May 17 00:46:00.054810 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] May 17 00:46:00.054829 kernel: Linux version 5.15.182-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Fri May 16 23:24:21 -00 2025 May 17 00:46:00.054838 kernel: earlycon: pl11 at MMIO 0x00000000effec000 (options '') May 17 00:46:00.054845 kernel: printk: bootconsole [pl11] enabled May 17 00:46:00.054850 kernel: efi: EFI v2.70 by EDK II May 17 00:46:00.054856 kernel: efi: ACPI 2.0=0x3fd5f018 SMBIOS=0x3e580000 SMBIOS 3.0=0x3e560000 MEMATTR=0x3f214018 RNG=0x3fd5f998 MEMRESERVE=0x3763cf98 May 17 00:46:00.054862 kernel: random: crng init done May 17 00:46:00.054868 kernel: ACPI: Early table checksum verification disabled May 17 00:46:00.054874 kernel: ACPI: RSDP 0x000000003FD5F018 000024 (v02 VRTUAL) May 17 00:46:00.054879 kernel: ACPI: XSDT 0x000000003FD5FF18 00006C (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 00:46:00.054885 kernel: ACPI: FACP 0x000000003FD5FC18 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 00:46:00.054891 kernel: ACPI: DSDT 0x000000003FD41018 01DFCD (v02 MSFTVM DSDT01 00000001 INTL 20230628) May 17 00:46:00.054897 kernel: ACPI: DBG2 0x000000003FD5FB18 000072 (v00 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 00:46:00.054903 kernel: ACPI: GTDT 0x000000003FD5FD98 000060 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 00:46:00.054910 kernel: ACPI: OEM0 0x000000003FD5F098 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 00:46:00.054916 kernel: ACPI: SPCR 0x000000003FD5FA98 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 00:46:00.054922 kernel: ACPI: APIC 0x000000003FD5F818 0000FC (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 00:46:00.054929 kernel: ACPI: SRAT 0x000000003FD5F198 000234 (v03 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 00:46:00.054935 kernel: ACPI: PPTT 0x000000003FD5F418 000120 (v01 VRTUAL MICROSFT 00000000 MSFT 00000000) May 17 00:46:00.054941 kernel: ACPI: BGRT 0x000000003FD5FE98 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 00:46:00.054947 kernel: ACPI: SPCR: console: pl011,mmio32,0xeffec000,115200 May 17 00:46:00.054953 kernel: NUMA: Failed to initialise from firmware May 17 00:46:00.054959 kernel: NUMA: Faking a node at [mem 0x0000000000000000-0x00000001bfffffff] May 17 00:46:00.054965 kernel: NUMA: NODE_DATA [mem 0x1bf7f3900-0x1bf7f8fff] May 17 00:46:00.054971 kernel: Zone ranges: May 17 00:46:00.054977 kernel: DMA [mem 0x0000000000000000-0x00000000ffffffff] May 17 00:46:00.054983 kernel: DMA32 empty May 17 00:46:00.054989 kernel: Normal [mem 0x0000000100000000-0x00000001bfffffff] May 17 00:46:00.054996 kernel: Movable zone start for each node May 17 00:46:00.055002 kernel: Early memory node ranges May 17 00:46:00.055008 kernel: node 0: [mem 0x0000000000000000-0x00000000007fffff] May 17 00:46:00.055014 kernel: node 0: [mem 0x0000000000824000-0x000000003e54ffff] May 17 00:46:00.055020 kernel: node 0: [mem 0x000000003e550000-0x000000003e87ffff] May 17 00:46:00.055026 kernel: node 0: [mem 0x000000003e880000-0x000000003fc7ffff] May 17 00:46:00.055032 kernel: node 0: [mem 0x000000003fc80000-0x000000003fcfffff] May 17 00:46:00.055038 kernel: node 0: [mem 0x000000003fd00000-0x000000003fffffff] May 17 00:46:00.055043 kernel: node 0: [mem 0x0000000100000000-0x00000001bfffffff] May 17 00:46:00.055049 kernel: Initmem setup node 0 [mem 0x0000000000000000-0x00000001bfffffff] May 17 00:46:00.055055 kernel: On node 0, zone DMA: 36 pages in unavailable ranges May 17 00:46:00.055061 kernel: psci: probing for conduit method from ACPI. May 17 00:46:00.055071 kernel: psci: PSCIv1.1 detected in firmware. May 17 00:46:00.055077 kernel: psci: Using standard PSCI v0.2 function IDs May 17 00:46:00.055084 kernel: psci: MIGRATE_INFO_TYPE not supported. May 17 00:46:00.055090 kernel: psci: SMC Calling Convention v1.4 May 17 00:46:00.055096 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x0 -> Node -1 May 17 00:46:00.055103 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1 -> Node -1 May 17 00:46:00.055110 kernel: percpu: Embedded 30 pages/cpu s83032 r8192 d31656 u122880 May 17 00:46:00.055116 kernel: pcpu-alloc: s83032 r8192 d31656 u122880 alloc=30*4096 May 17 00:46:00.055123 kernel: pcpu-alloc: [0] 0 [0] 1 May 17 00:46:00.055129 kernel: Detected PIPT I-cache on CPU0 May 17 00:46:00.055135 kernel: CPU features: detected: GIC system register CPU interface May 17 00:46:00.055142 kernel: CPU features: detected: Hardware dirty bit management May 17 00:46:00.055148 kernel: CPU features: detected: Spectre-BHB May 17 00:46:00.055154 kernel: CPU features: kernel page table isolation forced ON by KASLR May 17 00:46:00.055161 kernel: CPU features: detected: Kernel page table isolation (KPTI) May 17 00:46:00.055167 kernel: CPU features: detected: ARM erratum 1418040 May 17 00:46:00.055174 kernel: CPU features: detected: ARM erratum 1542419 (kernel portion) May 17 00:46:00.055181 kernel: CPU features: detected: SSBS not fully self-synchronizing May 17 00:46:00.055187 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1032156 May 17 00:46:00.055193 kernel: Policy zone: Normal May 17 00:46:00.055201 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=2d48a3f066dcb37cd386b93b4921577cdf70daa76e7b097cf98da108968f8bb5 May 17 00:46:00.055208 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 17 00:46:00.055214 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) May 