc166e02ac52f04e32\" returns successfully" May 17 00:48:45.876432 env[1452]: time="2025-05-17T00:48:45.876384339Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0\"" May 17 00:48:45.991262 kubelet[2511]: E0517 00:48:45.990994 2511 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\"\"" pod="calico-system/goldmane-8f77d7b6c-78tx5" podUID="dc3b60ab-99b9-435e-bc94-f900356b518f" May 17 00:48:46.030000 audit[4958]: NETFILTER_CFG table=filter:130 family=2 entries=14 op=nft_register_rule pid=4958 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:48:46.030000 audit[4958]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5248 a0=3 a1=fffffe401430 a2=0 a3=1 items=0 ppid=2658 pid=4958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:46.030000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:48:46.038000 audit[4958]: NETFILTER_CFG table=nat:131 family=2 entries=20 op=nft_register_rule pid=4958 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:48:46.038000 audit[4958]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=fffffe401430 a2=0 a3=1 items=0 ppid=2658 pid=4958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:46.038000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:48:46.699040 systemd[1]: run-containerd-runc-k8s.io-aaea6fb74c3e83ab8bb48a4e0c79ec773a6ef421049f1cdc166e02ac52f04e32-runc.GEYBqi.mount: Deactivated successfully. May 17 00:48:46.784000 audit[4876]: AVC avc: denied { watch } for pid=4876 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_48_22.1045717489/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c752,c808 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c752,c808 tclass=file permissive=0 May 17 00:48:46.784000 audit[4876]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000f563e0 a2=fc6 a3=0 items=0 ppid=4359 pid=4876 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c752,c808 key=(null) May 17 00:48:46.784000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:48:46.952000 audit[4966]: NETFILTER_CFG table=filter:132 family=2 entries=13 op=nft_register_rule pid=4966 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:48:46.952000 audit[4966]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=ffffdc493160 a2=0 a3=1 items=0 ppid=2658 pid=4966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:46.952000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:48:46.970000 audit[4966]: NETFILTER_CFG table=nat:133 family=2 entries=27 op=nft_register_chain pid=4966 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:48:46.970000 audit[4966]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=9348 a0=3 a1=ffffdc493160 a2=0 a3=1 items=0 ppid=2658 pid=4966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:46.970000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:48:47.200000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c661,c791 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:48:47.200000 audit[2333]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=75 a1=400490f2c0 a2=fc6 a3=0 items=0 ppid=2196 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c661,c791 key=(null) May 17 00:48:47.200000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3432002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 00:48:47.201000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c661,c791 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:48:47.201000 audit[2333]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=75 a1=40115d24c0 a2=fc6 a3=0 items=0 ppid=2196 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c661,c791 key=(null) May 17 00:48:47.201000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3432002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 00:48:47.204000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520974 scontext=system_u:system_r:svirt_lxc_net_t:s0:c661,c791 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:48:47.204000 audit[2333]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=75 a1=400490f530 a2=fc6 a3=0 items=0 ppid=2196 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c661,c791 key=(null) May 17 00:48:47.204000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3432002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 00:48:47.220000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520980 scontext=system_u:system_r:svirt_lxc_net_t:s0:c661,c791 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:48:47.220000 audit[2333]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=75 a1=400490f7a0 a2=fc6 a3=0 items=0 ppid=2196 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c661,c791 key=(null) May 17 00:48:47.220000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3432002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 00:48:47.337000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c661,c791 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:48:47.337000 audit[2333]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=75 a1=4005400020 a2=fc6 a3=0 items=0 ppid=2196 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c661,c791 key=(null) May 17 00:48:47.337000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3432002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 00:48:47.337000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c661,c791 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:48:47.337000 audit[2333]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=75 a1=40126cc240 a2=fc6 a3=0 items=0 ppid=2196 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c661,c791 key=(null) May 17 00:48:47.337000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3432002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 00:48:47.935000 audit[2391]: AVC avc: denied { watch } for pid=2391 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c122,c191 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:48:47.935000 audit[2391]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4002c826c0 a2=fc6 a3=0 items=0 ppid=2229 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c122,c191 key=(null) May 17 00:48:47.935000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:48:47.935000 audit[2391]: AVC avc: denied { watch } for pid=2391 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c122,c191 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:48:47.935000 audit[2391]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4002c24f90 a2=fc6 a3=0 items=0 ppid=2229 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c122,c191 key=(null) May 17 00:48:47.935000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:48:48.082363 env[1452]: time="2025-05-17T00:48:48.082314297Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:48.092869 env[1452]: time="2025-05-17T00:48:48.092811971Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a5d5f2a68204ed0dbc50f8778616ee92a63c0e342d178a4620e6271484e5c8b2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:48.099987 env[1452]: time="2025-05-17T00:48:48.099941700Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:48.111900 env[1452]: time="2025-05-17T00:48:48.111828408Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:dca5c16181edde2e860463615523ce457cd9dcfca85b7cfdcd6f3ea7de6f2ac8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:48.112425 env[1452]: time="2025-05-17T00:48:48.112380606Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0\" returns image reference \"sha256:a5d5f2a68204ed0dbc50f8778616ee92a63c0e342d178a4620e6271484e5c8b2\"" May 17 00:48:48.115058 env[1452]: time="2025-05-17T00:48:48.115006954Z" level=info msg="CreateContainer within sandbox \"4e365bb20e73cc0c965632b0c053ad24a604d474456376a6ab88d66dc05a83c9\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 17 00:48:48.166038 env[1452]: time="2025-05-17T00:48:48.165988970Z" level=info msg="CreateContainer within sandbox \"4e365bb20e73cc0c965632b0c053ad24a604d474456376a6ab88d66dc05a83c9\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"f8848e5d5d71a994ceb840af101cc355bdaecd994cf64279b7ec329ef42ccef4\"" May 17 00:48:48.167061 env[1452]: time="2025-05-17T00:48:48.167027326Z" level=info msg="StartContainer for \"f8848e5d5d71a994ceb840af101cc355bdaecd994cf64279b7ec329ef42ccef4\"" May 17 00:48:48.206128 systemd[1]: Started cri-containerd-f8848e5d5d71a994ceb840af101cc355bdaecd994cf64279b7ec329ef42ccef4.scope. May 17 00:48:48.245000 audit[4975]: AVC avc: denied { perfmon } for pid=4975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:48.245000 audit[4975]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=4423 pid=4975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:48.245000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638383438653564356437316139393463656238343061663130316363 May 17 00:48:48.245000 audit[4975]: AVC avc: denied { bpf } for pid=4975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:48.245000 audit[4975]: AVC avc: denied { bpf } for pid=4975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:48.245000 audit[4975]: AVC avc: denied { bpf } for pid=4975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:48.245000 audit[4975]: AVC avc: denied { perfmon } for pid=4975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:48.245000 audit[4975]: AVC avc: denied { perfmon } for pid=4975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:48.245000 audit[4975]: AVC avc: denied { perfmon } for pid=4975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:48.245000 audit[4975]: AVC avc: denied { perfmon } for pid=4975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:48.245000 audit[4975]: AVC avc: denied { perfmon } for pid=4975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:48.245000 audit[4975]: AVC avc: denied { bpf } for pid=4975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:48.245000 audit[4975]: AVC avc: denied { bpf } for pid=4975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:48.245000 audit: BPF prog-id=214 op=LOAD May 17 00:48:48.245000 audit[4975]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=4423 pid=4975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:48.245000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638383438653564356437316139393463656238343061663130316363 May 17 00:48:48.246000 audit[4975]: AVC avc: denied { bpf } for pid=4975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:48.246000 audit[4975]: AVC avc: denied { bpf } for pid=4975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:48.246000 audit[4975]: AVC avc: denied { perfmon } for pid=4975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:48.246000 audit[4975]: AVC avc: denied { perfmon } for pid=4975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:48.246000 audit[4975]: AVC avc: denied { perfmon } for pid=4975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:48.246000 audit[4975]: AVC avc: denied { perfmon } for pid=4975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:48.246000 audit[4975]: AVC avc: denied { perfmon } for pid=4975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:48.246000 audit[4975]: AVC avc: denied { bpf } for pid=4975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:48.246000 audit[4975]: AVC avc: denied { bpf } for pid=4975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:48.246000 audit: BPF prog-id=215 op=LOAD May 17 00:48:48.246000 audit[4975]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=4423 pid=4975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:48.246000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638383438653564356437316139393463656238343061663130316363 May 17 00:48:48.246000 audit: BPF prog-id=215 op=UNLOAD May 17 00:48:48.247000 audit: BPF prog-id=214 op=UNLOAD May 17 00:48:48.247000 audit[4975]: AVC avc: denied { bpf } for pid=4975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:48.247000 audit[4975]: AVC avc: denied { bpf } for pid=4975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:48.247000 audit[4975]: AVC avc: denied { bpf } for pid=4975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:48.247000 audit[4975]: AVC avc: denied { perfmon } for pid=4975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:48.247000 audit[4975]: AVC avc: denied { perfmon } for pid=4975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:48.247000 audit[4975]: AVC avc: denied { perfmon } for pid=4975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:48.247000 audit[4975]: AVC avc: denied { perfmon } for pid=4975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:48.247000 audit[4975]: AVC avc: denied { perfmon } for pid=4975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:48.247000 audit[4975]: AVC avc: denied { bpf } for pid=4975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:48.247000 audit[4975]: AVC avc: denied { bpf } for pid=4975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:48.247000 audit: BPF prog-id=216 op=LOAD May 17 00:48:48.247000 audit[4975]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=4423 pid=4975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:48.247000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638383438653564356437316139393463656238343061663130316363 May 17 00:48:48.334626 env[1452]: time="2025-05-17T00:48:48.334554951Z" level=info msg="StartContainer for \"f8848e5d5d71a994ceb840af101cc355bdaecd994cf64279b7ec329ef42ccef4\" returns successfully" May 17 00:48:48.882920 kubelet[2511]: I0517 00:48:48.882837 2511 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 17 00:48:48.883353 kubelet[2511]: I0517 00:48:48.883338 2511 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 17 00:48:49.014001 kubelet[2511]: I0517 00:48:49.013935 2511 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-mqsn2" podStartSLOduration=28.837914816 podStartE2EDuration="39.01391801s" podCreationTimestamp="2025-05-17 00:48:10 +0000 UTC" firstStartedPulling="2025-05-17 00:48:37.937488047 +0000 UTC m=+47.618227483" lastFinishedPulling="2025-05-17 00:48:48.113491281 +0000 UTC m=+57.794230677" observedRunningTime="2025-05-17 00:48:49.012558856 +0000 UTC m=+58.693298252" watchObservedRunningTime="2025-05-17 00:48:49.01391801 +0000 UTC m=+58.694657406" May 17 00:48:49.147419 systemd[1]: run-containerd-runc-k8s.io-f8848e5d5d71a994ceb840af101cc355bdaecd994cf64279b7ec329ef42ccef4-runc.75MDXB.mount: Deactivated successfully. May 17 00:48:49.720221 env[1452]: time="2025-05-17T00:48:49.719954833Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\"" May 17 00:48:49.896320 env[1452]: time="2025-05-17T00:48:49.896225909Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:48:49.900612 env[1452]: time="2025-05-17T00:48:49.900524931Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:48:49.900909 kubelet[2511]: E0517 00:48:49.900834 2511 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:48:49.901179 kubelet[2511]: E0517 00:48:49.900920 2511 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:48:49.901179 kubelet[2511]: E0517 00:48:49.901054 2511 kuberuntime_manager.go:1274] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.0,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:f515ef07f4944df1b53f071bfd4a71b4,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-98cxh,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-5c6b5ff985-qsbbb_calico-system(1034e955-0d22-4661-9e47-81fdd9a27aa3): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:48:49.903792 env[1452]: time="2025-05-17T00:48:49.903743837Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\"" May 17 00:48:50.084967 env[1452]: time="2025-05-17T00:48:50.084825097Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:48:50.088154 env[1452]: time="2025-05-17T00:48:50.088089843Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:48:50.088593 kubelet[2511]: E0517 00:48:50.088528 2511 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:48:50.088680 kubelet[2511]: E0517 00:48:50.088607 2511 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:48:50.088779 kubelet[2511]: E0517 00:48:50.088724 2511 kuberuntime_manager.go:1274] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-98cxh,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-5c6b5ff985-qsbbb_calico-system(1034e955-0d22-4661-9e47-81fdd9a27aa3): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:48:50.090425 kubelet[2511]: E0517 00:48:50.090372 2511 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-5c6b5ff985-qsbbb" podUID="1034e955-0d22-4661-9e47-81fdd9a27aa3" May 17 00:48:50.753447 env[1452]: time="2025-05-17T00:48:50.753394559Z" level=info msg="StopPodSandbox for \"d02ec9e0916eb99bf802ca6be9e9a4731f876af349990f3a74d882c617ed7772\"" May 17 00:48:50.865912 env[1452]: 2025-05-17 00:48:50.803 [WARNING][5016] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d02ec9e0916eb99bf802ca6be9e9a4731f876af349990f3a74d882c617ed7772" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--6523ff94dd-k8s-calico--apiserver--86b546bb5c--jpwk2-eth0", GenerateName:"calico-apiserver-86b546bb5c-", Namespace:"calico-apiserver", SelfLink:"", UID:"82f2f80c-103d-408f-831d-8869219e2fae", ResourceVersion:"1022", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 48, 6, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"86b546bb5c", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-6523ff94dd", ContainerID:"64768cfde28b6138611a687f8b053d38d744ed122aa149a291af662d525e2956", Pod:"calico-apiserver-86b546bb5c-jpwk2", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.38.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calicae6a0ef99d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:48:50.865912 env[1452]: 2025-05-17 00:48:50.803 [INFO][5016] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="d02ec9e0916eb99bf802ca6be9e9a4731f876af349990f3a74d882c617ed7772" May 17 00:48:50.865912 env[1452]: 2025-05-17 00:48:50.803 [INFO][5016] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d02ec9e0916eb99bf802ca6be9e9a4731f876af349990f3a74d882c617ed7772" iface="eth0" netns="" May 17 00:48:50.865912 env[1452]: 2025-05-17 00:48:50.803 [INFO][5016] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="d02ec9e0916eb99bf802ca6be9e9a4731f876af349990f3a74d882c617ed7772" May 17 00:48:50.865912 env[1452]: 2025-05-17 00:48:50.803 [INFO][5016] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d02ec9e0916eb99bf802ca6be9e9a4731f876af349990f3a74d882c617ed7772" May 17 00:48:50.865912 env[1452]: 2025-05-17 00:48:50.842 [INFO][5023] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d02ec9e0916eb99bf802ca6be9e9a4731f876af349990f3a74d882c617ed7772" HandleID="k8s-pod-network.d02ec9e0916eb99bf802ca6be9e9a4731f876af349990f3a74d882c617ed7772" Workload="ci--3510.3.7--n--6523ff94dd-k8s-calico--apiserver--86b546bb5c--jpwk2-eth0" May 17 00:48:50.865912 env[1452]: 2025-05-17 00:48:50.843 [INFO][5023] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:48:50.865912 env[1452]: 2025-05-17 00:48:50.843 [INFO][5023] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:48:50.865912 env[1452]: 2025-05-17 00:48:50.859 [WARNING][5023] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d02ec9e0916eb99bf802ca6be9e9a4731f876af349990f3a74d882c617ed7772" HandleID="k8s-pod-network.d02ec9e0916eb99bf802ca6be9e9a4731f876af349990f3a74d882c617ed7772" Workload="ci--3510.3.7--n--6523ff94dd-k8s-calico--apiserver--86b546bb5c--jpwk2-eth0" May 17 00:48:50.865912 env[1452]: 2025-05-17 00:48:50.859 [INFO][5023] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d02ec9e0916eb99bf802ca6be9e9a4731f876af349990f3a74d882c617ed7772" HandleID="k8s-pod-network.d02ec9e0916eb99bf802ca6be9e9a4731f876af349990f3a74d882c617ed7772" Workload="ci--3510.3.7--n--6523ff94dd-k8s-calico--apiserver--86b546bb5c--jpwk2-eth0" May 17 00:48:50.865912 env[1452]: 2025-05-17 00:48:50.861 [INFO][5023] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:48:50.865912 env[1452]: 2025-05-17 00:48:50.862 [INFO][5016] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="d02ec9e0916eb99bf802ca6be9e9a4731f876af349990f3a74d882c617ed7772" May 17 00:48:50.865912 env[1452]: time="2025-05-17T00:48:50.865078401Z" level=info msg="TearDown network for sandbox \"d02ec9e0916eb99bf802ca6be9e9a4731f876af349990f3a74d882c617ed7772\" successfully" May 17 00:48:50.865912 env[1452]: time="2025-05-17T00:48:50.865111761Z" level=info msg="StopPodSandbox for \"d02ec9e0916eb99bf802ca6be9e9a4731f876af349990f3a74d882c617ed7772\" returns successfully" May 17 00:48:50.865912 env[1452]: time="2025-05-17T00:48:50.865754198Z" level=info msg="RemovePodSandbox for \"d02ec9e0916eb99bf802ca6be9e9a4731f876af349990f3a74d882c617ed7772\"" May 17 00:48:50.865912 env[1452]: time="2025-05-17T00:48:50.865790278Z" level=info msg="Forcibly stopping sandbox \"d02ec9e0916eb99bf802ca6be9e9a4731f876af349990f3a74d882c617ed7772\"" May 17 00:48:50.969855 env[1452]: 2025-05-17 00:48:50.922 [WARNING][5040] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d02ec9e0916eb99bf802ca6be9e9a4731f876af349990f3a74d882c617ed7772" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--6523ff94dd-k8s-calico--apiserver--86b546bb5c--jpwk2-eth0", GenerateName:"calico-apiserver-86b546bb5c-", Namespace:"calico-apiserver", SelfLink:"", UID:"82f2f80c-103d-408f-831d-8869219e2fae", ResourceVersion:"1022", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 48, 6, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"86b546bb5c", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-6523ff94dd", ContainerID:"64768cfde28b6138611a687f8b053d38d744ed122aa149a291af662d525e2956", Pod:"calico-apiserver-86b546bb5c-jpwk2", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.38.