17 00:46:00.055220 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 17 00:46:00.055227 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 17 00:46:00.055233 kernel: software IO TLB: mapped [mem 0x000000003a550000-0x000000003e550000] (64MB) May 17 00:46:00.055240 kernel: Memory: 3986944K/4194160K available (9792K kernel code, 2094K rwdata, 7584K rodata, 36416K init, 777K bss, 207216K reserved, 0K cma-reserved) May 17 00:46:00.055247 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 May 17 00:46:00.055254 kernel: trace event string verifier disabled May 17 00:46:00.055260 kernel: rcu: Preemptible hierarchical RCU implementation. May 17 00:46:00.055267 kernel: rcu: RCU event tracing is enabled. May 17 00:46:00.055273 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. May 17 00:46:00.055280 kernel: Trampoline variant of Tasks RCU enabled. May 17 00:46:00.055286 kernel: Tracing variant of Tasks RCU enabled. May 17 00:46:00.055293 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 17 00:46:00.055299 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 May 17 00:46:00.055306 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 May 17 00:46:00.055312 kernel: GICv3: 960 SPIs implemented May 17 00:46:00.055319 kernel: GICv3: 0 Extended SPIs implemented May 17 00:46:00.055326 kernel: GICv3: Distributor has no Range Selector support May 17 00:46:00.055332 kernel: Root IRQ handler: gic_handle_irq May 17 00:46:00.055338 kernel: GICv3: 16 PPIs implemented May 17 00:46:00.055344 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000effee000 May 17 00:46:00.055351 kernel: ITS: No ITS available, not enabling LPIs May 17 00:46:00.055357 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 17 00:46:00.055364 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). May 17 00:46:00.055370 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns May 17 00:46:00.055377 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns May 17 00:46:00.055383 kernel: Console: colour dummy device 80x25 May 17 00:46:00.055391 kernel: printk: console [tty1] enabled May 17 00:46:00.055398 kernel: ACPI: Core revision 20210730 May 17 00:46:00.055405 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) May 17 00:46:00.055411 kernel: pid_max: default: 32768 minimum: 301 May 17 00:46:00.055418 kernel: LSM: Security Framework initializing May 17 00:46:00.055424 kernel: SELinux: Initializing. May 17 00:46:00.055431 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 17 00:46:00.055438 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 17 00:46:00.055445 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3a8030, hints 0xe, misc 0x31e1 May 17 00:46:00.055452 kernel: Hyper-V: Host Build 10.0.22477.1619-1-0 May 17 00:46:00.055459 kernel: rcu: Hierarchical SRCU implementation. May 17 00:46:00.055466 kernel: Remapping and enabling EFI services. May 17 00:46:00.055472 kernel: smp: Bringing up secondary CPUs ... May 17 00:46:00.055479 kernel: Detected PIPT I-cache on CPU1 May 17 00:46:00.055485 kernel: GICv3: CPU1: found redistributor 1 region 1:0x00000000f000e000 May 17 00:46:00.055492 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 17 00:46:00.055498 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] May 17 00:46:00.055505 kernel: smp: Brought up 1 node, 2 CPUs May 17 00:46:00.055512 kernel: SMP: Total of 2 processors activated. May 17 00:46:00.055519 kernel: CPU features: detected: 32-bit EL0 Support May 17 00:46:00.055526 kernel: CPU features: detected: Instruction cache invalidation not required for I/D coherence May 17 00:46:00.055532 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence May 17 00:46:00.055539 kernel: CPU features: detected: CRC32 instructions May 17 00:46:00.055546 kernel: CPU features: detected: RCpc load-acquire (LDAPR) May 17 00:46:00.055552 kernel: CPU features: detected: LSE atomic instructions May 17 00:46:00.055559 kernel: CPU features: detected: Privileged Access Never May 17 00:46:00.055565 kernel: CPU: All CPU(s) started at EL1 May 17 00:46:00.055586 kernel: alternatives: patching kernel code May 17 00:46:00.055594 kernel: devtmpfs: initialized May 17 00:46:00.055605 kernel: KASLR enabled May 17 00:46:00.055612 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 17 00:46:00.055620 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) May 17 00:46:00.055627 kernel: pinctrl core: initialized pinctrl subsystem May 17 00:46:00.055634 kernel: SMBIOS 3.1.0 present. May 17 00:46:00.055641 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 09/28/2024 May 17 00:46:00.055648 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 17 00:46:00.055655 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations May 17 00:46:00.055664 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations May 17 00:46:00.055671 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations May 17 00:46:00.055678 kernel: audit: initializing netlink subsys (disabled) May 17 00:46:00.055685 kernel: audit: type=2000 audit(0.086:1): state=initialized audit_enabled=0 res=1 May 17 00:46:00.055692 kernel: thermal_sys: Registered thermal governor 'step_wise' May 17 00:46:00.055699 kernel: cpuidle: using governor menu May 17 00:46:00.055705 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. May 17 00:46:00.055714 kernel: ASID allocator initialised with 32768 entries May 17 00:46:00.055721 