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calicae6a0ef99d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:48:50.969855 env[1452]: 2025-05-17 00:48:50.925 [INFO][5040] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="d02ec9e0916eb99bf802ca6be9e9a4731f876af349990f3a74d882c617ed7772" May 17 00:48:50.969855 env[1452]: 2025-05-17 00:48:50.925 [INFO][5040] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d02ec9e0916eb99bf802ca6be9e9a4731f876af349990f3a74d882c617ed7772" iface="eth0" netns="" May 17 00:48:50.969855 env[1452]: 2025-05-17 00:48:50.925 [INFO][5040] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="d02ec9e0916eb99bf802ca6be9e9a4731f876af349990f3a74d882c617ed7772" May 17 00:48:50.969855 env[1452]: 2025-05-17 00:48:50.925 [INFO][5040] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d02ec9e0916eb99bf802ca6be9e9a4731f876af349990f3a74d882c617ed7772" May 17 00:48:50.969855 env[1452]: 2025-05-17 00:48:50.952 [INFO][5048] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d02ec9e0916eb99bf802ca6be9e9a4731f876af349990f3a74d882c617ed7772" HandleID="k8s-pod-network.d02ec9e0916eb99bf802ca6be9e9a4731f876af349990f3a74d882c617ed7772" Workload="ci--3510.3.7--n--6523ff94dd-k8s-calico--apiserver--86b546bb5c--jpwk2-eth0" May 17 00:48:50.969855 env[1452]: 2025-05-17 00:48:50.952 [INFO][5048] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:48:50.969855 env[1452]: 2025-05-17 00:48:50.952 [INFO][5048] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:48:50.969855 env[1452]: 2025-05-17 00:48:50.965 [WARNING][5048] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d02ec9e0916eb99bf802ca6be9e9a4731f876af349990f3a74d882c617ed7772" HandleID="k8s-pod-network.d02ec9e0916eb99bf802ca6be9e9a4731f876af349990f3a74d882c617ed7772" Workload="ci--3510.3.7--n--6523ff94dd-k8s-calico--apiserver--86b546bb5c--jpwk2-eth0" May 17 00:48:50.969855 env[1452]: 2025-05-17 00:48:50.965 [INFO][5048] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d02ec9e0916eb99bf802ca6be9e9a4731f876af349990f3a74d882c617ed7772" HandleID="k8s-pod-network.d02ec9e0916eb99bf802ca6be9e9a4731f876af349990f3a74d882c617ed7772" Workload="ci--3510.3.7--n--6523ff94dd-k8s-calico--apiserver--86b546bb5c--jpwk2-eth0" May 17 00:48:50.969855 env[1452]: 2025-05-17 00:48:50.967 [INFO][5048] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:48:50.969855 env[1452]: 2025-05-17 00:48:50.968 [INFO][5040] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="d02ec9e0916eb99bf802ca6be9e9a4731f876af349990f3a74d882c617ed7772" May 17 00:48:50.970337 env[1452]: time="2025-05-17T00:48:50.969901593Z" level=info msg="TearDown network for sandbox \"d02ec9e0916eb99bf802ca6be9e9a4731f876af349990f3a74d882c617ed7772\" successfully" May 17 00:48:50.982821 env[1452]: time="2025-05-17T00:48:50.982762098Z" level=info msg="RemovePodSandbox \"d02ec9e0916eb99bf802ca6be9e9a4731f876af349990f3a74d882c617ed7772\" returns successfully" May 17 00:48:50.983427 env[1452]: time="2025-05-17T00:48:50.983394335Z" level=info msg="StopPodSandbox for \"9712dac8e71cec13cad3378b92a933b51563f4bbcc4dfb040aa59ed700ab5798\"" May 17 00:48:51.136582 env[1452]: 2025-05-17 00:48:51.041 [WARNING][5062] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9712dac8e71cec13cad3378b92a933b51563f4bbcc4dfb040aa59ed700ab5798" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--6523ff94dd-k8s-coredns--7c65d6cfc9--9bbtw-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"6fb16588-55b1-4adf-9d05-4d2e2212101f", ResourceVersion:"985", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 47, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-6523ff94dd", ContainerID:"f06c5f78e775b60fe2efa48f0057c045e9152b9dbe46bb8c5baa0dbda5df3d3d", Pod:"coredns-7c65d6cfc9-9bbtw", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.38.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali72210455a87", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:48:51.136582 env[1452]: 2025-05-17 00:48:51.042 [INFO][5062] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="9712dac8e71cec13cad3378b92a933b51563f4bbcc4dfb040aa59ed700ab5798" May 17 00:48:51.136582 env[1452]: 2025-05-17 00:48:51.042 [INFO][5062] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9712dac8e71cec13cad3378b92a933b51563f4bbcc4dfb040aa59ed700ab5798" iface="eth0" netns="" May 17 00:48:51.136582 env[1452]: 2025-05-17 00:48:51.042 [INFO][5062] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="9712dac8e71cec13cad3378b92a933b51563f4bbcc4dfb040aa59ed700ab5798" May 17 00:48:51.136582 env[1452]: 2025-05-17 00:48:51.042 [INFO][5062] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9712dac8e71cec13cad3378b92a933b51563f4bbcc4dfb040aa59ed700ab5798" May 17 00:48:51.136582 env[1452]: 2025-05-17 00:48:51.106 [INFO][5069] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9712dac8e71cec13cad3378b92a933b51563f4bbcc4dfb040aa59ed700ab5798" HandleID="k8s-pod-network.9712dac8e71cec13cad3378b92a933b51563f4bbcc4dfb040aa59ed700ab5798" Workload="ci--3510.3.7--n--6523ff94dd-k8s-coredns--7c65d6cfc9--9bbtw-eth0" May 17 00:48:51.136582 env[1452]: 2025-05-17 00:48:51.106 [INFO][5069] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:48:51.136582 env[1452]: 2025-05-17 00:48:51.106 [INFO][5069] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:48:51.136582 env[1452]: 2025-05-17 00:48:51.132 [WARNING][5069] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9712dac8e71cec13cad3378b92a933b51563f4bbcc4dfb040aa59ed700ab5798" HandleID="k8s-pod-network.9712dac8e71cec13cad3378b92a933b51563f4bbcc4dfb040aa59ed700ab5798" Workload="ci--3510.3.7--n--6523ff94dd-k8s-coredns--7c65d6cfc9--9bbtw-eth0" May 17 00:48:51.136582 env[1452]: 2025-05-17 00:48:51.132 [INFO][5069] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9712dac8e71cec13cad3378b92a933b51563f4bbcc4dfb040aa59ed700ab5798" HandleID="k8s-pod-network.9712dac8e71cec13cad3378b92a933b51563f4bbcc4dfb040aa59ed700ab5798" Workload="ci--3510.3.7--n--6523ff94dd-k8s-coredns--7c65d6cfc9--9bbtw-eth0" May 17 00:48:51.136582 env[1452]: 2025-05-17 00:48:51.133 [INFO][5069] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:48:51.136582 env[1452]: 2025-05-17 00:48:51.135 [INFO][5062] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="9712dac8e71cec13cad3378b92a933b51563f4bbcc4dfb040aa59ed700ab5798" May 17 00:48:51.137131 env[1452]: time="2025-05-17T00:48:51.137077766Z" level=info msg="TearDown network for sandbox \"9712dac8e71cec13cad3378b92a933b51563f4bbcc4dfb040aa59ed700ab5798\" successfully" May 17 00:48:51.137203 env[1452]: time="2025-05-17T00:48:51.137185685Z" level=info msg="StopPodSandbox for \"9712dac8e71cec13cad3378b92a933b51563f4bbcc4dfb040aa59ed700ab5798\" returns successfully" May 17 00:48:51.138486 env[1452]: time="2025-05-17T00:48:51.138182561Z" level=info msg="RemovePodSandbox for \"9712dac8e71cec13cad3378b92a933b51563f4bbcc4dfb040aa59ed700ab5798\"" May 17 00:48:51.138486 env[1452]: time="2025-05-17T00:48:51.138223121Z" level=info msg="Forcibly stopping sandbox \"9712dac8e71cec13cad3378b92a933b51563f4bbcc4dfb040aa59ed700ab5798\"" May 17 00:48:51.227016 env[1452]: 2025-05-17 00:48:51.185 [WARNING][5084] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9712dac8e71cec13cad3378b92a933b51563f4bbcc4dfb040aa59ed700ab5798" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--6523ff94dd-k8s-coredns--7c65d6cfc9--9bbtw-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"6fb16588-55b1-4adf-9d05-4d2e2212101f", ResourceVersion:"985", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 47, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-6523ff94dd", ContainerID:"f06c5f78e775b60fe2efa48f0057c045e9152b9dbe46bb8c5baa0dbda5df3d3d", Pod:"coredns-7c65d6cfc9-9bbtw", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.38.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali72210455a87", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:48:51.227016 env[1452]: 2025-05-17 00:48:51.186 [INFO][5084] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="9712dac8e71cec13cad3378b92a933b51563f4bbcc4dfb040aa59ed700ab5798" May 17 00:48:51.227016 env[1452]: 2025-05-17 00:48:51.186 [INFO][5084] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9712dac8e71cec13cad3378b92a933b51563f4bbcc4dfb040aa59ed700ab5798" iface="eth0" netns="" May 17 00:48:51.227016 env[1452]: 2025-05-17 00:48:51.186 [INFO][5084] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="9712dac8e71cec13cad3378b92a933b51563f4bbcc4dfb040aa59ed700ab5798" May 17 00:48:51.227016 env[1452]: 2025-05-17 00:48:51.186 [INFO][5084] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9712dac8e71cec13cad3378b92a933b51563f4bbcc4dfb040aa59ed700ab5798" May 17 00:48:51.227016 env[1452]: 2025-05-17 00:48:51.212 [INFO][5091] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9712dac8e71cec13cad3378b92a933b51563f4bbcc4dfb040aa59ed700ab5798" HandleID="k8s-pod-network.9712dac8e71cec13cad3378b92a933b51563f4bbcc4dfb040aa59ed700ab5798" Workload="ci--3510.3.7--n--6523ff94dd-k8s-coredns--7c65d6cfc9--9bbtw-eth0" May 17 00:48:51.227016 env[1452]: 2025-05-17 00:48:51.212 [INFO][5091] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:48:51.227016 env[1452]: 2025-05-17 00:48:51.212 [INFO][5091] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:48:51.227016 env[1452]: 2025-05-17 00:48:51.222 [WARNING][5091] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9712dac8e71cec13cad3378b92a933b51563f4bbcc4dfb040aa59ed700ab5798" HandleID="k8s-pod-network.9712dac8e71cec13cad3378b92a933b51563f4bbcc4dfb040aa59ed700ab5798" Workload="ci--3510.3.7--n--6523ff94dd-k8s-coredns--7c65d6cfc9--9bbtw-eth0" May 17 00:48:51.227016 env[1452]: 2025-05-17 00:48:51.222 [INFO][5091] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9712dac8e71cec13cad3378b92a933b51563f4bbcc4dfb040aa59ed700ab5798" HandleID="k8s-pod-network.9712dac8e71cec13cad3378b92a933b51563f4bbcc4dfb040aa59ed700ab5798" Workload="ci--3510.3.7--n--6523ff94dd-k8s-coredns--7c65d6cfc9--9bbtw-eth0" May 17 00:48:51.227016 env[1452]: 2025-05-17 00:48:51.224 [INFO][5091] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:48:51.227016 env[1452]: 2025-05-17 00:48:51.225 [INFO][5084] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="9712dac8e71cec13cad3378b92a933b51563f4bbcc4dfb040aa59ed700ab5798" May 17 00:48:51.227585 env[1452]: time="2025-05-17T00:48:51.227539744Z" level=info msg="TearDown network for sandbox \"9712dac8e71cec13cad3378b92a933b51563f4bbcc4dfb040aa59ed700ab5798\" successfully" May 17 00:48:51.237010 env[1452]: time="2025-05-17T00:48:51.236951304Z" level=info msg="RemovePodSandbox \"9712dac8e71cec13cad3378b92a933b51563f4bbcc4dfb040aa59ed700ab5798\" returns successfully" May 17 00:48:51.237754 env[1452]: time="2025-05-17T00:48:51.237718101Z" level=info msg="StopPodSandbox for \"2bdcc7637ca0f5f39fdf5a216cf0bd20dc22d842d8a0e6851b7718601999a14f\"" May 17 00:48:51.351313 env[1452]: 2025-05-17 00:48:51.304 [WARNING][5105] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="2bdcc7637ca0f5f39fdf5a216cf0bd20dc22d842d8a0e6851b7718601999a14f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--6523ff94dd-k8s-calico--kube--controllers--6cdf59f477--fr7wb-eth0", GenerateName:"calico-kube-controllers-6cdf59f477-", Namespace:"calico-system", SelfLink:"", UID:"e98971c7-2262-4242-8532-c18d59231219", ResourceVersion:"1054", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 48, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6cdf59f477", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-6523ff94dd", ContainerID:"8925fd6e64a3dc4ec37266016fd876d1279e0907a71ce05ff983c83919308c9a", Pod:"calico-kube-controllers-6cdf59f477-fr7wb", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.38.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calidb2c5fa104b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:48:51.351313 env[1452]: 2025-05-17 00:48:51.304 [INFO][5105] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="2bdcc7637ca0f5f39fdf5a216cf0bd20dc22d842d8a0e6851b7718601999a14f" May 17 00:48:51.351313 env[1452]: 2025-05-17 00:48:51.305 [INFO][5105] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="2bdcc7637ca0f5f39fdf5a216cf0bd20dc22d842d8a0e6851b7718601999a14f" iface="eth0" netns="" May 17 00:48:51.351313 env[1452]: 2025-05-17 00:48:51.305 [INFO][5105] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="2bdcc7637ca0f5f39fdf5a216cf0bd20dc22d842d8a0e6851b7718601999a14f" May 17 00:48:51.351313 env[1452]: 2025-05-17 00:48:51.305 [INFO][5105] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2bdcc7637ca0f5f39fdf5a216cf0bd20dc22d842d8a0e6851b7718601999a14f" May 17 00:48:51.351313 env[1452]: 2025-05-17 00:48:51.335 [INFO][5112] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2bdcc7637ca0f5f39fdf5a216cf0bd20dc22d842d8a0e6851b7718601999a14f" HandleID="k8s-pod-network.2bdcc7637ca0f5f39fdf5a216cf0bd20dc22d842d8a0e6851b7718601999a14f" Workload="ci--3510.3.7--n--6523ff94dd-k8s-calico--kube--controllers--6cdf59f477--fr7wb-eth0" May 17 00:48:51.351313 env[1452]: 2025-05-17 00:48:51.336 [INFO][5112] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:48:51.351313 env[1452]: 2025-05-17 00:48:51.336 [INFO][5112] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:48:51.351313 env[1452]: 2025-05-17 00:48:51.346 [WARNING][5112] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2bdcc7637ca0f5f39fdf5a216cf0bd20dc22d842d8a0e6851b7718601999a14f" HandleID="k8s-pod-network.2bdcc7637ca0f5f39fdf5a216cf0bd20dc22d842d8a0e6851b7718601999a14f" Workload="ci--3510.3.7--n--6523ff94dd-k8s-calico--kube--controllers--6cdf59f477--fr7wb-eth0" May 17 00:48:51.351313 env[1452]: 2025-05-17 00:48:51.346 [INFO][5112] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2bdcc7637ca0f5f39fdf5a216cf0bd20dc22d842d8a0e6851b7718601999a14f" HandleID="k8s-pod-network.2bdcc7637ca0f5f39fdf5a216cf0bd20dc22d842d8a0e6851b7718601999a14f" Workload="ci--3510.3.7--n--6523ff94dd-k8s-calico--kube--controllers--6cdf59f477--fr7wb-eth0" May 17 00:48:51.351313 env[1452]: 2025-05-17 00:48:51.348 [INFO][5112] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:48:51.351313 env[1452]: 2025-05-17 00:48:51.349 [INFO][5105] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="2bdcc7637ca0f5f39fdf5a216cf0bd20dc22d842d8a0e6851b7718601999a14f" May 17 00:48:51.351779 env[1452]: time="2025-05-17T00:48:51.351337541Z" level=info msg="TearDown network for sandbox \"2bdcc7637ca0f5f39fdf5a216cf0bd20dc22d842d8a0e6851b7718601999a14f\" successfully" May 17 00:48:51.351779 env[1452]: time="2025-05-17T00:48:51.351370181Z" level=info msg="StopPodSandbox for \"2bdcc7637ca0f5f39fdf5a216cf0bd20dc22d842d8a0e6851b7718601999a14f\" returns successfully" May 17 00:48:51.352278 env[1452]: time="2025-05-17T00:48:51.352241377Z" level=info msg="RemovePodSandbox for \"2bdcc7637ca0f5f39fdf5a216cf0bd20dc22d842d8a0e6851b7718601999a14f\"" May 17 00:48:51.352370 env[1452]: time="2025-05-17T00:48:51.352278897Z" level=info msg="Forcibly stopping sandbox \"2bdcc7637ca0f5f39fdf5a216cf0bd20dc22d842d8a0e6851b7718601999a14f\"" May 17 00:48:51.481137 env[1452]: 2025-05-17 00:48:51.433 [WARNING][5126] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="2bdcc7637ca0f5f39fdf5a216cf0bd20dc22d842d8a0e6851b7718601999a14f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--6523ff94dd-k8s-calico--kube--controllers--6cdf59f477--fr7wb-eth0", GenerateName:"calico-kube-controllers-6cdf59f477-", Namespace:"calico-system", SelfLink:"", UID:"e98971c7-2262-4242-8532-c18d59231219", ResourceVersion:"1054", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 48, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6cdf59f477", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-6523ff94dd", ContainerID:"8925fd6e64a3dc4ec37266016fd876d1279e0907a71ce05ff983c83919308c9a", Pod:"calico-kube-controllers-6cdf59f477-fr7wb", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.38.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calidb2c5fa104b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:48:51.481137 env[1452]: 2025-05-17 00:48:51.433 [INFO][5126] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="2bdcc7637ca0f5f39fdf5a216cf0bd20dc22d842d8a0e6851b7718601999a14f" May 17 00:48:51.481137 env[1452]: 2025-05-17 00:48:51.433 [INFO][5126] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="2bdcc7637ca0f5f39fdf5a216cf0bd20dc22d842d8a0e6851b7718601999a14f" iface="eth0" netns="" May 17 00:48:51.481137 env[1452]: 2025-05-17 00:48:51.433 [INFO][5126] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="2bdcc7637ca0f5f39fdf5a216cf0bd20dc22d842d8a0e6851b7718601999a14f" May 17 00:48:51.481137 env[1452]: 2025-05-17 00:48:51.433 [INFO][5126] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2bdcc7637ca0f5f39fdf5a216cf0bd20dc22d842d8a0e6851b7718601999a14f" May 17 00:48:51.481137 env[1452]: 2025-05-17 00:48:51.467 [INFO][5133] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2bdcc7637ca0f5f39fdf5a216cf0bd20dc22d842d8a0e6851b7718601999a14f" HandleID="k8s-pod-network.2bdcc7637ca0f5f39fdf5a216cf0bd20dc22d842d8a0e6851b7718601999a14f" Workload="ci--3510.3.7--n--6523ff94dd-k8s-calico--kube--controllers--6cdf59f477--fr7wb-eth0" May 17 00:48:51.481137 env[1452]: 2025-05-17 00:48:51.467 [INFO][5133] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:48:51.481137 env[1452]: 2025-05-17 00:48:51.467 [INFO][5133] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:48:51.481137 env[1452]: 2025-05-17 00:48:51.476 [WARNING][5133] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2bdcc7637ca0f5f39fdf5a216cf0bd20dc22d842d8a0e6851b7718601999a14f" HandleID="k8s-pod-network.2bdcc7637ca0f5f39fdf5a216cf0bd20dc22d842d8a0e6851b7718601999a14f" Workload="ci--3510.3.7--n--6523ff94dd-k8s-calico--kube--controllers--6cdf59f477--fr7wb-eth0" May 17 00:48:51.481137 env[1452]: 2025-05-17 00:48:51.476 [INFO][5133] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2bdcc7637ca0f5f39fdf5a216cf0bd20dc22d842d8a0e6851b7718601999a14f" HandleID="k8s-pod-network.2bdcc7637ca0f5f39fdf5a216cf0bd20dc22d842d8a0e6851b7718601999a14f" Workload="ci--3510.3.7--n--6523ff94dd-k8s-calico--kube--controllers--6cdf59f477--fr7wb-eth0" May 17 00:48:51.481137 env[1452]: 2025-05-17 00:48:51.478 [INFO][5133] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:48:51.481137 env[1452]: 2025-05-17 00:48:51.479 [INFO][5126] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="2bdcc7637ca0f5f39fdf5a216cf0bd20dc22d842d8a0e6851b7718601999a14f" May 17 00:48:51.481581 env[1452]: time="2025-05-17T00:48:51.481168713Z" level=info msg="TearDown network for sandbox \"2bdcc7637ca0f5f39fdf5a216cf0bd20dc22d842d8a0e6851b7718601999a14f\" successfully" May 17 00:48:51.491241 env[1452]: time="2025-05-17T00:48:51.491171791Z" level=info msg="RemovePodSandbox \"2bdcc7637ca0f5f39fdf5a216cf0bd20dc22d842d8a0e6851b7718601999a14f\" returns successfully" May 17 00:48:51.491972 env[1452]: time="2025-05-17T00:48:51.491937107Z" level=info msg="StopPodSandbox for \"7d9b2695c89cace7b088158899257805f4aea18a8ebb6524ddaf08908fb5e1fe\"" May 17 00:48:51.591898 env[1452]: 2025-05-17 00:48:51.549 [WARNING][5147] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7d9b2695c89cace7b088158899257805f4aea18a8ebb6524ddaf08908fb5e1fe" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--6523ff94dd-k8s-calico--apiserver--86b546bb5c--f9pmr-eth0", GenerateName:"calico-apiserver-86b546bb5c-", Namespace:"calico-apiserver", SelfLink:"", UID:"7629aa25-d93a-483f-b781-91e28432ed09", ResourceVersion:"1072", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 48, 6, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"86b546bb5c", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-6523ff94dd", ContainerID:"45c8a9cd9085e31d07f45cbaf34e304420f5d4d2755c96bcc4ae2e21e9693cd8", Pod:"calico-apiserver-86b546bb5c-f9pmr", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.38.