kernel: ACPI: bus type PCI registered May 17 00:46:00.055728 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 17 00:46:00.055735 kernel: Serial: AMBA PL011 UART driver May 17 00:46:00.055742 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 17 00:46:00.055749 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages May 17 00:46:00.055755 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 17 00:46:00.055762 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages May 17 00:46:00.055769 kernel: cryptd: max_cpu_qlen set to 1000 May 17 00:46:00.055777 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) May 17 00:46:00.055784 kernel: ACPI: Added _OSI(Module Device) May 17 00:46:00.055791 kernel: ACPI: Added _OSI(Processor Device) May 17 00:46:00.055798 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 17 00:46:00.055805 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 17 00:46:00.055812 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 17 00:46:00.055819 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 17 00:46:00.055826 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 17 00:46:00.055832 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 17 00:46:00.055841 kernel: ACPI: Interpreter enabled May 17 00:46:00.055848 kernel: ACPI: Using GIC for interrupt routing May 17 00:46:00.055855 kernel: ARMH0011:00: ttyAMA0 at MMIO 0xeffec000 (irq = 12, base_baud = 0) is a SBSA May 17 00:46:00.055862 kernel: printk: console [ttyAMA0] enabled May 17 00:46:00.055869 kernel: printk: bootconsole [pl11] disabled May 17 00:46:00.055876 kernel: ARMH0011:01: ttyAMA1 at MMIO 0xeffeb000 (irq = 13, base_baud = 0) is a SBSA May 17 00:46:00.055882 kernel: iommu: Default domain type: Translated May 17 00:46:00.055889 kernel: iommu: DMA domain TLB invalidation policy: strict mode May 17 00:46:00.055896 kernel: vgaarb: loaded May 17 00:46:00.055903 kernel: pps_core: LinuxPPS API ver. 1 registered May 17 00:46:00.055911 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 17 00:46:00.055918 kernel: PTP clock support registered May 17 00:46:00.055925 kernel: Registered efivars operations May 17 00:46:00.055932 kernel: No ACPI PMU IRQ for CPU0 May 17 00:46:00.055939 kernel: No ACPI PMU IRQ for CPU1 May 17 00:46:00.055945 kernel: clocksource: Switched to clocksource arch_sys_counter May 17 00:46:00.055952 kernel: VFS: Disk quotas dquot_6.6.0 May 17 00:46:00.055959 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 17 00:46:00.055967 kernel: pnp: PnP ACPI init May 17 00:46:00.055974 kernel: pnp: PnP ACPI: found 0 devices May 17 00:46:00.055981 kernel: NET: Registered PF_INET protocol family May 17 00:46:00.055988 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) May 17 00:46:00.055995 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) May 17 00:46:00.056002 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 17 00:46:00.056010 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) May 17 00:46:00.056017 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) May 17 00:46:00.056023 kernel: TCP: Hash tables configured (established 32768 bind 32768) May 17 00:46:00.056031 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) May 17 00:46:00.056039 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) May 17 00:46:00.056045 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 17 00:46:00.056052 kernel: PCI: CLS 0 bytes, default 64 May 17 00:46:00.056060 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 1 counters available May 17 00:46:00.056066 kernel: kvm [1]: HYP mode not available May 17 00:46:00.056073 kernel: Initialise system trusted keyrings May 17 00:46:00.056080 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 May 17 00:46:00.056087 kernel: Key type asymmetric registered May 17 00:46:00.056095 kernel: Asymmetric key parser 'x509' registered May 17 00:46:00.056101 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 17 00:46:00.056108 kernel: io scheduler mq-deadline registered May 17 00:46:00.056115 kernel: io scheduler kyber registered May 17 00:46:00.056122 kernel: io scheduler bfq registered May 17 00:46:00.056129 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 17 00:46:00.056136 kernel: thunder_xcv, ver 1.0 May 17 00:46:00.056143 kernel: thunder_bgx, ver 1.0 May 17 00:46:00.056150 kernel: nicpf, ver 1.0 May 17 00:46:00.056156 kernel: nicvf, ver 1.0 May 17 00:46:00.056270 kernel: rtc-efi rtc-efi.0: registered as rtc0 May 17 00:46:00.056331 kernel: rtc-efi rtc-efi.0: setting system clock to 2025-05-17T00:45:59 UTC (1747442759) May 17 00:46:00.056341 kernel: efifb: probing for efifb May 17 00:46:00.056348 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k May 17 00:46:00.056355 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 May 17 00:46:00.056362 kernel: efifb: scrolling: redraw May 17 00:46:00.056369 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 May 17 00:46:00.056378 kernel: Console: switching to colour frame buffer device 128x48 May 17 00:46:00.056385 kernel: fb0: EFI VGA frame buffer device May 17 00:46:00.056392 kernel: SMCCC: SOC_ID: ARCH_SOC_ID not implemented, skipping .... May 17 00:46:00.056399 kernel: hid: raw HID events driver (C) Jiri Kosina May 17 00:46:00.056406 kernel: NET: Registered PF_INET6 protocol family May 17 00:46:00.056412 kernel: Segment Routing with IPv6 May 17 00:46:00.056419 kernel: In-situ OAM (IOAM) with