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali910798fd005", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:48:51.591898 env[1452]: 2025-05-17 00:48:51.550 [INFO][5147] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="7d9b2695c89cace7b088158899257805f4aea18a8ebb6524ddaf08908fb5e1fe" May 17 00:48:51.591898 env[1452]: 2025-05-17 00:48:51.550 [INFO][5147] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7d9b2695c89cace7b088158899257805f4aea18a8ebb6524ddaf08908fb5e1fe" iface="eth0" netns="" May 17 00:48:51.591898 env[1452]: 2025-05-17 00:48:51.550 [INFO][5147] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="7d9b2695c89cace7b088158899257805f4aea18a8ebb6524ddaf08908fb5e1fe" May 17 00:48:51.591898 env[1452]: 2025-05-17 00:48:51.550 [INFO][5147] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7d9b2695c89cace7b088158899257805f4aea18a8ebb6524ddaf08908fb5e1fe" May 17 00:48:51.591898 env[1452]: 2025-05-17 00:48:51.577 [INFO][5154] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7d9b2695c89cace7b088158899257805f4aea18a8ebb6524ddaf08908fb5e1fe" HandleID="k8s-pod-network.7d9b2695c89cace7b088158899257805f4aea18a8ebb6524ddaf08908fb5e1fe" Workload="ci--3510.3.7--n--6523ff94dd-k8s-calico--apiserver--86b546bb5c--f9pmr-eth0" May 17 00:48:51.591898 env[1452]: 2025-05-17 00:48:51.578 [INFO][5154] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:48:51.591898 env[1452]: 2025-05-17 00:48:51.578 [INFO][5154] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:48:51.591898 env[1452]: 2025-05-17 00:48:51.587 [WARNING][5154] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7d9b2695c89cace7b088158899257805f4aea18a8ebb6524ddaf08908fb5e1fe" HandleID="k8s-pod-network.7d9b2695c89cace7b088158899257805f4aea18a8ebb6524ddaf08908fb5e1fe" Workload="ci--3510.3.7--n--6523ff94dd-k8s-calico--apiserver--86b546bb5c--f9pmr-eth0" May 17 00:48:51.591898 env[1452]: 2025-05-17 00:48:51.587 [INFO][5154] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7d9b2695c89cace7b088158899257805f4aea18a8ebb6524ddaf08908fb5e1fe" HandleID="k8s-pod-network.7d9b2695c89cace7b088158899257805f4aea18a8ebb6524ddaf08908fb5e1fe" Workload="ci--3510.3.7--n--6523ff94dd-k8s-calico--apiserver--86b546bb5c--f9pmr-eth0" May 17 00:48:51.591898 env[1452]: 2025-05-17 00:48:51.589 [INFO][5154] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:48:51.591898 env[1452]: 2025-05-17 00:48:51.590 [INFO][5147] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="7d9b2695c89cace7b088158899257805f4aea18a8ebb6524ddaf08908fb5e1fe" May 17 00:48:51.591898 env[1452]: time="2025-05-17T00:48:51.591829326Z" level=info msg="TearDown network for sandbox \"7d9b2695c89cace7b088158899257805f4aea18a8ebb6524ddaf08908fb5e1fe\" successfully" May 17 00:48:51.591898 env[1452]: time="2025-05-17T00:48:51.591884006Z" level=info msg="StopPodSandbox for \"7d9b2695c89cace7b088158899257805f4aea18a8ebb6524ddaf08908fb5e1fe\" returns successfully" May 17 00:48:51.593920 env[1452]: time="2025-05-17T00:48:51.592495043Z" level=info msg="RemovePodSandbox for \"7d9b2695c89cace7b088158899257805f4aea18a8ebb6524ddaf08908fb5e1fe\"" May 17 00:48:51.593920 env[1452]: time="2025-05-17T00:48:51.592536363Z" level=info msg="Forcibly stopping sandbox \"7d9b2695c89cace7b088158899257805f4aea18a8ebb6524ddaf08908fb5e1fe\"" May 17 00:48:51.686504 env[1452]: 2025-05-17 00:48:51.641 [WARNING][5170] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7d9b2695c89cace7b088158899257805f4aea18a8ebb6524ddaf08908fb5e1fe" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--6523ff94dd-k8s-calico--apiserver--86b546bb5c--f9pmr-eth0", GenerateName:"calico-apiserver-86b546bb5c-", Namespace:"calico-apiserver", SelfLink:"", UID:"7629aa25-d93a-483f-b781-91e28432ed09", ResourceVersion:"1072", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 48, 6, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"86b546bb5c", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-6523ff94dd", ContainerID:"45c8a9cd9085e31d07f45cbaf34e304420f5d4d2755c96bcc4ae2e21e9693cd8", Pod:"calico-apiserver-86b546bb5c-f9pmr", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.38.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali910798fd005", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:48:51.686504 env[1452]: 2025-05-17 00:48:51.641 [INFO][5170] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="7d9b2695c89cace7b088158899257805f4aea18a8ebb6524ddaf08908fb5e1fe" May 17 00:48:51.686504 env[1452]: 2025-05-17 00:48:51.641 [INFO][5170] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7d9b2695c89cace7b088158899257805f4aea18a8ebb6524ddaf08908fb5e1fe" iface="eth0" netns="" May 17 00:48:51.686504 env[1452]: 2025-05-17 00:48:51.641 [INFO][5170] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="7d9b2695c89cace7b088158899257805f4aea18a8ebb6524ddaf08908fb5e1fe" May 17 00:48:51.686504 env[1452]: 2025-05-17 00:48:51.641 [INFO][5170] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7d9b2695c89cace7b088158899257805f4aea18a8ebb6524ddaf08908fb5e1fe" May 17 00:48:51.686504 env[1452]: 2025-05-17 00:48:51.671 [INFO][5177] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7d9b2695c89cace7b088158899257805f4aea18a8ebb6524ddaf08908fb5e1fe" HandleID="k8s-pod-network.7d9b2695c89cace7b088158899257805f4aea18a8ebb6524ddaf08908fb5e1fe" Workload="ci--3510.3.7--n--6523ff94dd-k8s-calico--apiserver--86b546bb5c--f9pmr-eth0" May 17 00:48:51.686504 env[1452]: 2025-05-17 00:48:51.671 [INFO][5177] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:48:51.686504 env[1452]: 2025-05-17 00:48:51.671 [INFO][5177] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:48:51.686504 env[1452]: 2025-05-17 00:48:51.681 [WARNING][5177] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7d9b2695c89cace7b088158899257805f4aea18a8ebb6524ddaf08908fb5e1fe" HandleID="k8s-pod-network.7d9b2695c89cace7b088158899257805f4aea18a8ebb6524ddaf08908fb5e1fe" Workload="ci--3510.3.7--n--6523ff94dd-k8s-calico--apiserver--86b546bb5c--f9pmr-eth0" May 17 00:48:51.686504 env[1452]: 2025-05-17 00:48:51.681 [INFO][5177] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7d9b2695c89cace7b088158899257805f4aea18a8ebb6524ddaf08908fb5e1fe" HandleID="k8s-pod-network.7d9b2695c89cace7b088158899257805f4aea18a8ebb6524ddaf08908fb5e1fe" Workload="ci--3510.3.7--n--6523ff94dd-k8s-calico--apiserver--86b546bb5c--f9pmr-eth0" May 17 00:48:51.686504 env[1452]: 2025-05-17 00:48:51.684 [INFO][5177] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:48:51.686504 env[1452]: 2025-05-17 00:48:51.685 [INFO][5170] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="7d9b2695c89cace7b088158899257805f4aea18a8ebb6524ddaf08908fb5e1fe" May 17 00:48:51.686973 env[1452]: time="2025-05-17T00:48:51.686545926Z" level=info msg="TearDown network for sandbox \"7d9b2695c89cace7b088158899257805f4aea18a8ebb6524ddaf08908fb5e1fe\" successfully" May 17 00:48:51.698066 env[1452]: time="2025-05-17T00:48:51.698002278Z" level=info msg="RemovePodSandbox \"7d9b2695c89cace7b088158899257805f4aea18a8ebb6524ddaf08908fb5e1fe\" returns successfully" May 17 00:48:51.698702 env[1452]: time="2025-05-17T00:48:51.698667675Z" level=info msg="StopPodSandbox for \"89662f2be62f79066c314f694f3a1cd60e7d20a67c1c3bdbbb11635180c5037a\"" May 17 00:48:51.793826 env[1452]: 2025-05-17 00:48:51.750 [WARNING][5192] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="89662f2be62f79066c314f694f3a1cd60e7d20a67c1c3bdbbb11635180c5037a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--6523ff94dd-k8s-coredns--7c65d6cfc9--ljkjl-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"6c68e9fc-8024-41fc-851a-e97b8196dc2e", ResourceVersion:"1002", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 47, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-6523ff94dd", ContainerID:"eb78cd9fb958205b4e47a5dd602ff7196a3af026e6f0b204578476b758ad5084", Pod:"coredns-7c65d6cfc9-ljkjl", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.38.199/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia974a4d14a1", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:48:51.793826 env[1452]: 2025-05-17 00:48:51.751 [INFO][5192] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="89662f2be62f79066c314f694f3a1cd60e7d20a67c1c3bdbbb11635180c5037a" May 17 00:48:51.793826 env[1452]: 2025-05-17 00:48:51.751 [INFO][5192] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="89662f2be62f79066c314f694f3a1cd60e7d20a67c1c3bdbbb11635180c5037a" iface="eth0" netns="" May 17 00:48:51.793826 env[1452]: 2025-05-17 00:48:51.751 [INFO][5192] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="89662f2be62f79066c314f694f3a1cd60e7d20a67c1c3bdbbb11635180c5037a" May 17 00:48:51.793826 env[1452]: 2025-05-17 00:48:51.751 [INFO][5192] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="89662f2be62f79066c314f694f3a1cd60e7d20a67c1c3bdbbb11635180c5037a" May 17 00:48:51.793826 env[1452]: 2025-05-17 00:48:51.779 [INFO][5200] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="89662f2be62f79066c314f694f3a1cd60e7d20a67c1c3bdbbb11635180c5037a" HandleID="k8s-pod-network.89662f2be62f79066c314f694f3a1cd60e7d20a67c1c3bdbbb11635180c5037a" Workload="ci--3510.3.7--n--6523ff94dd-k8s-coredns--7c65d6cfc9--ljkjl-eth0" May 17 00:48:51.793826 env[1452]: 2025-05-17 00:48:51.779 [INFO][5200] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:48:51.793826 env[1452]: 2025-05-17 00:48:51.779 [INFO][5200] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:48:51.793826 env[1452]: 2025-05-17 00:48:51.788 [WARNING][5200] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="89662f2be62f79066c314f694f3a1cd60e7d20a67c1c3bdbbb11635180c5037a" HandleID="k8s-pod-network.89662f2be62f79066c314f694f3a1cd60e7d20a67c1c3bdbbb11635180c5037a" Workload="ci--3510.3.7--n--6523ff94dd-k8s-coredns--7c65d6cfc9--ljkjl-eth0" May 17 00:48:51.793826 env[1452]: 2025-05-17 00:48:51.788 [INFO][5200] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="89662f2be62f79066c314f694f3a1cd60e7d20a67c1c3bdbbb11635180c5037a" HandleID="k8s-pod-network.89662f2be62f79066c314f694f3a1cd60e7d20a67c1c3bdbbb11635180c5037a" Workload="ci--3510.3.7--n--6523ff94dd-k8s-coredns--7c65d6cfc9--ljkjl-eth0" May 17 00:48:51.793826 env[1452]: 2025-05-17 00:48:51.790 [INFO][5200] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:48:51.793826 env[1452]: 2025-05-17 00:48:51.791 [INFO][5192] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="89662f2be62f79066c314f694f3a1cd60e7d20a67c1c3bdbbb11635180c5037a" May 17 00:48:51.801993 env[1452]: time="2025-05-17T00:48:51.793784433Z" level=info msg="TearDown network for sandbox \"89662f2be62f79066c314f694f3a1cd60e7d20a67c1c3bdbbb11635180c5037a\" successfully" May 17 00:48:51.801993 env[1452]: time="2025-05-17T00:48:51.800403965Z" level=info msg="StopPodSandbox for \"89662f2be62f79066c314f694f3a1cd60e7d20a67c1c3bdbbb11635180c5037a\" returns successfully" May 17 00:48:51.802626 env[1452]: time="2025-05-17T00:48:51.802592556Z" level=info msg="RemovePodSandbox for \"89662f2be62f79066c314f694f3a1cd60e7d20a67c1c3bdbbb11635180c5037a\"" May 17 00:48:51.802787 env[1452]: time="2025-05-17T00:48:51.802747115Z" level=info msg="Forcibly stopping sandbox \"89662f2be62f79066c314f694f3a1cd60e7d20a67c1c3bdbbb11635180c5037a\"" May 17 00:48:51.908559 env[1452]: 2025-05-17 00:48:51.861 [WARNING][5214] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="89662f2be62f79066c314f694f3a1cd60e7d20a67c1c3bdbbb11635180c5037a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--6523ff94dd-k8s-coredns--7c65d6cfc9--ljkjl-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"6c68e9fc-8024-41fc-851a-e97b8196dc2e", ResourceVersion:"1002", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 47, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-6523ff94dd", ContainerID:"eb78cd9fb958205b4e47a5dd602ff7196a3af026e6f0b204578476b758ad5084", Pod:"coredns-7c65d6cfc9-ljkjl", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.38.199/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia974a4d14a1", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:48:51.908559 env[1452]: 2025-05-17 00:48:51.861 [INFO][5214] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="89662f2be62f79066c314f694f3a1cd60e7d20a67c1c3bdbbb11635180c5037a" May 17 00:48:51.908559 env[1452]: 2025-05-17 00:48:51.861 [INFO][5214] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="89662f2be62f79066c314f694f3a1cd60e7d20a67c1c3bdbbb11635180c5037a" iface="eth0" netns="" May 17 00:48:51.908559 env[1452]: 2025-05-17 00:48:51.861 [INFO][5214] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="89662f2be62f79066c314f694f3a1cd60e7d20a67c1c3bdbbb11635180c5037a" May 17 00:48:51.908559 env[1452]: 2025-05-17 00:48:51.861 [INFO][5214] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="89662f2be62f79066c314f694f3a1cd60e7d20a67c1c3bdbbb11635180c5037a" May 17 00:48:51.908559 env[1452]: 2025-05-17 00:48:51.887 [INFO][5221] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="89662f2be62f79066c314f694f3a1cd60e7d20a67c1c3bdbbb11635180c5037a" HandleID="k8s-pod-network.89662f2be62f79066c314f694f3a1cd60e7d20a67c1c3bdbbb11635180c5037a" Workload="ci--3510.3.7--n--6523ff94dd-k8s-coredns--7c65d6cfc9--ljkjl-eth0" May 17 00:48:51.908559 env[1452]: 2025-05-17 00:48:51.887 [INFO][5221] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:48:51.908559 env[1452]: 2025-05-17 00:48:51.888 [INFO][5221] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:48:51.908559 env[1452]: 2025-05-17 00:48:51.899 [WARNING][5221] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="89662f2be62f79066c314f694f3a1cd60e7d20a67c1c3bdbbb11635180c5037a" HandleID="k8s-pod-network.89662f2be62f79066c314f694f3a1cd60e7d20a67c1c3bdbbb11635180c5037a" Workload="ci--3510.3.7--n--6523ff94dd-k8s-coredns--7c65d6cfc9--ljkjl-eth0" May 17 00:48:51.908559 env[1452]: 2025-05-17 00:48:51.901 [INFO][5221] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="89662f2be62f79066c314f694f3a1cd60e7d20a67c1c3bdbbb11635180c5037a" HandleID="k8s-pod-network.89662f2be62f79066c314f694f3a1cd60e7d20a67c1c3bdbbb11635180c5037a" Workload="ci--3510.3.7--n--6523ff94dd-k8s-coredns--7c65d6cfc9--ljkjl-eth0" May 17 00:48:51.908559 env[1452]: 2025-05-17 00:48:51.903 [INFO][5221] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:48:51.908559 env[1452]: 2025-05-17 00:48:51.905 [INFO][5214] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="89662f2be62f79066c314f694f3a1cd60e7d20a67c1c3bdbbb11635180c5037a" May 17 00:48:51.909934 env[1452]: time="2025-05-17T00:48:51.909830383Z" level=info msg="TearDown network for sandbox \"89662f2be62f79066c314f694f3a1cd60e7d20a67c1c3bdbbb11635180c5037a\" successfully" May 17 00:48:51.922239 env[1452]: time="2025-05-17T00:48:51.922187411Z" level=info msg="RemovePodSandbox \"89662f2be62f79066c314f694f3a1cd60e7d20a67c1c3bdbbb11635180c5037a\" returns successfully" May 17 00:48:51.923007 env[1452]: time="2025-05-17T00:48:51.922967768Z" level=info msg="StopPodSandbox for \"6187f80c6b1af2e633e0e670cc928a5e6ea0345fcde66621998a6df50bd22af1\"" May 17 00:48:52.020016 env[1452]: 2025-05-17 00:48:51.973 [WARNING][5237] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="6187f80c6b1af2e633e0e670cc928a5e6ea0345fcde66621998a6df50bd22af1" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--6523ff94dd-k8s-csi--node--driver--mqsn2-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ca23fe46-c12b-49ed-aa7e-a638ad594bbf", ResourceVersion:"1098", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 48, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"68bf44dd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-6523ff94dd", ContainerID:"4e365bb20e73cc0c965632b0c053ad24a604d474456376a6ab88d66dc05a83c9", Pod:"csi-node-driver-mqsn2", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.38.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali405cf323ce2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:48:52.020016 env[1452]: 2025-05-17 00:48:51.974 [INFO][5237] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="6187f80c6b1af2e633e0e670cc928a5e6ea0345fcde66621998a6df50bd22af1" May 17 00:48:52.020016 env[1452]: 2025-05-17 00:48:51.974 [INFO][5237] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="6187f80c6b1af2e633e0e670cc928a5e6ea0345fcde66621998a6df50bd22af1" iface="eth0" netns="" May 17 00:48:52.020016 env[1452]: 2025-05-17 00:48:51.974 [INFO][5237] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="6187f80c6b1af2e633e0e670cc928a5e6ea0345fcde66621998a6df50bd22af1" May 17 00:48:52.020016 env[1452]: 2025-05-17 00:48:51.974 [INFO][5237] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6187f80c6b1af2e633e0e670cc928a5e6ea0345fcde66621998a6df50bd22af1" May 17 00:48:52.020016 env[1452]: 2025-05-17 00:48:51.994 [INFO][5244] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6187f80c6b1af2e633e0e670cc928a5e6ea0345fcde66621998a6df50bd22af1" HandleID="k8s-pod-network.6187f80c6b1af2e633e0e670cc928a5e6ea0345fcde66621998a6df50bd22af1" Workload="ci--3510.3.7--n--6523ff94dd-k8s-csi--node--driver--mqsn2-eth0" May 17 00:48:52.020016 env[1452]: 2025-05-17 00:48:51.995 [INFO][5244] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:48:52.020016 env[1452]: 2025-05-17 00:48:51.995 [INFO][5244] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:48:52.020016 env[1452]: 2025-05-17 00:48:52.013 [WARNING][5244] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6187f80c6b1af2e633e0e670cc928a5e6ea0345fcde66621998a6df50bd22af1" HandleID="k8s-pod-network.6187f80c6b1af2e633e0e670cc928a5e6ea0345fcde66621998a6df50bd22af1" Workload="ci--3510.3.7--n--6523ff94dd-k8s-csi--node--driver--mqsn2-eth0" May 17 00:48:52.020016 env[1452]: 2025-05-17 00:48:52.015 [INFO][5244] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6187f80c6b1af2e633e0e670cc928a5e6ea0345fcde66621998a6df50bd22af1" HandleID="k8s-pod-network.6187f80c6b1af2e633e0e670cc928a5e6ea0345fcde66621998a6df50bd22af1" Workload="ci--3510.3.7--n--6523ff94dd-k8s-csi--node--driver--mqsn2-eth0" May 17 00:48:52.020016 env[1452]: 2025-05-17 00:48:52.016 [INFO][5244] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:48:52.020016 env[1452]: 2025-05-17 00:48:52.018 [INFO][5237] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="6187f80c6b1af2e633e0e670cc928a5e6ea0345fcde66621998a6df50bd22af1" May 17 00:48:52.020464 env[1452]: time="2025-05-17T00:48:52.020055559Z" level=info msg="TearDown network for sandbox \"6187f80c6b1af2e633e0e670cc928a5e6ea0345fcde66621998a6df50bd22af1\" successfully" May 17 00:48:52.020464 env[1452]: time="2025-05-17T00:48:52.020087079Z" level=info msg="StopPodSandbox for \"6187f80c6b1af2e633e0e670cc928a5e6ea0345fcde66621998a6df50bd22af1\" returns successfully" May 17 00:48:52.021066 env[1452]: time="2025-05-17T00:48:52.021041035Z" level=info msg="RemovePodSandbox for \"6187f80c6b1af2e633e0e670cc928a5e6ea0345fcde66621998a6df50bd22af1\"" May 17 00:48:52.021289 env[1452]: time="2025-05-17T00:48:52.021246034Z" level=info msg="Forcibly stopping sandbox \"6187f80c6b1af2e633e0e670cc928a5e6ea0345fcde66621998a6df50bd22af1\"" May 17 00:48:52.115181 env[1452]: 2025-05-17 00:48:52.069 [WARNING][5258] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="6187f80c6b1af2e633e0e670cc928a5e6ea0345fcde66621998a6df50bd22af1" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--6523ff94dd-k8s-csi--node--driver--mqsn2-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ca23fe46-c12b-49ed-aa7e-a638ad594bbf", ResourceVersion:"1098", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 48, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"68bf44dd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-6523ff94dd", ContainerID:"4e365bb20e73cc0c965632b0c053ad24a604d474456376a6ab88d66dc05a83c9", Pod:"csi-node-driver-mqsn2", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.38.