IPv6 May 17 00:46:00.056426 kernel: NET: Registered PF_PACKET protocol family May 17 00:46:00.056433 kernel: Key type dns_resolver registered May 17 00:46:00.056440 kernel: registered taskstats version 1 May 17 00:46:00.056448 kernel: Loading compiled-in X.509 certificates May 17 00:46:00.056455 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.182-flatcar: 2fa973ae674d09a62938b8c6a2b9446b5340adb7' May 17 00:46:00.056461 kernel: Key type .fscrypt registered May 17 00:46:00.056468 kernel: Key type fscrypt-provisioning registered May 17 00:46:00.056475 kernel: ima: No TPM chip found, activating TPM-bypass! May 17 00:46:00.056482 kernel: ima: Allocated hash algorithm: sha1 May 17 00:46:00.056489 kernel: ima: No architecture policies found May 17 00:46:00.056496 kernel: clk: Disabling unused clocks May 17 00:46:00.056504 kernel: Freeing unused kernel memory: 36416K May 17 00:46:00.056511 kernel: Run /init as init process May 17 00:46:00.056517 kernel: with arguments: May 17 00:46:00.056524 kernel: /init May 17 00:46:00.056531 kernel: with environment: May 17 00:46:00.056537 kernel: HOME=/ May 17 00:46:00.056544 kernel: TERM=linux May 17 00:46:00.056551 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 17 00:46:00.056560 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 17 00:46:00.064614 systemd[1]: Detected virtualization microsoft. May 17 00:46:00.064634 systemd[1]: Detected architecture arm64. May 17 00:46:00.064642 systemd[1]: Running in initrd. May 17 00:46:00.064650 systemd[1]: No hostname configured, using default hostname. May 17 00:46:00.064658 systemd[1]: Hostname set to . May 17 00:46:00.064666 systemd[1]: Initializing machine ID from random generator. May 17 00:46:00.064674 systemd[1]: Queued start job for default target initrd.target. May 17 00:46:00.064688 systemd[1]: Started systemd-ask-password-console.path. May 17 00:46:00.064696 systemd[1]: Reached target cryptsetup.target. May 17 00:46:00.064703 systemd[1]: Reached target paths.target. May 17 00:46:00.064710 systemd[1]: Reached target slices.target. May 17 00:46:00.064718 systemd[1]: Reached target swap.target. May 17 00:46:00.064725 systemd[1]: Reached target timers.target. May 17 00:46:00.064734 systemd[1]: Listening on iscsid.socket. May 17 00:46:00.064741 systemd[1]: Listening on iscsiuio.socket. May 17 00:46:00.064750 systemd[1]: Listening on systemd-journald-audit.socket. May 17 00:46:00.064758 systemd[1]: Listening on systemd-journald-dev-log.socket. May 17 00:46:00.064765 systemd[1]: Listening on systemd-journald.socket. May 17 00:46:00.064773 systemd[1]: Listening on systemd-networkd.socket. May 17 00:46:00.064781 systemd[1]: Listening on systemd-udevd-control.socket. May 17 00:46:00.064788 systemd[1]: Listening on systemd-udevd-kernel.socket. May 17 00:46:00.064796 systemd[1]: Reached target sockets.target. May 17 00:46:00.064804 systemd[1]: Starting kmod-static-nodes.service... May 17 00:46:00.064811 systemd[1]: Finished network-cleanup.service. May 17 00:46:00.064820 systemd[1]: Starting systemd-fsck-usr.service... May 17 00:46:00.064828 systemd[1]: Starting systemd-journald.service... May 17 00:46:00.064835 systemd[1]: Starting systemd-modules-load.service... May 17 00:46:00.064843 systemd[1]: Starting systemd-resolved.service... May 17 00:46:00.064851 systemd[1]: Starting systemd-vconsole-setup.service... May 17 00:46:00.064863 systemd-journald[276]: Journal started May 17 00:46:00.064926 systemd-journald[276]: Runtime Journal (/run/log/journal/388203eab0f54d78bcb1b8dcc6b9f48d) is 8.0M, max 78.5M, 70.5M free. May 17 00:46:00.046497 systemd-modules-load[277]: Inserted module 'overlay' May 17 00:46:00.095755 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 17 00:46:00.096589 systemd[1]: Started systemd-journald.service. May 17 00:46:00.110646 kernel: Bridge firewalling registered May 17 00:46:00.110782 systemd-modules-load[277]: Inserted module 'br_netfilter' May 17 00:46:00.148928 kernel: audit: type=1130 audit(1747442760.116:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:00.148952 kernel: SCSI subsystem initialized May 17 00:46:00.116000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:00.114066 systemd-resolved[278]: Positive Trust Anchors: May 17 00:46:00.114074 systemd-resolved[278]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 17 00:46:00.213035 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 17 00:46:00.213059 kernel: device-mapper: uevent: version 1.0.3 May 17 00:46:00.213068 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 17 00:46:00.213077 kernel: audit: type=1130 audit(1747442760.182:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:00.182000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:00.114100 systemd-resolved[278]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 17 00:46:00.270989 kernel: audit: type=1130 audit(1747442760.218:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:00.218000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:00.116204 systemd-resolved[278]: Defaulting to hostname 'linux'. May 17 00:46:00.298410 kernel: audit: type=1130 audit(1747442760.279:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:00.279000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:00.142040 systemd[1]: Finished kmod-static-nodes.service. May 17 00:46:00.328823 kernel: audit: type=1130 audit(1747442760.304:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:00.304000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:00.203614 systemd-modules-load[277]: Inserted module 'dm_multipath' May 17 00:46:00.207814 systemd[1]: Started systemd-resolved.service. May 17 00:46:00.367339 kernel: audit: type=1130 audit(1747442760.334:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:00.334000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:00.218579 systemd[1]: Finished systemd-fsck-usr.service. May 17 00:46:00.279909 systemd[1]: Finished systemd-modules-load.service. May 17 00:46:00.304876 systemd[1]: Finished systemd-vconsole-setup.service. May 17 00:46:00.334523 systemd[1]: Reached target nss-lookup.target. May 17 00:46:00.364560 systemd[1]: Starting dracut-cmdline-ask.service... May 17 00:46:00.377498 systemd[1]: Starting systemd-sysctl.service... May 17 00:46:00.441630 kernel: audit: type=1130 audit(1747442760.417:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:00.417000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:00.396238 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 17 00:46:00.469652 kernel: audit: type=1130 audit(1747442760.444:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:00.444000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:00.407910 systemd[1]: Finished dracut-cmdline-ask.service. May 17 00:46:00.417873 systemd[1]: Finished systemd-sysctl.service. May 17 00:46:00.508601 kernel: audit: type=1130 audit(1747442760.471:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:00.471000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:00.444947 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 17 00:46:00.514282 dracut-cmdline[298]: dracut-dracut-053 May 17 00:46:00.472982 systemd[1]: Starting dracut-cmdline.service... May 17 00:46:00.524419 dracut-cmdline[298]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=2d48a3f066dcb37cd386b93b4921577cdf70daa76e7b097cf98da108968f8bb5 May 17 00:46:00.619593 kernel: Loading iSCSI transport class v2.0-870. May 17 00:46:00.636598 kernel: iscsi: registered transport (tcp) May 17 00:46:00.658503 kernel: iscsi: registered transport (qla4xxx) May 17 00:46:00.658549 kernel: QLogic iSCSI HBA Driver May 17 00:46:00.694275 systemd[1]: Finished dracut-cmdline.service. May 17 00:46:00.699000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:00.700342 systemd[1]: Starting dracut-pre-udev.service... May 17 00:46:00.760589 kernel: raid6: neonx8 gen() 13718 MB/s May 17 00:46:00.778602 kernel: raid6: neonx8 xor() 10743 MB/s May 17 00:46:00.800596 kernel: raid6: neonx4 gen() 13551 MB/s May 17 00:46:00.821579 kernel: raid6: neonx4 xor() 11091 MB/s May 17 00:46:00.842579 kernel: raid6: neonx2 gen() 12972 MB/s May 17 00:46:00.865580 kernel: raid6: neonx2 xor() 10241 MB/s May 17 00:46:00.886577 kernel: raid6: neonx1 gen() 10620 MB/s May 17 00:46:00.907584 kernel: raid6: neonx1 xor() 8794 MB/s May 17 00:46:00.928583 kernel: raid6: int64x8 gen() 6268 MB/s May 17 00:46:00.949577 kernel: raid6: int64x8 xor() 3546 MB/s May 17 00:46:00.970577 kernel: raid6: int64x4 gen() 7231 MB/s May 17 00:46:00.992579 kernel: raid6: int64x4 xor() 3851 MB/s May 17 00:46:01.013577 kernel: raid6: int64x2 gen() 6156 MB/s May 17 00:46:01.034579 kernel: raid6: int64x2 xor() 3322 MB/s May 17 00:46:01.056579 kernel: raid6: int64x1 gen() 5049 MB/s May 17 00:46:01.082318 kernel: raid6: int64x1 xor() 2646 MB/s May 17 00:46:01.082328 kernel: raid6: using algorithm neonx8 gen() 13718 MB/s May 17 00:46:01.082337 kernel: raid6: .... xor() 10743 MB/s, rmw enabled May 17 00:46:01.087137 kernel: raid6: using neon recovery algorithm May 17 00:46:01.110355 kernel: xor: measuring software checksum speed May 17 00:46:01.110369 kernel: 8regs : 17209 MB/sec May 17 00:46:01.115334 kernel: 32regs : 20691 MB/sec May 17 00:46:01.119721 kernel: arm64_neon : 27813 MB/sec May 17 00:46:01.119741 kernel: xor: using function: arm64_neon (27813 MB/sec) May 17 00:46:01.182589 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no May 17 00:46:01.191738 systemd[1]: Finished dracut-pre-udev.service. May 17 00:46:01.196000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:01.201000 audit: BPF prog-id=7 op=LOAD May 17 00:46:01.201000 audit: BPF prog-id=8 op=LOAD May 17 00:46:01.202266 systemd[1]: Starting systemd-udevd.service... May 17 00:46:01.217821 systemd-udevd[474]: Using default interface naming scheme 'v252'. May 17 00:46:01.224489 systemd[1]: Started systemd-udevd.service. May 17 00:46:01.230000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:01.236946 systemd[1]: Starting dracut-pre-trigger.service... May 17 00:46:01.251599 dracut-pre-trigger[495]: rd.md=0: removing MD RAID activation May 17 00:46:01.290375 systemd[1]: Finished dracut-pre-trigger.service. May 17 00:46:01.296000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:01.297359 systemd[1]: Starting systemd-udev-trigger.service... May 17 00:46:01.338761 systemd[1]: Finished systemd-udev-trigger.service. May 17 00:46:01.344000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:01.391597 kernel: hv_vmbus: Vmbus version:5.3 May 17 00:46:01.404594 kernel: hv_vmbus: registering driver hid_hyperv May 17 00:46:01.428907 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input0 May 17 00:46:01.428960 kernel: hv_vmbus: registering driver hyperv_keyboard May 17 00:46:01.428971 kernel: hid-generic 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on