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali405cf323ce2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:48:52.115181 env[1452]: 2025-05-17 00:48:52.069 [INFO][5258] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="6187f80c6b1af2e633e0e670cc928a5e6ea0345fcde66621998a6df50bd22af1" May 17 00:48:52.115181 env[1452]: 2025-05-17 00:48:52.070 [INFO][5258] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="6187f80c6b1af2e633e0e670cc928a5e6ea0345fcde66621998a6df50bd22af1" iface="eth0" netns="" May 17 00:48:52.115181 env[1452]: 2025-05-17 00:48:52.070 [INFO][5258] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="6187f80c6b1af2e633e0e670cc928a5e6ea0345fcde66621998a6df50bd22af1" May 17 00:48:52.115181 env[1452]: 2025-05-17 00:48:52.070 [INFO][5258] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6187f80c6b1af2e633e0e670cc928a5e6ea0345fcde66621998a6df50bd22af1" May 17 00:48:52.115181 env[1452]: 2025-05-17 00:48:52.094 [INFO][5265] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6187f80c6b1af2e633e0e670cc928a5e6ea0345fcde66621998a6df50bd22af1" HandleID="k8s-pod-network.6187f80c6b1af2e633e0e670cc928a5e6ea0345fcde66621998a6df50bd22af1" Workload="ci--3510.3.7--n--6523ff94dd-k8s-csi--node--driver--mqsn2-eth0" May 17 00:48:52.115181 env[1452]: 2025-05-17 00:48:52.097 [INFO][5265] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:48:52.115181 env[1452]: 2025-05-17 00:48:52.097 [INFO][5265] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:48:52.115181 env[1452]: 2025-05-17 00:48:52.110 [WARNING][5265] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6187f80c6b1af2e633e0e670cc928a5e6ea0345fcde66621998a6df50bd22af1" HandleID="k8s-pod-network.6187f80c6b1af2e633e0e670cc928a5e6ea0345fcde66621998a6df50bd22af1" Workload="ci--3510.3.7--n--6523ff94dd-k8s-csi--node--driver--mqsn2-eth0" May 17 00:48:52.115181 env[1452]: 2025-05-17 00:48:52.110 [INFO][5265] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6187f80c6b1af2e633e0e670cc928a5e6ea0345fcde66621998a6df50bd22af1" HandleID="k8s-pod-network.6187f80c6b1af2e633e0e670cc928a5e6ea0345fcde66621998a6df50bd22af1" Workload="ci--3510.3.7--n--6523ff94dd-k8s-csi--node--driver--mqsn2-eth0" May 17 00:48:52.115181 env[1452]: 2025-05-17 00:48:52.111 [INFO][5265] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:48:52.115181 env[1452]: 2025-05-17 00:48:52.113 [INFO][5258] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="6187f80c6b1af2e633e0e670cc928a5e6ea0345fcde66621998a6df50bd22af1" May 17 00:48:52.115817 env[1452]: time="2025-05-17T00:48:52.115763320Z" level=info msg="TearDown network for sandbox \"6187f80c6b1af2e633e0e670cc928a5e6ea0345fcde66621998a6df50bd22af1\" successfully" May 17 00:48:52.131086 env[1452]: time="2025-05-17T00:48:52.131034976Z" level=info msg="RemovePodSandbox \"6187f80c6b1af2e633e0e670cc928a5e6ea0345fcde66621998a6df50bd22af1\" returns successfully" May 17 00:48:52.131892 env[1452]: time="2025-05-17T00:48:52.131821573Z" level=info msg="StopPodSandbox for \"3d8e0a399d4f9326b0d1779c026ca35d8d47037f09a348582946804ef659f1a7\"" May 17 00:48:52.241197 env[1452]: 2025-05-17 00:48:52.200 [WARNING][5281] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="3d8e0a399d4f9326b0d1779c026ca35d8d47037f09a348582946804ef659f1a7" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--6523ff94dd-k8s-goldmane--8f77d7b6c--78tx5-eth0", GenerateName:"goldmane-8f77d7b6c-", Namespace:"calico-system", SelfLink:"", UID:"dc3b60ab-99b9-435e-bc94-f900356b518f", ResourceVersion:"1068", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 48, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"8f77d7b6c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-6523ff94dd", ContainerID:"21cc1f9e313be8e483ccac87d0d40dba1493a54897f8d67cf571117db16106ec", Pod:"goldmane-8f77d7b6c-78tx5", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.38.200/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali8670511b544", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:48:52.241197 env[1452]: 2025-05-17 00:48:52.200 [INFO][5281] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="3d8e0a399d4f9326b0d1779c026ca35d8d47037f09a348582946804ef659f1a7" May 17 00:48:52.241197 env[1452]: 2025-05-17 00:48:52.200 [INFO][5281] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="3d8e0a399d4f9326b0d1779c026ca35d8d47037f09a348582946804ef659f1a7" iface="eth0" netns="" May 17 00:48:52.241197 env[1452]: 2025-05-17 00:48:52.200 [INFO][5281] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="3d8e0a399d4f9326b0d1779c026ca35d8d47037f09a348582946804ef659f1a7" May 17 00:48:52.241197 env[1452]: 2025-05-17 00:48:52.200 [INFO][5281] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3d8e0a399d4f9326b0d1779c026ca35d8d47037f09a348582946804ef659f1a7" May 17 00:48:52.241197 env[1452]: 2025-05-17 00:48:52.221 [INFO][5288] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3d8e0a399d4f9326b0d1779c026ca35d8d47037f09a348582946804ef659f1a7" HandleID="k8s-pod-network.3d8e0a399d4f9326b0d1779c026ca35d8d47037f09a348582946804ef659f1a7" Workload="ci--3510.3.7--n--6523ff94dd-k8s-goldmane--8f77d7b6c--78tx5-eth0" May 17 00:48:52.241197 env[1452]: 2025-05-17 00:48:52.221 [INFO][5288] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:48:52.241197 env[1452]: 2025-05-17 00:48:52.221 [INFO][5288] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:48:52.241197 env[1452]: 2025-05-17 00:48:52.236 [WARNING][5288] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3d8e0a399d4f9326b0d1779c026ca35d8d47037f09a348582946804ef659f1a7" HandleID="k8s-pod-network.3d8e0a399d4f9326b0d1779c026ca35d8d47037f09a348582946804ef659f1a7" Workload="ci--3510.3.7--n--6523ff94dd-k8s-goldmane--8f77d7b6c--78tx5-eth0" May 17 00:48:52.241197 env[1452]: 2025-05-17 00:48:52.236 [INFO][5288] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3d8e0a399d4f9326b0d1779c026ca35d8d47037f09a348582946804ef659f1a7" HandleID="k8s-pod-network.3d8e0a399d4f9326b0d1779c026ca35d8d47037f09a348582946804ef659f1a7" Workload="ci--3510.3.7--n--6523ff94dd-k8s-goldmane--8f77d7b6c--78tx5-eth0" May 17 00:48:52.241197 env[1452]: 2025-05-17 00:48:52.238 [INFO][5288] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:48:52.241197 env[1452]: 2025-05-17 00:48:52.239 [INFO][5281] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="3d8e0a399d4f9326b0d1779c026ca35d8d47037f09a348582946804ef659f1a7" May 17 00:48:52.241704 env[1452]: time="2025-05-17T00:48:52.241223237Z" level=info msg="TearDown network for sandbox \"3d8e0a399d4f9326b0d1779c026ca35d8d47037f09a348582946804ef659f1a7\" successfully" May 17 00:48:52.241704 env[1452]: time="2025-05-17T00:48:52.241257437Z" level=info msg="StopPodSandbox for \"3d8e0a399d4f9326b0d1779c026ca35d8d47037f09a348582946804ef659f1a7\" returns successfully" May 17 00:48:52.242299 env[1452]: time="2025-05-17T00:48:52.242266912Z" level=info msg="RemovePodSandbox for \"3d8e0a399d4f9326b0d1779c026ca35d8d47037f09a348582946804ef659f1a7\"" May 17 00:48:52.242593 env[1452]: time="2025-05-17T00:48:52.242548711Z" level=info msg="Forcibly stopping sandbox \"3d8e0a399d4f9326b0d1779c026ca35d8d47037f09a348582946804ef659f1a7\"" May 17 00:48:52.324283 env[1452]: 2025-05-17 00:48:52.280 [WARNING][5303] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="3d8e0a399d4f9326b0d1779c026ca35d8d47037f09a348582946804ef659f1a7" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--6523ff94dd-k8s-goldmane--8f77d7b6c--78tx5-eth0", GenerateName:"goldmane-8f77d7b6c-", Namespace:"calico-system", SelfLink:"", UID:"dc3b60ab-99b9-435e-bc94-f900356b518f", ResourceVersion:"1068", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 48, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"8f77d7b6c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-6523ff94dd", ContainerID:"21cc1f9e313be8e483ccac87d0d40dba1493a54897f8d67cf571117db16106ec", Pod:"goldmane-8f77d7b6c-78tx5", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.38.200/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali8670511b544", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:48:52.324283 env[1452]: 2025-05-17 00:48:52.280 [INFO][5303] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="3d8e0a399d4f9326b0d1779c026ca35d8d47037f09a348582946804ef659f1a7" May 17 00:48:52.324283 env[1452]: 2025-05-17 00:48:52.280 [INFO][5303] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="3d8e0a399d4f9326b0d1779c026ca35d8d47037f09a348582946804ef659f1a7" iface="eth0" netns="" May 17 00:48:52.324283 env[1452]: 2025-05-17 00:48:52.280 [INFO][5303] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="3d8e0a399d4f9326b0d1779c026ca35d8d47037f09a348582946804ef659f1a7" May 17 00:48:52.324283 env[1452]: 2025-05-17 00:48:52.280 [INFO][5303] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3d8e0a399d4f9326b0d1779c026ca35d8d47037f09a348582946804ef659f1a7" May 17 00:48:52.324283 env[1452]: 2025-05-17 00:48:52.306 [INFO][5310] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3d8e0a399d4f9326b0d1779c026ca35d8d47037f09a348582946804ef659f1a7" HandleID="k8s-pod-network.3d8e0a399d4f9326b0d1779c026ca35d8d47037f09a348582946804ef659f1a7" Workload="ci--3510.3.7--n--6523ff94dd-k8s-goldmane--8f77d7b6c--78tx5-eth0" May 17 00:48:52.324283 env[1452]: 2025-05-17 00:48:52.306 [INFO][5310] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:48:52.324283 env[1452]: 2025-05-17 00:48:52.306 [INFO][5310] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:48:52.324283 env[1452]: 2025-05-17 00:48:52.316 [WARNING][5310] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3d8e0a399d4f9326b0d1779c026ca35d8d47037f09a348582946804ef659f1a7" HandleID="k8s-pod-network.3d8e0a399d4f9326b0d1779c026ca35d8d47037f09a348582946804ef659f1a7" Workload="ci--3510.3.7--n--6523ff94dd-k8s-goldmane--8f77d7b6c--78tx5-eth0" May 17 00:48:52.324283 env[1452]: 2025-05-17 00:48:52.317 [INFO][5310] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3d8e0a399d4f9326b0d1779c026ca35d8d47037f09a348582946804ef659f1a7" HandleID="k8s-pod-network.3d8e0a399d4f9326b0d1779c026ca35d8d47037f09a348582946804ef659f1a7" Workload="ci--3510.3.7--n--6523ff94dd-k8s-goldmane--8f77d7b6c--78tx5-eth0" May 17 00:48:52.324283 env[1452]: 2025-05-17 00:48:52.319 [INFO][5310] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:48:52.324283 env[1452]: 2025-05-17 00:48:52.322 [INFO][5303] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="3d8e0a399d4f9326b0d1779c026ca35d8d47037f09a348582946804ef659f1a7" May 17 00:48:52.324920 env[1452]: time="2025-05-17T00:48:52.324845648Z" level=info msg="TearDown network for sandbox \"3d8e0a399d4f9326b0d1779c026ca35d8d47037f09a348582946804ef659f1a7\" successfully" May 17 00:48:52.338621 env[1452]: time="2025-05-17T00:48:52.338565711Z" level=info msg="RemovePodSandbox \"3d8e0a399d4f9326b0d1779c026ca35d8d47037f09a348582946804ef659f1a7\" returns successfully" May 17 00:48:52.339435 env[1452]: time="2025-05-17T00:48:52.339400827Z" level=info msg="StopPodSandbox for \"2e5b1de266d3e0076aab820b52b42cc70e282ac5018716796d7f44ee17ebe8d0\"" May 17 00:48:52.465385 env[1452]: 2025-05-17 00:48:52.407 [WARNING][5324] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="2e5b1de266d3e0076aab820b52b42cc70e282ac5018716796d7f44ee17ebe8d0" WorkloadEndpoint="ci--3510.3.7--n--6523ff94dd-k8s-whisker--6dc6bd874f--r5bvr-eth0" May 17 00:48:52.465385 env[1452]: 2025-05-17 00:48:52.407 [INFO][5324] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="2e5b1de266d3e0076aab820b52b42cc70e282ac5018716796d7f44ee17ebe8d0" May 17 00:48:52.465385 env[1452]: 2025-05-17 00:48:52.407 [INFO][5324] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="2e5b1de266d3e0076aab820b52b42cc70e282ac5018716796d7f44ee17ebe8d0" iface="eth0" netns="" May 17 00:48:52.465385 env[1452]: 2025-05-17 00:48:52.407 [INFO][5324] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="2e5b1de266d3e0076aab820b52b42cc70e282ac5018716796d7f44ee17ebe8d0" May 17 00:48:52.465385 env[1452]: 2025-05-17 00:48:52.407 [INFO][5324] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2e5b1de266d3e0076aab820b52b42cc70e282ac5018716796d7f44ee17ebe8d0" May 17 00:48:52.465385 env[1452]: 2025-05-17 00:48:52.440 [INFO][5331] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2e5b1de266d3e0076aab820b52b42cc70e282ac5018716796d7f44ee17ebe8d0" HandleID="k8s-pod-network.2e5b1de266d3e0076aab820b52b42cc70e282ac5018716796d7f44ee17ebe8d0" Workload="ci--3510.3.7--n--6523ff94dd-k8s-whisker--6dc6bd874f--r5bvr-eth0" May 17 00:48:52.465385 env[1452]: 2025-05-17 00:48:52.440 [INFO][5331] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:48:52.465385 env[1452]: 2025-05-17 00:48:52.440 [INFO][5331] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:48:52.465385 env[1452]: 2025-05-17 00:48:52.460 [WARNING][5331] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2e5b1de266d3e0076aab820b52b42cc70e282ac5018716796d7f44ee17ebe8d0" HandleID="k8s-pod-network.2e5b1de266d3e0076aab820b52b42cc70e282ac5018716796d7f44ee17ebe8d0" Workload="ci--3510.3.7--n--6523ff94dd-k8s-whisker--6dc6bd874f--r5bvr-eth0" May 17 00:48:52.465385 env[1452]: 2025-05-17 00:48:52.460 [INFO][5331] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2e5b1de266d3e0076aab820b52b42cc70e282ac5018716796d7f44ee17ebe8d0" HandleID="k8s-pod-network.2e5b1de266d3e0076aab820b52b42cc70e282ac5018716796d7f44ee17ebe8d0" Workload="ci--3510.3.7--n--6523ff94dd-k8s-whisker--6dc6bd874f--r5bvr-eth0" May 17 00:48:52.465385 env[1452]: 2025-05-17 00:48:52.462 [INFO][5331] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:48:52.465385 env[1452]: 2025-05-17 00:48:52.464 [INFO][5324] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="2e5b1de266d3e0076aab820b52b42cc70e282ac5018716796d7f44ee17ebe8d0" May 17 00:48:52.465932 env[1452]: time="2025-05-17T00:48:52.465893420Z" level=info msg="TearDown network for sandbox \"2e5b1de266d3e0076aab820b52b42cc70e282ac5018716796d7f44ee17ebe8d0\" successfully" May 17 00:48:52.466030 env[1452]: time="2025-05-17T00:48:52.466012539Z" level=info msg="StopPodSandbox for \"2e5b1de266d3e0076aab820b52b42cc70e282ac5018716796d7f44ee17ebe8d0\" returns successfully" May 17 00:48:52.466714 env[1452]: time="2025-05-17T00:48:52.466639257Z" level=info msg="RemovePodSandbox for \"2e5b1de266d3e0076aab820b52b42cc70e282ac5018716796d7f44ee17ebe8d0\"" May 17 00:48:52.466714 env[1452]: time="2025-05-17T00:48:52.466682777Z" level=info msg="Forcibly stopping sandbox \"2e5b1de266d3e0076aab820b52b42cc70e282ac5018716796d7f44ee17ebe8d0\"" May 17 00:48:52.565488 env[1452]: 2025-05-17 00:48:52.528 [WARNING][5346] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="2e5b1de266d3e0076aab820b52b42cc70e282ac5018716796d7f44ee17ebe8d0" WorkloadEndpoint="ci--3510.3.7--n--6523ff94dd-k8s-whisker--6dc6bd874f--r5bvr-eth0" May 17 00:48:52.565488 env[1452]: 2025-05-17 00:48:52.528 [INFO][5346] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="2e5b1de266d3e0076aab820b52b42cc70e282ac5018716796d7f44ee17ebe8d0" May 17 00:48:52.565488 env[1452]: 2025-05-17 00:48:52.528 [INFO][5346] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="2e5b1de266d3e0076aab820b52b42cc70e282ac5018716796d7f44ee17ebe8d0" iface="eth0" netns="" May 17 00:48:52.565488 env[1452]: 2025-05-17 00:48:52.528 [INFO][5346] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="2e5b1de266d3e0076aab820b52b42cc70e282ac5018716796d7f44ee17ebe8d0" May 17 00:48:52.565488 env[1452]: 2025-05-17 00:48:52.528 [INFO][5346] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2e5b1de266d3e0076aab820b52b42cc70e282ac5018716796d7f44ee17ebe8d0" May 17 00:48:52.565488 env[1452]: 2025-05-17 00:48:52.550 [INFO][5353] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2e5b1de266d3e0076aab820b52b42cc70e282ac5018716796d7f44ee17ebe8d0" HandleID="k8s-pod-network.2e5b1de266d3e0076aab820b52b42cc70e282ac5018716796d7f44ee17ebe8d0" Workload="ci--3510.3.7--n--6523ff94dd-k8s-whisker--6dc6bd874f--r5bvr-eth0" May 17 00:48:52.565488 env[1452]: 2025-05-17 00:48:52.551 [INFO][5353] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:48:52.565488 env[1452]: 2025-05-17 00:48:52.551 [INFO][5353] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:48:52.565488 env[1452]: 2025-05-17 00:48:52.561 [WARNING][5353] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2e5b1de266d3e0076aab820b52b42cc70e282ac5018716796d7f44ee17ebe8d0" HandleID="k8s-pod-network.2e5b1de266d3e0076aab820b52b42cc70e282ac5018716796d7f44ee17ebe8d0" Workload="ci--3510.3.7--n--6523ff94dd-k8s-whisker--6dc6bd874f--r5bvr-eth0" May 17 00:48:52.565488 env[1452]: 2025-05-17 00:48:52.561 [INFO][5353] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2e5b1de266d3e0076aab820b52b42cc70e282ac5018716796d7f44ee17ebe8d0" HandleID="k8s-pod-network.2e5b1de266d3e0076aab820b52b42cc70e282ac5018716796d7f44ee17ebe8d0" Workload="ci--3510.3.7--n--6523ff94dd-k8s-whisker--6dc6bd874f--r5bvr-eth0" May 17 00:48:52.565488 env[1452]: 2025-05-17 00:48:52.562 [INFO][5353] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:48:52.565488 env[1452]: 2025-05-17 00:48:52.564 [INFO][5346] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="2e5b1de266d3e0076aab820b52b42cc70e282ac5018716796d7f44ee17ebe8d0" May 17 00:48:52.565957 env[1452]: time="2025-05-17T00:48:52.565522805Z" level=info msg="TearDown network for sandbox \"2e5b1de266d3e0076aab820b52b42cc70e282ac5018716796d7f44ee17ebe8d0\" successfully" May 17 00:48:52.579550 env[1452]: time="2025-05-17T00:48:52.579487466Z" level=info msg="RemovePodSandbox \"2e5b1de266d3e0076aab820b52b42cc70e282ac5018716796d7f44ee17ebe8d0\" returns successfully" May 17 00:48:53.250705 systemd[1]: run-containerd-runc-k8s.io-0fe041b6526005d27dff24254e42a99f0d13b50fa49aaf1ddfe85280a4329309-runc.Y0G9Ks.mount: Deactivated successfully. May 17 00:48:53.996690 kubelet[2511]: I0517 00:48:53.996640 2511 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:48:54.062000 audit[5379]: NETFILTER_CFG table=filter:134 family=2 entries=12 op=nft_register_rule pid=5379 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:48:54.068942 kernel: kauditd_printk_skb: 235 callbacks suppressed May 17 00:48:54.069104 kernel: audit: type=1325 audit(1747442934.062:1372): table=filter:134 family=2 entries=12 op=nft_register_rule pid=5379 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:48:54.062000 audit[5379]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=ffffd878c990 a2=0 a3=1 items=0 ppid=2658 pid=5379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:54.111894 kernel: audit: type=1300 audit(1747442934.062:1372): arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=ffffd878c990 a2=0 a3=1 items=0 ppid=2658 pid=5379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:54.062000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:48:54.127154 kernel: audit: type=1327 audit(1747442934.062:1372): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:48:54.129000 audit[5379]: NETFILTER_CFG table=nat:135 family=2 entries=34 op=nft_register_chain pid=5379 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:48:54.145644 kernel: audit: type=1325 audit(1747442934.129:1373): table=nat:135 family=2 entries=34 op=nft_register_chain pid=5379 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:48:54.129000 audit[5379]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11236 a0=3 a1=ffffd878c990 a2=0 a3=1 items=0 ppid=2658 pid=5379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:54.181286 kernel: audit: type=1300 audit(1747442934.129:1373): arch=c00000b7 syscall=211 success=yes exit=11236 a0=3 a1=ffffd878c990 a2=0 a3=1 items=0 ppid=2658 pid=5379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:54.129000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:48:54.197937 kernel: audit: type=1327 audit(1747442934.129:1373): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:48:54.486000 audit[2391]: AVC avc: denied { watch } for pid=2391 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c122,c191 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:48:54.486000 audit[2391]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4002dc89c0 a2=fc6 a3=0 items=0 ppid=2229 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c122,c191 key=(null) May 17 00:48:54.543229 kernel: audit: type=1400 audit(1747442934.486:1374): avc: denied { watch } for pid=2391 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c122,c191 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:48:54.543357 kernel: audit: type=1300 audit(1747442934.486:1374): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4002dc89c0 a2=fc6 a3=0 items=0 ppid=2229 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c122,c191 key=(null) May 17 00:48:54.486000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:48:54.569329 kernel: audit: type=1327 audit(1747442934.486:1374): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:48:54.486000 audit[2391]: AVC avc: denied { watch } for pid=2391 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c122,c191 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:48:54.592454 kernel: audit: type=1400 audit(1747442934.486:1375): avc: denied { watch } for pid=2391 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c122,c191 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:48:54.486000 audit[2391]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4002dc8b60 a2=fc6 a3=0 items=0 ppid=2229 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c122,c191 key=(null) May 17 00:48:54.486000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:48:54.486000 audit[2391]: AVC avc: denied { watch } for pid=2391 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c122,c191 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:48:54.486000 audit[2391]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4002dc8b80 a2=fc6 a3=0 items=0 ppid=2229 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c122,c191 key=(null) May 17 00:48:54.486000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:48:54.486000 audit[2391]: AVC avc: denied { watch } for pid=2391 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c122,c191 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:48:54.486000 audit[2391]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4002dc8ea0 a2=fc6 a3=0 items=0 ppid=2229 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c122,c191 key=(null) May 17 00:48:54.486000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:49:01.719555 env[1452]: time="2025-05-17T00:49:01.719500772Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\"" May 17 00:49:01.881253 env[1452]: time="2025-05-17T00:49:01.881186443Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:49:01.885694 env[1452]: time="2025-05-17T00:49:01.885625666Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:49:01.886045 kubelet[2511]: E0517 00:49:01.885997 2511 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:49:01.886430 kubelet[2511]: E0517 00:49:01.886405 2511 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:49:01.886676 kubelet[2511]: E0517 00:49:01.886623 2511 kuberuntime_manager.go:1274] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-p6jf5,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-8f77d7b6c-78tx5_calico-system(dc3b60ab-99b9-435e-bc94-f900356b518f): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:49:01.888309 kubelet[2511]: E0517 00:49:01.888269 2511 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-8f77d7b6c-78tx5" podUID="dc3b60ab-99b9-435e-bc94-f900356b518f" May 17 00:49:02.730586 kubelet[2511]: E0517 00:49:02.730547 2511 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\"\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\"\"]" pod="calico-system/whisker-5c6b5ff985-qsbbb" podUID="1034e955-0d22-4661-9e47-81fdd9a27aa3" May 17 00:49:10.306868 systemd[1]: run-containerd-runc-k8s.io-1d87cdc503ee1ccd701b6534fab870398df46e3585dc65c0281e3637ae46bc86-runc.lzxROI.mount: Deactivated successfully. May 17 00:49:13.718785 kubelet[2511]: E0517 00:49:13.718713 2511 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\"\"" pod="calico-system/goldmane-8f77d7b6c-78tx5" podUID="dc3b60ab-99b9-435e-bc94-f900356b518f" May 17 00:49:13.721152 env[1452]: time="2025-05-17T00:49:13.721091716Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\"" May 17 00:49:13.945711 env[1452]: time="2025-05-17T00:49:13.945650676Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:49:13.951879 env[1452]: time="2025-05-17T00:49:13.951805335Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:49:13.952346 kubelet[2511]: E0517 00:49:13.952266 2511 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:49:13.952346 kubelet[2511]: E0517 00:49:13.952344 2511 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:49:13.952512 kubelet[2511]: E0517 00:49:13.952455 2511 kuberuntime_manager.go:1274] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.0,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:f515ef07f4944df1b53f071bfd4a71b4,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-98cxh,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-5c6b5ff985-qsbbb_calico-system(1034e955-0d22-4661-9e47-81fdd9a27aa3): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:49:13.954699 env[1452]: time="2025-05-17T00:49:13.954654485Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\"" May 17 00:49:14.126830 env[1452]: time="2025-05-17T00:49:14.126690706Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:49:14.135079 env[1452]: time="2025-05-17T00:49:14.135004438Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:49:14.135322 kubelet[2511]: E0517 00:49:14.135271 2511 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:49:14.135384 kubelet[2511]: E0517 00:49:14.135338 2511 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:49:14.135741 kubelet[2511]: E0517 00:49:14.135453 2511 kuberuntime_manager.go:1274] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-98cxh,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-5c6b5ff985-qsbbb_calico-system(1034e955-0d22-4661-9e47-81fdd9a27aa3): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:49:14.137048 kubelet[2511]: E0517 00:49:14.137005 2511 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-5c6b5ff985-qsbbb" podUID="1034e955-0d22-4661-9e47-81fdd9a27aa3" May 17 00:49:18.211602 systemd[1]: run-containerd-runc-k8s.io-0fe041b6526005d27dff24254e42a99f0d13b50fa49aaf1ddfe85280a4329309-runc.GD8q1T.mount: Deactivated successfully. May 17 00:49:23.232318 systemd[1]: run-containerd-runc-k8s.io-0fe041b6526005d27dff24254e42a99f0d13b50fa49aaf1ddfe85280a4329309-runc.kLeiNp.mount: Deactivated successfully. May 17 00:49:25.720261 kubelet[2511]: E0517 00:49:25.720202 2511 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\"\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\"\"]" pod="calico-system/whisker-5c6b5ff985-qsbbb" podUID="1034e955-0d22-4661-9e47-81fdd9a27aa3" May 17 00:49:28.725016 env[1452]: time="2025-05-17T00:49:28.724340824Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\"" May 17 00:49:28.878235 env[1452]: time="2025-05-17T00:49:28.878020632Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:49:28.883009 env[1452]: time="2025-05-17T00:49:28.882936857Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:49:28.883361 kubelet[2511]: E0517 00:49:28.883325 2511 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:49:28.883711 kubelet[2511]: E0517 00:49:28.883686 2511 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:49:28.884079 kubelet[2511]: E0517 00:49:28.883976 2511 kuberuntime_manager.go:1274] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-p6jf5,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-8f77d7b6c-78tx5_calico-system(dc3b60ab-99b9-435e-bc94-f900356b518f): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:49:28.885564 kubelet[2511]: E0517 00:49:28.885496 2511 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-8f77d7b6c-78tx5" podUID="dc3b60ab-99b9-435e-bc94-f900356b518f" May 17 00:49:39.719335 kubelet[2511]: E0517 00:49:39.719288 2511 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\"\"" pod="calico-system/goldmane-8f77d7b6c-78tx5" podUID="dc3b60ab-99b9-435e-bc94-f900356b518f" May 17 00:49:39.720153 kubelet[2511]: E0517 00:49:39.720115 2511 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\"\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\"\"]" pod="calico-system/whisker-5c6b5ff985-qsbbb" podUID="1034e955-0d22-4661-9e47-81fdd9a27aa3" May 17 00:49:40.307157 systemd[1]: run-containerd-runc-k8s.io-1d87cdc503ee1ccd701b6534fab870398df46e3585dc65c0281e3637ae46bc86-runc.SwXAvh.mount: Deactivated successfully. May 17 00:49:41.576000 audit[4630]: AVC avc: denied { watch } for pid=4630 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_48_22.2326522322/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c599,c689 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c599,c689 tclass=file permissive=0 May 17 00:49:41.582825 kernel: kauditd_printk_skb: 8 callbacks suppressed May 17 00:49:41.583035 kernel: audit: type=1400 audit(1747442981.576:1378): avc: denied { watch } for pid=4630 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_48_22.2326522322/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c599,c689 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c599,c689 tclass=file permissive=0 May 17 00:49:41.576000 audit[4630]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000ab1400 a2=fc6 a3=0 items=0 ppid=4049 pid=4630 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c599,c689 key=(null) May 17 00:49:41.639071 kernel: audit: type=1300 audit(1747442981.576:1378): arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000ab1400 a2=fc6 a3=0 items=0 ppid=4049 pid=4630 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c599,c689 key=(null) May 17 00:49:41.576000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:49:41.664969 kernel: audit: type=1327 audit(1747442981.576:1378): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:49:46.791000 audit[4876]: AVC avc: denied { watch } for pid=4876 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_48_22.1045717489/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c752,c808 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c752,c808 tclass=file permissive=0 May 17 00:49:46.791000 audit[4876]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4001c7b360 a2=fc6 a3=0 items=0 ppid=4359 pid=4876 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c752,c808 key=(null) May 17 00:49:46.856179 kernel: audit: type=1400 audit(1747442986.791:1379): avc: denied { watch } for pid=4876 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_48_22.1045717489/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c752,c808 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c752,c808 tclass=file permissive=0 May 17 00:49:46.856315 kernel: audit: type=1300 audit(1747442986.791:1379): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4001c7b360 a2=fc6 a3=0 items=0 ppid=4359 pid=4876 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c752,c808 key=(null) May 17 00:49:46.791000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:49:46.882197 kernel: audit: type=1327 audit(1747442986.791:1379): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:49:47.202000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c661,c791 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:49:47.202000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c661,c791 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:49:47.250419 kernel: audit: type=1400 audit(1747442987.202:1380): avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c661,c791 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:49:47.250532 kernel: audit: type=1400 audit(1747442987.202:1381): avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c661,c791 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:49:47.202000 audit[2333]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=79 a1=4007a726a0 a2=fc6 a3=0 items=0 ppid=2196 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c661,c791 key=(null) May 17 00:49:47.202000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3432002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 00:49:47.306336 kernel: audit: type=1300 audit(1747442987.202:1380): arch=c00000b7 syscall=27 success=no exit=-13 a0=79 a1=4007a726a0 a2=fc6 a3=0 items=0 ppid=2196 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c661,c791 key=(null) May 17 00:49:47.306434 kernel: audit: type=1327 audit(1747442987.202:1380): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3432002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 00:49:47.202000 audit[2333]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7a a1=400e6f4810 a2=fc6 a3=0 items=0 ppid=2196 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c661,c791 key=(null) May 17 00:49:47.334780 kernel: audit: type=1300 audit(1747442987.202:1381): arch=c00000b7 syscall=27 success=no exit=-13 a0=7a a1=400e6f4810 a2=fc6 a3=0 items=0 ppid=2196 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c661,c791 key=(null) May 17 00:49:47.202000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3432002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 00:49:47.359544 kernel: audit: type=1327 audit(1747442987.202:1381): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3432002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 00:49:47.205000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520974 scontext=system_u:system_r:svirt_lxc_net_t:s0:c661,c791 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:49:47.382913 kernel: audit: type=1400 audit(1747442987.205:1382): avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520974 scontext=system_u:system_r:svirt_lxc_net_t:s0:c661,c791 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:49:47.205000 audit[2333]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=79 a1=400635b200 a2=fc6 a3=0 items=0 ppid=2196 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c661,c791 key=(null) May 17 00:49:47.205000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3432002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 00:49:47.221000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520980 scontext=system_u:system_r:svirt_lxc_net_t:s0:c661,c791 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:49:47.221000 audit[2333]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=79 a1=400e6f4960 a2=fc6 a3=0 items=0 ppid=2196 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c661,c791 key=(null) May 17 00:49:47.221000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3432002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 00:49:47.337000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c661,c791 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:49:47.337000 audit[2333]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=79 a1=4007a72880 a2=fc6 a3=0 items=0 ppid=2196 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c661,c791 key=(null) May 17 00:49:47.337000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3432002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 00:49:47.337000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c661,c791 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:49:47.337000 audit[2333]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=79 a1=400635b3b0 a2=fc6 a3=0 items=0 ppid=2196 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c661,c791 key=(null) May 17 00:49:47.337000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3432002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 00:49:47.936000 audit[2391]: AVC avc: denied { watch } for pid=2391 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c122,c191 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:49:47.936000 audit[2391]: AVC avc: denied { watch } for pid=2391 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c122,c191 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:49:47.936000 audit[2391]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000735c80 a2=fc6 a3=0 items=0 ppid=2229 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c122,c191 key=(null) May 17 00:49:47.936000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:49:47.936000 audit[2391]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4001070000 a2=fc6 a3=0 items=0 ppid=2229 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c122,c191 key=(null) May 17 00:49:47.936000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:49:53.233828 systemd[1]: run-containerd-runc-k8s.io-0fe041b6526005d27dff24254e42a99f0d13b50fa49aaf1ddfe85280a4329309-runc.6NfhBM.mount: Deactivated successfully. May 17 00:49:53.719256 kubelet[2511]: E0517 00:49:53.719218 2511 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\"\"" pod="calico-system/goldmane-8f77d7b6c-78tx5" podUID="dc3b60ab-99b9-435e-bc94-f900356b518f" May 17 00:49:54.488000 audit[2391]: AVC avc: denied { watch } for pid=2391 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c122,c191 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:49:54.494869 kernel: kauditd_printk_skb: 17 callbacks suppressed May 17 00:49:54.494948 kernel: audit: type=1400 audit(1747442994.488:1388): avc: denied { watch } for pid=2391 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c122,c191 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:49:54.490000 audit[2391]: AVC avc: denied { watch } for pid=2391 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c122,c191 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:49:54.540984 kernel: audit: type=1400 audit(1747442994.490:1389): avc: denied { watch } for pid=2391 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c122,c191 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:49:54.490000 audit[2391]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4001070fa0 a2=fc6 a3=0 items=0 ppid=2229 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c122,c191 key=(null) May 17 00:49:54.571507 kernel: audit: type=1300 audit(1747442994.490:1389): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4001070fa0 a2=fc6 a3=0 items=0 ppid=2229 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c122,c191 key=(null) May 17 00:49:54.490000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:49:54.597064 kernel: audit: type=1327 audit(1747442994.490:1389): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:49:54.597220 kernel: audit: type=1400 audit(1747442994.491:1390): avc: denied { watch } for pid=2391 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c122,c191 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:49:54.491000 audit[2391]: AVC avc: denied { watch } for pid=2391 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c122,c191 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:49:54.619625 kernel: audit: type=1300 audit(1747442994.491:1390): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4001071820 a2=fc6 a3=0 items=0 ppid=2229 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c122,c191 key=(null) May 17 00:49:54.491000 audit[2391]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4001071820 a2=fc6 a3=0 items=0 ppid=2229 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c122,c191 key=(null) May 17 00:49:54.491000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:49:54.676343 kernel: audit: type=1327 audit(1747442994.491:1390): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:49:54.676549 kernel: audit: type=1400 audit(1747442994.491:1391): avc: denied { watch } for pid=2391 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c122,c191 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:49:54.491000 audit[2391]: AVC avc: denied { watch } for pid=2391 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c122,c191 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:49:54.491000 audit[2391]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40010719c0 a2=fc6 a3=0 items=0 ppid=2229 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c122,c191 key=(null) May 17 00:49:54.728908 kernel: audit: type=1300 audit(1747442994.491:1391): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40010719c0 a2=fc6 a3=0 items=0 ppid=2229 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c122,c191 key=(null) May 17 00:49:54.730041 kernel: audit: type=1327 audit(1747442994.491:1391): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:49:54.491000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:49:54.730190 env[1452]: time="2025-05-17T00:49:54.729777384Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\"" May 17 00:49:54.488000 audit[2391]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40000ed040 a2=fc6 a3=0 items=0 ppid=2229 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c122,c191 key=(null) May 17 00:49:54.488000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:49:54.922319 env[1452]: time="2025-05-17T00:49:54.922255484Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:49:54.931474 env[1452]: time="2025-05-17T00:49:54.931411205Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:49:54.931854 kubelet[2511]: E0517 00:49:54.931806 2511 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:49:54.931854 kubelet[2511]: E0517 00:49:54.931881 2511 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:49:54.932217 kubelet[2511]: E0517 00:49:54.931988 2511 kuberuntime_manager.go:1274] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.0,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:f515ef07f4944df1b53f071bfd4a71b4,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-98cxh,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-5c6b5ff985-qsbbb_calico-system(1034e955-0d22-4661-9e47-81fdd9a27aa3): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:49:54.934270 env[1452]: time="2025-05-17T00:49:54.934241162Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\"" May 17 00:49:55.128496 env[1452]: time="2025-05-17T00:49:55.128356657Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:49:55.134569 env[1452]: time="2025-05-17T00:49:55.134515217Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:49:55.134911 kubelet[2511]: E0517 00:49:55.134854 2511 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:49:55.135000 kubelet[2511]: E0517 00:49:55.134921 2511 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:49:55.135093 kubelet[2511]: E0517 00:49:55.135051 2511 kuberuntime_manager.go:1274] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-98cxh,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-5c6b5ff985-qsbbb_calico-system(1034e955-0d22-4661-9e47-81fdd9a27aa3): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:49:55.136429 kubelet[2511]: E0517 00:49:55.136392 2511 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-5c6b5ff985-qsbbb" podUID="1034e955-0d22-4661-9e47-81fdd9a27aa3" May 17 00:50:05.719141 kubelet[2511]: E0517 00:50:05.719103 2511 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\"\"" pod="calico-system/goldmane-8f77d7b6c-78tx5" podUID="dc3b60ab-99b9-435e-bc94-f900356b518f" May 17 00:50:08.380000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.20.42:22-10.200.16.10:36822 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:08.381345 systemd[1]: Started sshd@7-10.200.20.42:22-10.200.16.10:36822.service. May 17 00:50:08.386853 kernel: kauditd_printk_skb: 2 callbacks suppressed May 17 00:50:08.386978 kernel: audit: type=1130 audit(1747443008.380:1392): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.20.42:22-10.200.16.10:36822 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:08.719966 kubelet[2511]: E0517 00:50:08.719920 2511 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\"\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\"\"]" pod="calico-system/whisker-5c6b5ff985-qsbbb" podUID="1034e955-0d22-4661-9e47-81fdd9a27aa3" May 17 00:50:08.895942 sshd[5544]: Accepted publickey for core from 10.200.16.10 port 36822 ssh2: RSA SHA256:kTalk4vvVOHJD+odK+kI4Z4CxTmNI3TSVyFiPn8PnHg May 17 00:50:08.894000 audit[5544]: USER_ACCT pid=5544 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:08.901478 sshd[5544]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:50:08.895000 audit[5544]: CRED_ACQ pid=5544 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:08.943399 kernel: audit: type=1101 audit(1747443008.894:1393): pid=5544 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:08.943549 kernel: audit: type=1103 audit(1747443008.895:1394): pid=5544 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:08.958252 kernel: audit: type=1006 audit(1747443008.895:1395): pid=5544 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 May 17 00:50:08.895000 audit[5544]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe57188b0 a2=3 a3=1 items=0 ppid=1 pid=5544 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:08.986239 systemd-logind[1439]: New session 10 of user core. May 17 00:50:08.986733 systemd[1]: Started session-10.scope. May 17 00:50:08.895000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:50:08.998559 kernel: audit: type=1300 audit(1747443008.895:1395): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe57188b0 a2=3 a3=1 items=0 ppid=1 pid=5544 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:08.998720 kernel: audit: type=1327 audit(1747443008.895:1395): proctitle=737368643A20636F7265205B707269765D May 17 00:50:09.002000 audit[5544]: USER_START pid=5544 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:09.031000 audit[5546]: CRED_ACQ pid=5546 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:09.055352 