May 17 00:46:01.429108 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/MSFT1000:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input1 May 17 00:46:01.449608 kernel: hv_vmbus: registering driver hv_netvsc May 17 00:46:01.449663 kernel: hv_vmbus: registering driver hv_storvsc May 17 00:46:01.463092 kernel: scsi host1: storvsc_host_t May 17 00:46:01.463291 kernel: scsi host0: storvsc_host_t May 17 00:46:01.472412 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 May 17 00:46:01.481591 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 May 17 00:46:01.502988 kernel: sr 0:0:0:2: [sr0] scsi-1 drive May 17 00:46:01.510521 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 May 17 00:46:01.510547 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) May 17 00:46:01.541135 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 May 17 00:46:01.541243 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks May 17 00:46:01.541325 kernel: sd 0:0:0:0: [sda] Write Protect is off May 17 00:46:01.541403 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 May 17 00:46:01.541480 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA May 17 00:46:01.541564 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 17 00:46:01.541605 kernel: sd 0:0:0:0: [sda] Attached SCSI disk May 17 00:46:01.601357 kernel: hv_netvsc 000d3afc-db20-000d-3afc-db20000d3afc eth0: VF slot 1 added May 17 00:46:01.611600 kernel: hv_vmbus: registering driver hv_pci May 17 00:46:01.623331 kernel: hv_pci 90c3cb43-7ed6-4056-a823-cf97c1ea691e: PCI VMBus probing: Using version 0x10004 May 17 00:46:01.949337 kernel: hv_pci 90c3cb43-7ed6-4056-a823-cf97c1ea691e: PCI host bridge to bus 7ed6:00 May 17 00:46:01.949445 kernel: pci_bus 7ed6:00: root bus resource [mem 0xfc0000000-0xfc00fffff window] May 17 00:46:01.949543 kernel: pci_bus 7ed6:00: No busn resource found for root bus, will use [bus 00-ff] May 17 00:46:01.949647 kernel: pci 7ed6:00:02.0: [15b3:1018] type 00 class 0x020000 May 17 00:46:01.949742 kernel: pci 7ed6:00:02.0: reg 0x10: [mem 0xfc0000000-0xfc00fffff 64bit pref] May 17 00:46:01.949821 kernel: pci 7ed6:00:02.0: enabling Extended Tags May 17 00:46:01.949906 kernel: pci 7ed6:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at 7ed6:00:02.0 (capable of 126.016 Gb/s with 8.0 GT/s PCIe x16 link) May 17 00:46:01.949985 kernel: pci_bus 7ed6:00: busn_res: [bus 00-ff] end is updated to 00 May 17 00:46:01.950059 kernel: pci 7ed6:00:02.0: BAR 0: assigned [mem 0xfc0000000-0xfc00fffff 64bit pref] May 17 00:46:01.988590 kernel: mlx5_core 7ed6:00:02.0: firmware version: 16.31.2424 May 17 00:46:02.315944 kernel: mlx5_core 7ed6:00:02.0: MLX5E: StrdRq(1) RqSz(8) StrdSz(2048) RxCqeCmprss(0) May 17 00:46:02.316058 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (537) May 17 00:46:02.316069 kernel: hv_netvsc 000d3afc-db20-000d-3afc-db20000d3afc eth0: VF registering: eth1 May 17 00:46:02.316151 kernel: mlx5_core 7ed6:00:02.0 eth1: joined to eth0 May 17 00:46:02.213364 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 17 00:46:02.263169 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 17 00:46:02.335618 kernel: mlx5_core 7ed6:00:02.0 enP32470s1: renamed from eth1 May 17 00:46:02.403349 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 17 00:46:02.456829 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 17 00:46:02.464332 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 17 00:46:02.481675 systemd[1]: Starting disk-uuid.service... May 17 00:46:02.515600 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 17 00:46:03.516292 disk-uuid[599]: The operation has completed successfully. May 17 00:46:03.522926 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 17 00:46:03.580346 systemd[1]: disk-uuid.service: Deactivated successfully. May 17 00:46:03.584000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:03.584000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:03.580437 systemd[1]: Finished disk-uuid.service. May 17 00:46:03.585979 systemd[1]: Starting verity-setup.service... May 17 00:46:03.640606 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" May 17 00:46:03.827340 systemd[1]: Found device dev-mapper-usr.device. May 17 00:46:03.834178 systemd[1]: Mounting sysusr-usr.mount... May 17 00:46:03.845914 systemd[1]: Finished verity-setup.service. May 17 00:46:03.853000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:03.905595 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 17 00:46:03.905632 systemd[1]: Mounted sysusr-usr.mount. May 17 00:46:03.911192 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 17 00:46:03.912136 systemd[1]: Starting ignition-setup.service... May 17 00:46:03.920767 systemd[1]: Starting parse-ip-for-networkd.service... May 17 00:46:03.960852 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm May 17 00:46:03.960895 kernel: BTRFS info (device sda6): using free space tree May 17 00:46:03.966076 kernel: BTRFS info (device sda6): has skinny extents May 17 00:46:04.017689 systemd[1]: Finished parse-ip-for-networkd.service. May 17 00:46:04.061675 kernel: kauditd_printk_skb: 10 callbacks suppressed May 17 00:46:04.061697 kernel: audit: type=1130 audit(1747442764.022:21): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:04.061709 kernel: audit: type=1334 audit(1747442764.027:22): prog-id=9 op=LOAD May 17 00:46:04.022000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:04.027000 