kernel: audit: type=1105 audit(1747443009.002:1396): pid=5544 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:09.055508 kernel: audit: type=1103 audit(1747443009.031:1397): pid=5546 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:09.382972 sshd[5544]: pam_unix(sshd:session): session closed for user core May 17 00:50:09.383000 audit[5544]: USER_END pid=5544 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:09.386885 systemd-logind[1439]: Session 10 logged out. Waiting for processes to exit. May 17 00:50:09.388195 systemd[1]: session-10.scope: Deactivated successfully. May 17 00:50:09.389473 systemd-logind[1439]: Removed session 10. May 17 00:50:09.390120 systemd[1]: sshd@7-10.200.20.42:22-10.200.16.10:36822.service: Deactivated successfully. May 17 00:50:09.384000 audit[5544]: CRED_DISP pid=5544 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:09.432706 kernel: audit: type=1106 audit(1747443009.383:1398): pid=5544 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:09.432843 kernel: audit: type=1104 audit(1747443009.384:1399): pid=5544 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:09.389000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.20.42:22-10.200.16.10:36822 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:10.307090 systemd[1]: run-containerd-runc-k8s.io-1d87cdc503ee1ccd701b6534fab870398df46e3585dc65c0281e3637ae46bc86-runc.7O0eEQ.mount: Deactivated successfully. May 17 00:50:14.466537 systemd[1]: Started sshd@8-10.200.20.42:22-10.200.16.10:53364.service. May 17 00:50:14.465000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.20.42:22-10.200.16.10:53364 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:14.474275 kernel: kauditd_printk_skb: 1 callbacks suppressed May 17 00:50:14.474410 kernel: audit: type=1130 audit(1747443014.465:1401): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.20.42:22-10.200.16.10:53364 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:14.948000 audit[5578]: USER_ACCT pid=5578 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:14.949638 sshd[5578]: Accepted publickey for core from 10.200.16.10 port 53364 ssh2: RSA SHA256:kTalk4vvVOHJD+odK+kI4Z4CxTmNI3TSVyFiPn8PnHg May 17 00:50:14.974688 sshd[5578]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:50:14.973000 audit[5578]: CRED_ACQ pid=5578 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:14.997525 kernel: audit: type=1101 audit(1747443014.948:1402): pid=5578 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:14.997666 kernel: audit: type=1103 audit(1747443014.973:1403): pid=5578 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:15.012732 kernel: audit: type=1006 audit(1747443014.973:1404): pid=5578 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 May 17 00:50:14.973000 audit[5578]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe3aec060 a2=3 a3=1 items=0 ppid=1 pid=5578 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:15.036952 kernel: audit: type=1300 audit(1747443014.973:1404): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe3aec060 a2=3 a3=1 items=0 ppid=1 pid=5578 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:14.973000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:50:15.040888 systemd-logind[1439]: New session 11 of user core. May 17 00:50:15.041472 systemd[1]: Started session-11.scope. May 17 00:50:15.047185 kernel: audit: type=1327 audit(1747443014.973:1404): proctitle=737368643A20636F7265205B707269765D May 17 00:50:15.047264 kernel: audit: type=1105 audit(1747443015.046:1405): pid=5578 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:15.046000 audit[5578]: USER_START pid=5578 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:15.073000 audit[5580]: CRED_ACQ pid=5580 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:15.096330 kernel: audit: type=1103 audit(1747443015.073:1406): pid=5580 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:15.456899 sshd[5578]: pam_unix(sshd:session): session closed for user core May 17 00:50:15.457000 audit[5578]: USER_END pid=5578 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:15.459670 systemd[1]: session-11.scope: Deactivated successfully. May 17 00:50:15.460601 systemd[1]: sshd@8-10.200.20.42:22-10.200.16.10:53364.service: Deactivated successfully. May 17 00:50:15.484762 systemd-logind[1439]: Session 11 logged out. Waiting for processes to exit. May 17 00:50:15.485712 systemd-logind[1439]: Removed session 11. May 17 00:50:15.457000 audit[5578]: CRED_DISP pid=5578 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:15.510325 kernel: audit: type=1106 audit(1747443015.457:1407): pid=5578 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:15.510468 kernel: audit: type=1104 audit(1747443015.457:1408): pid=5578 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:15.459000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.20.42:22-10.200.16.10:53364 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:18.207676 systemd[1]: run-containerd-runc-k8s.io-0fe041b6526005d27dff24254e42a99f0d13b50fa49aaf1ddfe85280a4329309-runc.dR9k3Z.mount: Deactivated successfully. May 17 00:50:20.536690 systemd[1]: Started sshd@9-10.200.20.42:22-10.200.16.10:40510.service. May 17 00:50:20.564679 kernel: kauditd_printk_skb: 1 callbacks suppressed May 17 00:50:20.564797 kernel: audit: type=1130 audit(1747443020.535:1410): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.20.42:22-10.200.16.10:40510 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:20.535000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.20.42:22-10.200.16.10:40510 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:20.720493 env[1452]: time="2025-05-17T00:50:20.720254192Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\"" May 17 00:50:20.935598 env[1452]: time="2025-05-17T00:50:20.935470046Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:50:20.945142 env[1452]: time="2025-05-17T00:50:20.945093089Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:50:20.945558 kubelet[2511]: E0517 00:50:20.945521 2511 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:50:20.945933 kubelet[2511]: E0517 00:50:20.945908 2511 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:50:20.946165 kubelet[2511]: E0517 00:50:20.946120 2511 kuberuntime_manager.go:1274] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-p6jf5,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-8f77d7b6c-78tx5_calico-system(dc3b60ab-99b9-435e-bc94-f900356b518f): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:50:20.947557 kubelet[2511]: E0517 00:50:20.947511 2511 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-8f77d7b6c-78tx5" podUID="dc3b60ab-99b9-435e-bc94-f900356b518f" May 17 00:50:21.018000 audit[5611]: USER_ACCT pid=5611 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:21.019829 sshd[5611]: Accepted publickey for core from 10.200.16.10 port 40510 ssh2: RSA SHA256:kTalk4vvVOHJD+odK+kI4Z4CxTmNI3TSVyFiPn8PnHg May 17 00:50:21.021794 sshd[5611]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:50:21.020000 audit[5611]: CRED_ACQ pid=5611 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:21.068351 kernel: audit: type=1101 audit(1747443021.018:1411): pid=5611 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:21.068464 kernel: audit: type=1103 audit(1747443021.020:1412): pid=5611 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:21.082998 kernel: audit: type=1006 audit(1747443021.020:1413): pid=5611 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 May 17 00:50:21.020000 audit[5611]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe124a650 a2=3 a3=1 items=0 ppid=1 pid=5611 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:21.107346 kernel: audit: type=1300 audit(1747443021.020:1413): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe124a650 a2=3 a3=1 items=0 ppid=1 pid=5611 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:21.020000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:50:21.111666 systemd[1]: Started session-12.scope. May 17 00:50:21.112278 systemd-logind[1439]: New session 12 of user core. May 17 00:50:21.115930 kernel: audit: type=1327 audit(1747443021.020:1413): proctitle=737368643A20636F7265205B707269765D May 17 00:50:21.119000 audit[5611]: USER_START pid=5611 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:21.120000 audit[5613]: CRED_ACQ pid=5613 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:21.169444 kernel: audit: type=1105 audit(1747443021.119:1414): pid=5611 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:21.169580 kernel: audit: type=1103 audit(1747443021.120:1415): pid=5613 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:21.484692 sshd[5611]: pam_unix(sshd:session): session closed for user core May 17 00:50:21.485000 audit[5611]: USER_END pid=5611 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:21.487648 systemd-logind[1439]: Session 12 logged out. Waiting for processes to exit. May 17 00:50:21.495587 systemd[1]: sshd@9-10.200.20.42:22-10.200.16.10:40510.service: Deactivated successfully. May 17 00:50:21.496433 systemd[1]: session-12.scope: Deactivated successfully. May 17 00:50:21.497674 systemd-logind[1439]: Removed session 12. May 17 00:50:21.485000 audit[5611]: CRED_DISP pid=5611 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:21.535037 kernel: audit: type=1106 audit(1747443021.485:1416): pid=5611 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:21.535173 kernel: audit: type=1104 audit(1747443021.485:1417): pid=5611 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:21.494000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.20.42:22-10.200.16.10:40510 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:21.719424 kubelet[2511]: E0517 00:50:21.719380 2511 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\"\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\"\"]" pod="calico-system/whisker-5c6b5ff985-qsbbb" podUID="1034e955-0d22-4661-9e47-81fdd9a27aa3" May 17 00:50:23.229006 systemd[1]: run-containerd-runc-k8s.io-0fe041b6526005d27dff24254e42a99f0d13b50fa49aaf1ddfe85280a4329309-runc.6FO9GT.mount: Deactivated successfully. May 17 00:50:26.565932 systemd[1]: Started sshd@10-10.200.20.42:22-10.200.16.10:40516.service. May 17 00:50:26.565000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.20.42:22-10.200.16.10:40516 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:26.572095 kernel: kauditd_printk_skb: 1 callbacks suppressed May 17 00:50:26.572206 kernel: audit: type=1130 audit(1747443026.565:1419): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.20.42:22-10.200.16.10:40516 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:27.057000 audit[5643]: USER_ACCT pid=5643 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:27.058783 sshd[5643]: Accepted publickey for core from 10.200.16.10 port 40516 ssh2: RSA SHA256:kTalk4vvVOHJD+odK+kI4Z4CxTmNI3TSVyFiPn8PnHg May 17 00:50:27.060747 sshd[5643]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:50:27.059000 audit[5643]: CRED_ACQ pid=5643 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:27.109550 kernel: audit: type=1101 audit(1747443027.057:1420): pid=5643 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:27.109712 kernel: audit: type=1103 audit(1747443027.059:1421): pid=5643 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:27.124002 kernel: audit: type=1006 audit(1747443027.059:1422): pid=5643 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 May 17 00:50:27.059000 audit[5643]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd085c940 a2=3 a3=1 items=0 ppid=1 pid=5643 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:27.128975 systemd-logind[1439]: New session 13 of user core. May 17 00:50:27.130340 systemd[1]: Started session-13.scope. May 17 00:50:27.152868 kernel: audit: type=1300 audit(1747443027.059:1422): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd085c940 a2=3 a3=1 items=0 ppid=1 pid=5643 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:27.059000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:50:27.161443 kernel: audit: type=1327 audit(1747443027.059:1422): proctitle=737368643A20636F7265205B707269765D May 17 00:50:27.134000 audit[5643]: USER_START pid=5643 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:27.188945 kernel: audit: type=1105 audit(1747443027.134:1423): pid=5643 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:27.136000 audit[5647]: CRED_ACQ pid=5647 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:27.210654 kernel: audit: type=1103 audit(1747443027.136:1424): pid=5647 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:27.480447 sshd[5643]: pam_unix(sshd:session): session closed for user core May 17 00:50:27.480000 audit[5643]: USER_END pid=5643 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:27.483728 systemd-logind[1439]: Session 13 logged out. Waiting for processes to exit. May 17 00:50:27.485093 systemd[1]: session-13.scope: Deactivated successfully. May 17 00:50:27.486362 systemd-logind[1439]: Removed session 13. May 17 00:50:27.487177 systemd[1]: sshd@10-10.200.20.42:22-10.200.16.10:40516.service: Deactivated successfully. May 17 00:50:27.481000 audit[5643]: CRED_DISP pid=5643 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:27.530680 kernel: audit: type=1106 audit(1747443027.480:1425): pid=5643 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:27.530933 kernel: audit: type=1104 audit(1747443027.481:1426): pid=5643 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:27.486000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.20.42:22-10.200.16.10:40516 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:27.556232 systemd[1]: Started sshd@11-10.200.20.42:22-10.200.16.10:40518.service. May 17 00:50:27.555000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.20.42:22-10.200.16.10:40518 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:28.009000 audit[5658]: USER_ACCT pid=5658 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:28.010808 sshd[5658]: Accepted publickey for core from 10.200.16.10 port 40518 ssh2: RSA SHA256:kTalk4vvVOHJD+odK+kI4Z4CxTmNI3TSVyFiPn8PnHg May 17 00:50:28.010000 audit[5658]: CRED_ACQ pid=5658 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:28.011000 audit[5658]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdcc006c0 a2=3 a3=1 items=0 ppid=1 pid=5658 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:28.011000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:50:28.012610 sshd[5658]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:50:28.017542 systemd-logind[1439]: New session 14 of user core. May 17 00:50:28.018153 systemd[1]: Started session-14.scope. May 17 00:50:28.022000 audit[5658]: USER_START pid=5658 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:28.023000 audit[5660]: CRED_ACQ pid=5660 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:28.452507 sshd[5658]: pam_unix(sshd:session): session closed for user core May 17 00:50:28.453000 audit[5658]: USER_END pid=5658 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:28.453000 audit[5658]: CRED_DISP pid=5658 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:28.455000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.20.42:22-10.200.16.10:40518 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:28.456077 systemd[1]: sshd@11-10.200.20.42:22-10.200.16.10:40518.service: Deactivated successfully. May 17 00:50:28.457006 systemd[1]: session-14.scope: Deactivated successfully. May 17 00:50:28.458364 systemd-logind[1439]: Session 14 logged out. Waiting for processes to exit. May 17 00:50:28.459200 systemd-logind[1439]: Removed session 14. May 17 00:50:28.533000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.20.42:22-10.200.16.10:47384 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:28.533972 systemd[1]: Started sshd@12-10.200.20.42:22-10.200.16.10:47384.service. May 17 00:50:29.026000 audit[5673]: USER_ACCT pid=5673 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:29.027931 sshd[5673]: Accepted publickey for core from 10.200.16.10 port 47384 ssh2: RSA SHA256:kTalk4vvVOHJD+odK+kI4Z4CxTmNI3TSVyFiPn8PnHg May 17 00:50:29.028000 audit[5673]: CRED_ACQ pid=5673 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:29.028000 audit[5673]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe3e9e560 a2=3 a3=1 items=0 ppid=1 pid=5673 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:29.028000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:50:29.029677 sshd[5673]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:50:29.034700 systemd[1]: Started session-15.scope. May 17 00:50:29.035815 systemd-logind[1439]: New session 15 of user core. May 17 00:50:29.039000 audit[5673]: USER_START pid=5673 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:29.041000 audit[5676]: CRED_ACQ pid=5676 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:29.457250 sshd[5673]: pam_unix(sshd:session): session closed for user core May 17 00:50:29.457000 audit[5673]: USER_END pid=5673 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:29.457000 audit[5673]: CRED_DISP pid=5673 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:29.460949 systemd-logind[1439]: Session 15 logged out. Waiting for processes to exit. May 17 00:50:29.461135 systemd[1]: sshd@12-10.200.20.42:22-10.200.16.10:47384.service: Deactivated successfully. May 17 00:50:29.461987 systemd[1]: session-15.scope: Deactivated successfully. May 17 00:50:29.460000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.20.42:22-10.200.16.10:47384 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:29.462911 systemd-logind[1439]: Removed session 15. May 17 00:50:32.720404 kubelet[2511]: E0517 00:50:32.720345 2511 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\"\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\"\"]" pod="calico-system/whisker-5c6b5ff985-qsbbb" podUID="1034e955-0d22-4661-9e47-81fdd9a27aa3" May 17 00:50:34.536000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.20.42:22-10.200.16.10:47392 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:34.537284 systemd[1]: Started sshd@13-10.200.20.42:22-10.200.16.10:47392.service. May 17 00:50:34.542700 kernel: kauditd_printk_skb: 23 callbacks suppressed May 17 00:50:34.542813 kernel: audit: type=1130 audit(1747443034.536:1446): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.20.42:22-10.200.16.10:47392 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:34.996000 audit[5687]: USER_ACCT pid=5687 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:34.997846 sshd[5687]: Accepted publickey for core from 10.200.16.10 port 47392 ssh2: RSA SHA256:kTalk4vvVOHJD+odK+kI4Z4CxTmNI3TSVyFiPn8PnHg May 17 00:50:35.022907 kernel: audit: type=1101 audit(1747443034.996:1447): pid=5687 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:35.023021 kernel: audit: type=1103 audit(1747443035.021:1448): pid=5687 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:35.021000 audit[5687]: CRED_ACQ pid=5687 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:35.023362 sshd[5687]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:50:35.030088 systemd[1]: Started session-16.scope. May 17 00:50:35.031390 systemd-logind[1439]: New session 16 of user core. May 17 00:50:35.061020 kernel: audit: type=1006 audit(1747443035.021:1449): pid=5687 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 May 17 00:50:35.061167 kernel: audit: type=1300 audit(1747443035.021:1449): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc688c5e0 a2=3 a3=1 items=0 ppid=1 pid=5687 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:35.021000 audit[5687]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc688c5e0 a2=3 a3=1 items=0 ppid=1 pid=5687 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:35.021000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:50:35.093306 kernel: audit: type=1327 audit(1747443035.021:1449): proctitle=737368643A20636F7265205B707269765D May 17 00:50:35.035000 audit[5687]: USER_START pid=5687 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:35.119808 kernel: audit: type=1105 audit(1747443035.035:1450): pid=5687 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:35.120017 kernel: audit: type=1103 audit(1747443035.037:1451): pid=5689 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:35.037000 audit[5689]: CRED_ACQ pid=5689 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:35.421097 sshd[5687]: pam_unix(sshd:session): session closed for user core May 17 00:50:35.421000 audit[5687]: USER_END pid=5687 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:35.426376 systemd-logind[1439]: Session 16 logged out. Waiting for processes to exit. May 17 00:50:35.427707 systemd[1]: session-16.scope: Deactivated successfully. May 17 00:50:35.429023 systemd-logind[1439]: Removed session 16. May 17 00:50:35.429696 systemd[1]: sshd@13-10.200.20.42:22-10.200.16.10:47392.service: Deactivated successfully. May 17 00:50:35.421000 audit[5687]: CRED_DISP pid=5687 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:35.473899 kernel: audit: type=1106 audit(1747443035.421:1452): pid=5687 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:35.474055 kernel: audit: type=1104 audit(1747443035.421:1453): pid=5687 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:35.429000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.20.42:22-10.200.16.10:47392 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:35.505888 systemd[1]: Started sshd@14-10.200.20.42:22-10.200.16.10:47402.service. May 17 00:50:35.505000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.20.42:22-10.200.16.10:47402 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:35.719095 kubelet[2511]: E0517 00:50:35.719043 2511 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\"\"" pod="calico-system/goldmane-8f77d7b6c-78tx5" podUID="dc3b60ab-99b9-435e-bc94-f900356b518f" May 17 00:50:35.989000 audit[5699]: USER_ACCT pid=5699 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:35.991041 sshd[5699]: Accepted publickey for core from 10.200.16.10 port 47402 ssh2: RSA SHA256:kTalk4vvVOHJD+odK+kI4Z4CxTmNI3TSVyFiPn8PnHg May 17 00:50:35.991000 audit[5699]: CRED_ACQ pid=5699 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:35.991000 audit[5699]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff0706600 a2=3 a3=1 items=0 ppid=1 pid=5699 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:35.991000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:50:35.992384 sshd[5699]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:50:35.996981 systemd[1]: Started session-17.scope. May 17 00:50:35.998210 systemd-logind[1439]: New session 17 of user core. May 17 00:50:36.001000 audit[5699]: USER_START pid=5699 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:36.002000 audit[5701]: CRED_ACQ pid=5701 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:36.522985 sshd[5699]: pam_unix(sshd:session): session closed for user core May 17 00:50:36.523000 audit[5699]: USER_END pid=5699 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:36.523000 audit[5699]: CRED_DISP pid=5699 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:36.525000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.20.42:22-10.200.16.10:47402 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:36.526425 systemd[1]: sshd@14-10.200.20.42:22-10.200.16.10:47402.service: Deactivated successfully. May 17 00:50:36.527311 systemd[1]: session-17.scope: Deactivated successfully. May 17 00:50:36.528356 systemd-logind[1439]: Session 17 logged out. Waiting for processes to exit. May 17 00:50:36.529329 systemd-logind[1439]: Removed session 17. May 17 00:50:36.603762 systemd[1]: Started sshd@15-10.200.20.42:22-10.200.16.10:47408.service. May 17 00:50:36.603000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.20.42:22-10.200.16.10:47408 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:37.090312 sshd[5709]: Accepted publickey for core from 10.200.16.10 port 47408 ssh2: RSA SHA256:kTalk4vvVOHJD+odK+kI4Z4CxTmNI3TSVyFiPn8PnHg May 17 00:50:37.089000 audit[5709]: USER_ACCT pid=5709 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:37.091952 sshd[5709]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:50:37.090000 audit[5709]: CRED_ACQ pid=5709 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:37.090000 audit[5709]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe868e7a0 a2=3 a3=1 items=0 ppid=1 pid=5709 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:37.090000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:50:37.097394 systemd[1]: Started session-18.scope. May 17 00:50:37.098647 systemd-logind[1439]: New session 18 of user core. May 17 00:50:37.102000 audit[5709]: USER_START pid=5709 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:37.103000 audit[5711]: CRED_ACQ pid=5711 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:39.445000 audit[5721]: NETFILTER_CFG table=filter:136 family=2 entries=24 op=nft_register_rule pid=5721 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:50:39.445000 audit[5721]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=13432 a0=3 a1=ffffc07fd060 a2=0 a3=1 items=0 ppid=2658 pid=5721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:39.445000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:50:39.453000 audit[5721]: NETFILTER_CFG table=nat:137 family=2 entries=22 op=nft_register_rule pid=5721 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:50:39.453000 audit[5721]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffc07fd060 a2=0 a3=1 items=0 ppid=2658 pid=5721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:39.453000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:50:39.487000 audit[5723]: NETFILTER_CFG table=filter:138 family=2 entries=36 op=nft_register_rule pid=5723 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:50:39.487000 audit[5723]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=13432 a0=3 a1=ffffe17cea90 a2=0 a3=1 items=0 ppid=2658 pid=5723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:39.487000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:50:39.497000 audit[5723]: NETFILTER_CFG table=nat:139 family=2 entries=22 op=nft_register_rule pid=5723 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:50:39.497000 audit[5723]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffe17cea90 a2=0 a3=1 items=0 ppid=2658 pid=5723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:39.497000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:50:39.531488 sshd[5709]: pam_unix(sshd:session): session closed for user core May 17 00:50:39.531000 audit[5709]: USER_END pid=5709 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:39.531000 audit[5709]: CRED_DISP pid=5709 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:39.534209 systemd[1]: sshd@15-10.200.20.42:22-10.200.16.10:47408.service: Deactivated successfully. May 17 00:50:39.533000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.20.42:22-10.200.16.10:47408 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:39.535072 systemd[1]: session-18.scope: Deactivated successfully. May 17 00:50:39.535626 systemd-logind[1439]: Session 18 logged out. Waiting for processes to exit. May 17 00:50:39.536479 systemd-logind[1439]: Removed session 18. May 17 00:50:39.606000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.20.42:22-10.200.16.10:44946 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:39.607104 systemd[1]: Started sshd@16-10.200.20.42:22-10.200.16.10:44946.service. May 17 00:50:39.612872 kernel: kauditd_printk_skb: 35 callbacks suppressed May 17 00:50:39.612999 kernel: audit: type=1130 audit(1747443039.606:1477): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.20.42:22-10.200.16.10:44946 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:40.070000 audit[5726]: USER_ACCT pid=5726 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:40.072799 sshd[5726]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:50:40.073457 sshd[5726]: Accepted publickey for core from 10.200.16.10 port 44946 ssh2: RSA SHA256:kTalk4vvVOHJD+odK+kI4Z4CxTmNI3TSVyFiPn8PnHg May 17 00:50:40.071000 audit[5726]: CRED_ACQ pid=5726 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:40.119642 kernel: audit: type=1101 audit(1747443040.070:1478): pid=5726 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:40.119797 kernel: audit: type=1103 audit(1747443040.071:1479): pid=5726 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:40.134118 kernel: audit: type=1006 audit(1747443040.071:1480): pid=5726 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 May 17 00:50:40.071000 audit[5726]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdc63a0a0 a2=3 a3=1 items=0 ppid=1 pid=5726 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:40.159304 kernel: audit: type=1300 audit(1747443040.071:1480): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdc63a0a0 a2=3 a3=1 items=0 ppid=1 pid=5726 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:40.071000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:50:40.163413 systemd-logind[1439]: New session 19 of user core. May 17 00:50:40.164119 systemd[1]: Started session-19.scope. May 17 00:50:40.168701 kernel: audit: type=1327 audit(1747443040.071:1480): proctitle=737368643A20636F7265205B707269765D May 17 00:50:40.170744 kernel: audit: type=1105 audit(1747443040.168:1481): pid=5726 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:40.168000 audit[5726]: USER_START pid=5726 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:40.195000 audit[5728]: CRED_ACQ pid=5728 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:40.217964 kernel: audit: type=1103 audit(1747443040.195:1482): pid=5728 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:40.656408 sshd[5726]: pam_unix(sshd:session): session closed for user core May 17 00:50:40.656000 audit[5726]: USER_END pid=5726 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:40.659348 systemd[1]: session-19.scope: Deactivated successfully. May 17 00:50:40.660213 systemd[1]: sshd@16-10.200.20.42:22-10.200.16.10:44946.service: Deactivated successfully. May 17 00:50:40.656000 audit[5726]: CRED_DISP pid=5726 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:40.685101 systemd-logind[1439]: Session 19 logged out. Waiting for processes to exit. May 17 00:50:40.686159 systemd-logind[1439]: Removed session 19. May 17 00:50:40.706130 kernel: audit: type=1106 audit(1747443040.656:1483): pid=5726 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:40.706310 kernel: audit: type=1104 audit(1747443040.656:1484): pid=5726 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:40.659000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.20.42:22-10.200.16.10:44946 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:40.736067 systemd[1]: Started sshd@17-10.200.20.42:22-10.200.16.10:44952.service. May 17 00:50:40.735000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.20.42:22-10.200.16.10:44952 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:41.218000 audit[5755]: USER_ACCT pid=5755 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:41.220010 sshd[5755]: Accepted publickey for core from 10.200.16.10 port 44952 ssh2: RSA SHA256:kTalk4vvVOHJD+odK+kI4Z4CxTmNI3TSVyFiPn8PnHg May 17 00:50:41.220000 audit[5755]: CRED_ACQ pid=5755 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:41.220000 audit[5755]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff24c62b0 a2=3 a3=1 items=0 ppid=1 pid=5755 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:41.220000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:50:41.221295 sshd[5755]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:50:41.225478 systemd-logind[1439]: New session 20 of user core. May 17 00:50:41.226040 systemd[1]: Started session-20.scope. May 17 00:50:41.229000 audit[5755]: USER_START pid=5755 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:41.231000 audit[5757]: CRED_ACQ pid=5757 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:41.578000 audit[4630]: AVC avc: denied { watch } for pid=4630 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_48_22.2326522322/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c599,c689 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c599,c689 tclass=file permissive=0 May 17 00:50:41.578000 audit[4630]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000ab0020 a2=fc6 a3=0 items=0 ppid=4049 pid=4630 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c599,c689 key=(null) May 17 00:50:41.578000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:50:41.643626 sshd[5755]: pam_unix(sshd:session): session closed for user core May 17 00:50:41.643000 audit[5755]: USER_END pid=5755 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:41.643000 audit[5755]: CRED_DISP pid=5755 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:41.646462 systemd[1]: sshd@17-10.200.20.42:22-10.200.16.10:44952.service: Deactivated successfully. May 17 00:50:41.645000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.20.42:22-10.200.16.10:44952 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:41.647346 systemd[1]: session-20.scope: Deactivated successfully. May 17 00:50:41.648020 systemd-logind[1439]: Session 20 logged out. Waiting for processes to exit. May 17 00:50:41.649152 systemd-logind[1439]: Removed session 20. May 17 00:50:46.143384 kernel: kauditd_printk_skb: 15 callbacks suppressed May 17 00:50:46.143534 kernel: audit: type=1325 audit(1747443046.123:1496): table=filter:140 family=2 entries=24 op=nft_register_rule pid=5767 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:50:46.123000 audit[5767]: NETFILTER_CFG table=filter:140 family=2 entries=24 op=nft_register_rule pid=5767 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:50:46.123000 audit[5767]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=fffff5d1e400 a2=0 a3=1 items=0 ppid=2658 pid=5767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:46.123000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:50:46.194145 kernel: audit: type=1300 audit(1747443046.123:1496): arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=fffff5d1e400 a2=0 a3=1 items=0 ppid=2658 pid=5767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:46.194246 kernel: audit: type=1327 audit(1747443046.123:1496): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:50:46.151000 audit[5767]: NETFILTER_CFG table=nat:141 family=2 entries=106 op=nft_register_chain pid=5767 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:50:46.209172 kernel: audit: type=1325 audit(1747443046.151:1497): table=nat:141 family=2 entries=106 op=nft_register_chain pid=5767 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:50:46.151000 audit[5767]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=49452 a0=3 a1=fffff5d1e400 a2=0 a3=1 items=0 ppid=2658 pid=5767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:46.236745 kernel: audit: type=1300 audit(1747443046.151:1497): arch=c00000b7 syscall=211 success=yes exit=49452 a0=3 a1=fffff5d1e400 a2=0 a3=1 items=0 ppid=2658 pid=5767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:46.151000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:50:46.252105 kernel: audit: type=1327 audit(1747443046.151:1497): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:50:46.721755 kubelet[2511]: E0517 00:50:46.721710 2511 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\"\"" pod="calico-system/goldmane-8f77d7b6c-78tx5" podUID="dc3b60ab-99b9-435e-bc94-f900356b518f" May 17 00:50:46.726417 systemd[1]: Started sshd@18-10.200.20.42:22-10.200.16.10:44958.service. May 17 00:50:46.725000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.20.42:22-10.200.16.10:44958 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:46.751108 kubelet[2511]: E0517 00:50:46.735173 2511 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\"\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\"\"]" pod="calico-system/whisker-5c6b5ff985-qsbbb" podUID="1034e955-0d22-4661-9e47-81fdd9a27aa3" May 17 00:50:46.761892 kernel: audit: type=1130 audit(1747443046.725:1498): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.20.42:22-10.200.16.10:44958 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:46.815000 audit[4876]: AVC avc: denied { watch } for pid=4876 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_48_22.1045717489/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c752,c808 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c752,c808 tclass=file permissive=0 May 17 00:50:46.815000 audit[4876]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40020a6bc0 a2=fc6 a3=0 items=0 ppid=4359 pid=4876 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c752,c808 key=(null) May 17 00:50:46.881994 kernel: audit: type=1400 audit(1747443046.815:1499): avc: denied { watch } for pid=4876 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_48_22.1045717489/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c752,c808 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c752,c808 tclass=file permissive=0 May 17 00:50:46.882142 kernel: audit: type=1300 audit(1747443046.815:1499): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40020a6bc0 a2=fc6 a3=0 items=0 ppid=4359 pid=4876 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c752,c808 key=(null) May 17 00:50:46.815000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:50:46.908480 kernel: audit: type=1327 audit(1747443046.815:1499): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:50:47.203000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c661,c791 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:50:47.203000 audit[2333]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7c a1=4007af9f00 a2=fc6 a3=0 items=0 ppid=2196 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c661,c791 key=(null) May 17 00:50:47.203000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3432002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 00:50:47.203000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c661,c791 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:50:47.203000 audit[2333]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7c a1=400781c1e0 a2=fc6 a3=0 items=0 ppid=2196 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c661,c791 key=(null) May 17 00:50:47.203000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3432002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 00:50:47.206000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520974 scontext=system_u:system_r:svirt_lxc_net_t:s0:c661,c791 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:50:47.206000 audit[2333]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7c a1=4005a32540 a2=fc6 a3=0 items=0 ppid=2196 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c661,c791 key=(null) May 17 00:50:47.206000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3432002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 00:50:47.222000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520980 scontext=system_u:system_r:svirt_lxc_net_t:s0:c661,c791 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:50:47.222000 audit[2333]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7c a1=400781c450 a2=fc6 a3=0 items=0 ppid=2196 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c661,c791 key=(null) May 17 00:50:47.222000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3432002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 00:50:47.247000 audit[5770]: USER_ACCT pid=5770 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:47.248224 sshd[5770]: Accepted publickey for core from 10.200.16.10 port 44958 ssh2: RSA SHA256:kTalk4vvVOHJD+odK+kI4Z4CxTmNI3TSVyFiPn8PnHg May 17 00:50:47.248000 audit[5770]: CRED_ACQ pid=5770 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:47.248000 audit[5770]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd763c670 a2=3 a3=1 items=0 ppid=1 pid=5770 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:47.248000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:50:47.250162 sshd[5770]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:50:47.254521 systemd-logind[1439]: New session 21 of user core. May 17 00:50:47.255151 systemd[1]: Started session-21.scope. May 17 00:50:47.258000 audit[5770]: USER_START pid=5770 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:47.260000 audit[5772]: CRED_ACQ pid=5772 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:47.337000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c661,c791 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:50:47.337000 audit[2333]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7c a1=4007d5e360 a2=fc6 a3=0 items=0 ppid=2196 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c661,c791 key=(null) May 17 00:50:47.337000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3432002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 00:50:47.337000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c661,c791 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:50:47.337000 audit[2333]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7d a1=401ad3bec0 a2=fc6 a3=0 items=0 ppid=2196 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c661,c791 key=(null) May 17 00:50:47.337000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3432002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 00:50:47.701034 sshd[5770]: pam_unix(sshd:session): session closed for user core May 17 00:50:47.701000 audit[5770]: USER_END pid=5770 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:47.701000 audit[5770]: CRED_DISP pid=5770 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:47.703000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.20.42:22-10.200.16.10:44958 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:47.704186 systemd-logind[1439]: Session 21 logged out. Waiting for processes to exit. May 17 00:50:47.704360 systemd[1]: sshd@18-10.200.20.42:22-10.200.16.10:44958.service: Deactivated successfully. May 17 00:50:47.705189 systemd[1]: session-21.scope: Deactivated successfully. May 17 00:50:47.706300 systemd-logind[1439]: Removed session 21. May 17 00:50:47.937000 audit[2391]: AVC avc: denied { watch } for pid=2391 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c122,c191 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:50:47.937000 audit[2391]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40029fc300 a2=fc6 a3=0 items=0 ppid=2229 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c122,c191 key=(null) May 17 00:50:47.937000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:50:47.938000 audit[2391]: AVC avc: denied { watch } for pid=2391 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c122,c191 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:50:47.938000 audit[2391]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001626960 a2=fc6 a3=0 items=0 ppid=2229 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c122,c191 key=(null) May 17 00:50:47.938000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:50:52.781268 systemd[1]: Started sshd@19-10.200.20.42:22-10.200.16.10:33910.service. May 17 00:50:52.809484 kernel: kauditd_printk_skb: 34 callbacks suppressed May 17 00:50:52.809611 kernel: audit: type=1130 audit(1747443052.780:1516): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.20.42:22-10.200.16.10:33910 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:52.780000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.20.42:22-10.200.16.10:33910 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:53.264000 audit[5784]: USER_ACCT pid=5784 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:53.271377 sshd[5784]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:50:53.272123 sshd[5784]: Accepted publickey for core from 10.200.16.10 port 33910 ssh2: RSA SHA256:kTalk4vvVOHJD+odK+kI4Z4CxTmNI3TSVyFiPn8PnHg May 17 00:50:53.270000 audit[5784]: CRED_ACQ pid=5784 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:53.313258 kernel: audit: type=1101 audit(1747443053.264:1517): pid=5784 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:53.313389 kernel: audit: type=1103 audit(1747443053.270:1518): pid=5784 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:53.327786 kernel: audit: type=1006 audit(1747443053.270:1519): pid=5784 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 May 17 00:50:53.270000 audit[5784]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe7f18780 a2=3 a3=1 items=0 ppid=1 pid=5784 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:53.354542 kernel: audit: type=1300 audit(1747443053.270:1519): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe7f18780 a2=3 a3=1 items=0 ppid=1 pid=5784 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:53.270000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:50:53.364219 kernel: audit: type=1327 audit(1747443053.270:1519): proctitle=737368643A20636F7265205B707269765D May 17 00:50:53.366204 systemd-logind[1439]: New session 22 of user core. May 17 00:50:53.366636 systemd[1]: Started session-22.scope. May 17 00:50:53.370000 audit[5784]: USER_START pid=5784 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:53.400000 audit[5807]: CRED_ACQ pid=5807 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:53.426625 kernel: audit: type=1105 audit(1747443053.370:1520): pid=5784 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:53.426760 kernel: audit: type=1103 audit(1747443053.400:1521): pid=5807 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:53.741167 sshd[5784]: pam_unix(sshd:session): session closed for user core May 17 00:50:53.741000 audit[5784]: USER_END pid=5784 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:53.769553 systemd[1]: sshd@19-10.200.20.42:22-10.200.16.10:33910.service: Deactivated successfully. May 17 00:50:53.744000 audit[5784]: CRED_DISP pid=5784 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:53.791876 kernel: audit: type=1106 audit(1747443053.741:1522): pid=5784 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:53.791988 kernel: audit: type=1104 audit(1747443053.744:1523): pid=5784 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:53.770401 systemd[1]: session-22.scope: Deactivated successfully. May 17 00:50:53.768000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.20.42:22-10.200.16.10:33910 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:53.793052 systemd-logind[1439]: Session 22 logged out. Waiting for processes to exit. May 17 00:50:53.793779 systemd-logind[1439]: Removed session 22. May 17 00:50:54.491000 audit[2391]: AVC avc: denied { watch } for pid=2391 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c122,c191 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:50:54.491000 audit[2391]: AVC avc: denied { watch } for pid=2391 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c122,c191 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:50:54.491000 audit[2391]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001626b20 a2=fc6 a3=0 items=0 ppid=2229 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c122,c191 key=(null) May 17 00:50:54.491000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:50:54.491000 audit[2391]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40017c6420 a2=fc6 a3=0 items=0 ppid=2229 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c122,c191 key=(null) May 17 00:50:54.491000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:50:54.491000 audit[2391]: AVC avc: denied { watch } for pid=2391 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c122,c191 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:50:54.491000 audit[2391]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40017c6440 a2=fc6 a3=0 items=0 ppid=2229 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c122,c191 key=(null) May 17 00:50:54.491000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:50:54.491000 audit[2391]: AVC avc: denied { watch } for pid=2391 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c122,c191 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:50:54.491000 audit[2391]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40017c64a0 a2=fc6 a3=0 items=0 ppid=2229 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c122,c191 key=(null) May 17 00:50:54.491000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:50:58.720381 kubelet[2511]: E0517 00:50:58.720325 2511 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\"\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\"\"]" pod="calico-system/whisker-5c6b5ff985-qsbbb" podUID="1034e955-0d22-4661-9e47-81fdd9a27aa3" May 17 00:50:58.820000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.20.42:22-10.200.16.10:50436 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:58.821619 systemd[1]: Started sshd@20-10.200.20.42:22-10.200.16.10:50436.service. May 17 00:50:58.826999 kernel: kauditd_printk_skb: 13 callbacks suppressed May 17 00:50:58.827128 kernel: audit: type=1130 audit(1747443058.820:1529): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.20.42:22-10.200.16.10:50436 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:59.312000 audit[5818]: USER_ACCT pid=5818 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:59.313843 sshd[5818]: Accepted publickey for core from 10.200.16.10 port 50436 ssh2: RSA SHA256:kTalk4vvVOHJD+odK+kI4Z4CxTmNI3TSVyFiPn8PnHg May 17 00:50:59.315784 sshd[5818]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:50:59.314000 audit[5818]: CRED_ACQ pid=5818 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:59.364020 kernel: audit: type=1101 audit(1747443059.312:1530): pid=5818 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:59.364165 kernel: audit: type=1103 audit(1747443059.314:1531): pid=5818 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:59.379099 kernel: audit: type=1006 audit(1747443059.314:1532): pid=5818 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 May 17 00:50:59.314000 audit[5818]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffea847470 a2=3 a3=1 items=0 ppid=1 pid=5818 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:59.403395 kernel: audit: type=1300 audit(1747443059.314:1532): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffea847470 a2=3 a3=1 items=0 ppid=1 pid=5818 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:59.314000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:50:59.407686 systemd[1]: Started session-23.scope. May 17 00:50:59.409210 systemd-logind[1439]: New session 23 of user core. May 17 00:50:59.411990 kernel: audit: type=1327 audit(1747443059.314:1532): proctitle=737368643A20636F7265205B707269765D May 17 00:50:59.413000 audit[5818]: USER_START pid=5818 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:59.415000 audit[5820]: CRED_ACQ pid=5820 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:59.464178 kernel: audit: type=1105 audit(1747443059.413:1533): pid=5818 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:59.464313 kernel: audit: type=1103 audit(1747443059.415:1534): pid=5820 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:59.766521 sshd[5818]: pam_unix(sshd:session): session closed for user core May 17 00:50:59.766000 audit[5818]: USER_END pid=5818 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:59.770137 systemd-logind[1439]: Session 23 logged out. Waiting for processes to exit. May 17 00:50:59.771486 systemd[1]: session-23.scope: Deactivated successfully. May 17 00:50:59.772932 systemd-logind[1439]: Removed session 23. May 17 00:50:59.773697 systemd[1]: sshd@20-10.200.20.42:22-10.200.16.10:50436.service: Deactivated successfully. May 17 00:50:59.794975 kernel: audit: type=1106 audit(1747443059.766:1535): pid=5818 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:59.795077 kernel: audit: type=1104 audit(1747443059.767:1536): pid=5818 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:59.767000 audit[5818]: CRED_DISP pid=5818 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:59.773000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.20.42:22-10.200.16.10:50436 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:51:01.719342 kubelet[2511]: E0517 00:51:01.719066 2511 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\"\"" pod="calico-system/goldmane-8f77d7b6c-78tx5" podUID="dc3b60ab-99b9-435e-bc94-f900356b518f" May 17 00:51:04.849258 systemd[1]: Started sshd@21-10.200.20.42:22-10.200.16.10:50452.service. May 17 00:51:04.877242 kernel: kauditd_printk_skb: 1 callbacks suppressed May 17 00:51:04.877362 kernel: audit: type=1130 audit(1747443064.848:1538): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.20.42:22-10.200.16.10:50452 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:51:04.848000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.20.42:22-10.200.16.10:50452 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:51:05.333000 audit[5830]: USER_ACCT pid=5830 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:51:05.334808 sshd[5830]: Accepted publickey for core from 10.200.16.10 port 50452 ssh2: RSA SHA256:kTalk4vvVOHJD+odK+kI4Z4CxTmNI3TSVyFiPn8PnHg May 17 00:51:05.336679 sshd[5830]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:51:05.335000 audit[5830]: CRED_ACQ pid=5830 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:51:05.381804 kernel: audit: type=1101 audit(1747443065.333:1539): pid=5830 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:51:05.382146 kernel: audit: type=1103 audit(1747443065.335:1540): pid=5830 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:51:05.396433 kernel: audit: type=1006 audit(1747443065.335:1541): pid=5830 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 May 17 00:51:05.335000 audit[5830]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffddb32700 a2=3 a3=1 items=0 ppid=1 pid=5830 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:05.421294 kernel: audit: type=1300 audit(1747443065.335:1541): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffddb32700 a2=3 a3=1 items=0 ppid=1 pid=5830 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:05.335000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:51:05.430533 kernel: audit: type=1327 audit(1747443065.335:1541): proctitle=737368643A20636F7265205B707269765D May 17 00:51:05.431306 systemd-logind[1439]: New session 24 of user core. May 17 00:51:05.431765 systemd[1]: Started session-24.scope. May 17 00:51:05.436000 audit[5830]: USER_START pid=5830 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:51:05.463000 audit[5833]: CRED_ACQ pid=5833 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:51:05.485840 kernel: audit: type=1105 audit(1747443065.436:1542): pid=5830 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:51:05.485955 kernel: audit: type=1103 audit(1747443065.463:1543): pid=5833 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:51:05.802230 sshd[5830]: pam_unix(sshd:session): session closed for user core May 17 00:51:05.802000 audit[5830]: USER_END pid=5830 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:51:05.830124 systemd[1]: sshd@21-10.200.20.42:22-10.200.16.10:50452.service: Deactivated successfully. May 17 00:51:05.830979 systemd[1]: session-24.scope: Deactivated successfully. May 17 00:51:05.803000 audit[5830]: CRED_DISP pid=5830 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:51:05.832633 systemd-logind[1439]: Session 24 logged out. Waiting for processes to exit. May 17 00:51:05.833570 systemd-logind[1439]: Removed session 24. May 17 00:51:05.853811 kernel: audit: type=1106 audit(1747443065.802:1544): pid=5830 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:51:05.853977 kernel: audit: type=1104 audit(1747443065.803:1545): pid=5830 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:51:05.829000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.20.42:22-10.200.16.10:50452 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:51:10.304650 systemd[1]: run-containerd-runc-k8s.io-1d87cdc503ee1ccd701b6534fab870398df46e3585dc65c0281e3637ae46bc86-runc.ukTgZt.mount: Deactivated successfully. May 17 00:51:10.882000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.20.42:22-10.200.16.10:45264 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:51:10.883131 systemd[1]: Started sshd@22-10.200.20.42:22-10.200.16.10:45264.service. May 17 00:51:10.888828 kernel: kauditd_printk_skb: 1 callbacks suppressed May 17 00:51:10.889086 kernel: audit: type=1130 audit(1747443070.882:1547): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.20.42:22-10.200.16.10:45264 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:51:11.375000 audit[5866]: USER_ACCT pid=5866 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:51:11.376248 sshd[5866]: Accepted publickey for core from 10.200.16.10 port 45264 ssh2: RSA SHA256:kTalk4vvVOHJD+odK+kI4Z4CxTmNI3TSVyFiPn8PnHg May 17 00:51:11.378253 sshd[5866]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:51:11.376000 audit[5866]: CRED_ACQ pid=5866 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:51:11.401972 kernel: audit: type=1101 audit(1747443071.375:1548): pid=5866 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:51:11.402055 kernel: audit: type=1103 audit(1747443071.376:1549): pid=5866 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:51:11.439431 kernel: audit: type=1006 audit(1747443071.377:1550): pid=5866 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 May 17 00:51:11.377000 audit[5866]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc4d00e70 a2=3 a3=1 items=0 ppid=1 pid=5866 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:11.464302 kernel: audit: type=1300 audit(1747443071.377:1550): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc4d00e70 a2=3 a3=1 items=0 ppid=1 pid=5866 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:11.377000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:51:11.473112 kernel: audit: type=1327 audit(1747443071.377:1550): proctitle=737368643A20636F7265205B707269765D May 17 00:51:11.473850 systemd-logind[1439]: New session 25 of user core. May 17 00:51:11.474424 systemd[1]: Started session-25.scope. May 17 00:51:11.483000 audit[5866]: USER_START pid=5866 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:51:11.510000 audit[5868]: CRED_ACQ pid=5868 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:51:11.533014 kernel: audit: type=1105 audit(1747443071.483:1551): pid=5866 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:51:11.533123 kernel: audit: type=1103 audit(1747443071.510:1552): pid=5868 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:51:11.842123 sshd[5866]: pam_unix(sshd:session): session closed for user core May 17 00:51:11.842000 audit[5866]: USER_END pid=5866 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:51:11.846681 systemd[1]: session-25.scope: Deactivated successfully. May 17 00:51:11.847530 systemd[1]: sshd@22-10.200.20.42:22-10.200.16.10:45264.service: Deactivated successfully. May 17 00:51:11.844000 audit[5866]: CRED_DISP pid=5866 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:51:11.871169 systemd-logind[1439]: Session 25 logged out. Waiting for processes to exit. May 17 00:51:11.872156 systemd-logind[1439]: Removed session 25. May 17 00:51:11.892915 kernel: audit: type=1106 audit(1747443071.842:1553): pid=5866 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:51:11.893054 kernel: audit: type=1104 audit(1747443071.844:1554): pid=5866 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:51:11.846000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.20.42:22-10.200.16.10:45264 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:51:13.719904 kubelet[2511]: E0517 00:51:13.719843 2511 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\"\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\"\"]" pod="calico-system/whisker-5c6b5ff985-qsbbb" podUID="1034e955-0d22-4661-9e47-81fdd9a27aa3" May 17 00:51:16.719715 kubelet[2511]: E0517 00:51:16.719519 2511 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\"\"" pod="calico-system/goldmane-8f77d7b6c-78tx5" podUID="dc3b60ab-99b9-435e-bc94-f900356b518f" May 17 00:51:16.929000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.20.42:22-10.200.16.10:45274 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:51:16.930207 systemd[1]: Started sshd@23-10.200.20.42:22-10.200.16.10:45274.service. May 17 00:51:16.935765 kernel: kauditd_printk_skb: 1 callbacks suppressed May 17 00:51:16.935847 kernel: audit: type=1130 audit(1747443076.929:1556): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.20.42:22-10.200.16.10:45274 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:51:17.415000 audit[5883]: USER_ACCT pid=5883 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:51:17.417069 sshd[5883]: Accepted publickey for core from 10.200.16.10 port 45274 ssh2: RSA SHA256:kTalk4vvVOHJD+odK+kI4Z4CxTmNI3TSVyFiPn8PnHg May 17 00:51:17.443504 kernel: audit: type=1101 audit(1747443077.415:1557): pid=5883 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:51:17.443616 kernel: audit: type=1103 audit(1747443077.441:1558): pid=5883 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:51:17.441000 audit[5883]: CRED_ACQ pid=5883 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:51:17.443094 sshd[5883]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:51:17.488149 kernel: audit: type=1006 audit(1747443077.441:1559): pid=5883 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 May 17 00:51:17.441000 audit[5883]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc9b2d1f0 a2=3 a3=1 items=0 ppid=1 pid=5883 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:17.512874 kernel: audit: type=1300 audit(1747443077.441:1559): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc9b2d1f0 a2=3 a3=1 items=0 ppid=1 pid=5883 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:17.441000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:51:17.517787 systemd-logind[1439]: New session 26 of user core. May 17 00:51:17.524037 kernel: audit: type=1327 audit(1747443077.441:1559): proctitle=737368643A20636F7265205B707269765D May 17 00:51:17.524522 systemd[1]: Started session-26.scope. May 17 00:51:17.534000 audit[5883]: USER_START pid=5883 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:51:17.536000 audit[5885]: CRED_ACQ pid=5885 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:51:17.594823 kernel: audit: type=1105 audit(1747443077.534:1560): pid=5883 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:51:17.595036 kernel: audit: type=1103 audit(1747443077.536:1561): pid=5885 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:51:17.887283 sshd[5883]: pam_unix(sshd:session): session closed for user core May 17 00:51:17.887000 audit[5883]: USER_END pid=5883 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:51:17.887000 audit[5883]: CRED_DISP pid=5883 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:51:17.936982 kernel: audit: type=1106 audit(1747443077.887:1562): pid=5883 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:51:17.937083 kernel: audit: type=1104 audit(1747443077.887:1563): pid=5883 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:51:17.915372 systemd[1]: sshd@23-10.200.20.42:22-10.200.16.10:45274.service: Deactivated successfully. May 17 00:51:17.916263 systemd[1]: session-26.scope: Deactivated successfully. May 17 00:51:17.914000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.20.42:22-10.200.16.10:45274 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:51:17.938022 systemd-logind[1439]: Session 26 logged out. Waiting for processes to exit. May 17 00:51:17.938823 systemd-logind[1439]: Removed session 26. May 17 00:51:18.206428 systemd[1]: run-containerd-runc-k8s.io-0fe041b6526005d27dff24254e42a99f0d13b50fa49aaf1ddfe85280a4329309-runc.QKAVKy.mount: Deactivated successfully.