audit: BPF prog-id=9 op=LOAD May 17 00:46:04.028310 systemd[1]: Starting systemd-networkd.service... May 17 00:46:04.084739 systemd-networkd[870]: lo: Link UP May 17 00:46:04.084748 systemd-networkd[870]: lo: Gained carrier May 17 00:46:04.118659 kernel: audit: type=1130 audit(1747442764.094:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:04.094000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:04.088631 systemd-networkd[870]: Enumeration completed May 17 00:46:04.088966 systemd[1]: Started systemd-networkd.service. May 17 00:46:04.091487 systemd-networkd[870]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 17 00:46:04.095325 systemd[1]: mnt-oem.mount: Deactivated successfully. May 17 00:46:04.171807 kernel: audit: type=1130 audit(1747442764.146:24): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:04.146000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:04.095640 systemd[1]: Reached target network.target. May 17 00:46:04.179660 iscsid[879]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 17 00:46:04.179660 iscsid[879]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log May 17 00:46:04.179660 iscsid[879]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 17 00:46:04.179660 iscsid[879]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 17 00:46:04.179660 iscsid[879]: If using hardware iscsi like qla4xxx this message can be ignored. May 17 00:46:04.179660 iscsid[879]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 17 00:46:04.179660 iscsid[879]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 17 00:46:04.280369 kernel: audit: type=1130 audit(1747442764.183:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:04.183000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:04.121762 systemd[1]: Starting iscsiuio.service... May 17 00:46:04.133956 systemd[1]: Started iscsiuio.service. May 17 00:46:04.314714 kernel: audit: type=1130 audit(1747442764.289:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:04.289000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:04.151333 systemd[1]: Starting iscsid.service... May 17 00:46:04.175467 systemd[1]: Started iscsid.service. May 17 00:46:04.209394 systemd[1]: Starting dracut-initqueue.service... May 17 00:46:04.272910 systemd[1]: Finished dracut-initqueue.service. May 17 00:46:04.289639 systemd[1]: Reached target remote-fs-pre.target. May 17 00:46:04.409685 kernel: audit: type=1130 audit(1747442764.356:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:04.409714 kernel: audit: type=1130 audit(1747442764.382:28): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:04.409724 kernel: mlx5_core 7ed6:00:02.0 enP32470s1: Link up May 17 00:46:04.356000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:04.382000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:04.315174 systemd[1]: Reached target remote-cryptsetup.target. May 17 00:46:04.324834 systemd[1]: Reached target remote-fs.target. May 17 00:46:04.330686 systemd[1]: Starting dracut-pre-mount.service... May 17 00:46:04.346562 systemd[1]: Finished ignition-setup.service. May 17 00:46:04.357024 systemd[1]: Finished dracut-pre-mount.service. May 17 00:46:04.401699 systemd[1]: Starting ignition-fetch-offline.service... May 17 00:46:04.499111 kernel: hv_netvsc 000d3afc-db20-000d-3afc-db20000d3afc eth0: Data path switched to VF: enP32470s1 May 17 00:46:04.499299 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:46:04.500057 systemd-networkd[870]: enP32470s1: Link UP May 17 00:46:04.500248 systemd-networkd[870]: eth0: Link UP May 17 00:46:04.500617 systemd-networkd[870]: eth0: Gained carrier May 17 00:46:04.514084 systemd-networkd[870]: enP32470s1: Gained carrier May 17 00:46:04.531653 systemd-networkd[870]: eth0: DHCPv4 address 10.200.20.34/24, gateway 10.200.20.1 acquired from 168.63.129.16 May 17 00:46:06.217808 systemd-networkd[870]: eth0: Gained IPv6LL May 17 00:46:07.003276 ignition[894]: Ignition 2.14.0 May 17 00:46:07.006967 ignition[894]: Stage: fetch-offline May 17 00:46:07.007081 ignition[894]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:46:07.007112 ignition[894]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 17 00:46:07.041931 ignition[894]: no config dir at "/usr/lib/ignition/base.platform.d/azure" May 17 00:46:07.042104 ignition[894]: parsed url from cmdline: "" May 17 00:46:07.042108 ignition[894]: no config URL provided May 17 00:46:07.042114 ignition[894]: reading system config file "/usr/lib/ignition/user.ign" May 17 00:46:07.097659 kernel: audit: type=1130 audit(1747442767.067:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:07.067000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:07.057802 systemd[1]: Finished ignition-fetch-offline.service. May 17 00:46:07.042122 ignition[894]: no config at "/usr/lib/ignition/user.ign" May 17 00:46:07.069240 systemd[1]: Starting ignition-fetch.service... May 17 00:46:07.042127 ignition[894]: failed to fetch config: resource requires networking May 17 00:46:07.042512 ignition[894]: Ignition finished successfully May 17 00:46:07.100965 ignition[901]: Ignition 2.14.0 May 17 00:46:07.100972 ignition[901]: Stage: fetch May 17 00:46:07.101084 ignition[901]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:46:07.101108 ignition[901]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 17 00:46:07.107353 ignition[901]: no config dir at "/usr/lib/ignition/base.platform.d/azure" May 17 00:46:07.107497 ignition[901]: parsed url from cmdline: "" May 17 00:46:07.107500 ignition[901]: no config URL provided May 17 00:46:07.107505 ignition[901]: reading system config file "/usr/lib/ignition/user.ign" May 17 00:46:07.107514 ignition[901]: no config at "/usr/lib/ignition/user.ign" May 17 00:46:07.107545 ignition[901]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 May 17 00:46:07.218601 ignition[901]: GET result: OK May 17 00:46:07.218693 ignition[901]: config has been read from IMDS userdata May 17 00:46:07.218747 ignition[901]: parsing config with SHA512: 8cb59c03f0a02364f850237e80a4524d204fc2dcdd2f1186486b76022d4be2fb3ace39fde9cc74c881ff19266aad6dba0b1f72fe875381cb7be04212809f467e May 17 00:46:07.222535 unknown[901]: fetched base config from "system" May 17 00:46:07.234000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:07.223102 ignition[901]: fetch: fetch complete May 17 00:46:07.269558 kernel: audit: type=1130 audit(1747442767.234:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:07.222556 unknown[901]: fetched base config from "system" May 17 00:46:07.223108 ignition[901]: fetch: fetch passed May 17 00:46:07.222562 unknown[901]: fetched user config from "azure" May 17 00:46:07.284000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:07.223154 ignition[901]: Ignition finished successfully May 17 00:46:07.229142 systemd[1]: Finished ignition-fetch.service. May 17 00:46:07.272252 ignition[907]: Ignition 2.14.0 May 17 00:46:07.260244 systemd[1]: Starting ignition-kargs.service... May 17 00:46:07.314000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:07.272259 ignition[907]: Stage: kargs May 17 00:46:07.279261 systemd[1]: Finished ignition-kargs.service. May 17 00:46:07.272378 ignition[907]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:46:07.285337 systemd[1]: Starting ignition-disks.service... May 17 00:46:07.272402 ignition[907]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 17 00:46:07.309798 systemd[1]: Finished ignition-disks.service. May 17 00:46:07.276917 ignition[907]: no config dir at "/usr/lib/ignition/base.platform.d/azure" May 17 00:46:07.314996 systemd[1]: Reached target initrd-root-device.target. May 17 00:46:07.278313 ignition[907]: kargs: kargs passed May 17 00:46:07.325490 systemd[1]: Reached target local-fs-pre.target. May 17 00:46:07.278375 ignition[907]: Ignition finished successfully May 17 00:46:07.334592 systemd[1]: Reached target local-fs.target. May 17 00:46:07.300653 ignition[913]: Ignition 2.14.0 May 17 00:46:07.344328 systemd[1]: Reached target sysinit.target. May 17 00:46:07.300660 ignition[913]: Stage: disks May 17 00:46:07.356356 systemd[1]: Reached target basic.target. May 17 00:46:07.300794 ignition[913]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:46:07.366868 systemd[1]: Starting systemd-fsck-root.service... May 17 00:46:07.300819 ignition[913]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 17 00:46:07.304022 ignition[913]: no config dir at "/usr/lib/ignition/base.platform.d/azure" May 17 00:46:07.308215 ignition[913]: disks: disks passed May 17 00:46:07.308281 ignition[913]: Ignition finished successfully May 17 00:46:07.480525 systemd-fsck[921]: ROOT: clean, 619/7326000 files, 481078/7359488 blocks May 17 00:46:07.495162 systemd[1]: Finished systemd-fsck-root.service. May 17 00:46:07.500000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:07.506162 systemd[1]: Mounting sysroot.mount... May 17 00:46:07.530592 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 17 00:46:07.531236 systemd[1]: Mounted sysroot.mount. May 17 00:46:07.536167 systemd[1]: Reached target initrd-root-fs.target. May 17 00:46:07.574286 systemd[1]: Mounting sysroot-usr.mount... May 17 00:46:07.579287 systemd[1]: Starting flatcar-metadata-hostname.service... May 17 00:46:07.587724 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 17 00:46:07.587757 systemd[1]: Reached target ignition-diskful.target. May 17 00:46:07.594069 systemd[1]: Mounted sysroot-usr.mount. May 17 00:46:07.647714 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 17 00:46:07.653448 systemd[1]: Starting initrd-setup-root.service... May 17 00:46:07.681598 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (932) May 17 00:46:07.681828 initrd-setup-root[937]: cut: /sysroot/etc/passwd: No such file or directory May 17 00:46:07.701004 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm May 17 00:46:07.701059 kernel: BTRFS info (device sda6): using free space tree May 17 00:46:07.706595 kernel: BTRFS info (device sda6): has skinny extents May 17 00:46:07.710417 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 17 00:46:07.722537 initrd-setup-root[963]: cut: /sysroot/etc/group: No such file or directory May 17 00:46:07.740302 initrd-setup-root[971]: cut: /sysroot/etc/shadow: No such file or directory May 17 00:46:07.750757 initrd-setup-root[979]: cut: /sysroot/etc/gshadow: No such file or directory May 17 00:46:08.302389 systemd[1]: Finished initrd-setup-root.service. May 17 00:46:08.306000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:08.308110 systemd[1]: Starting ignition-mount.service... May 17 00:46:08.316870 systemd[1]: Starting sysroot-boot.service... May 17 00:46:08.330276 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. May 17 00:46:08.330396 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. May 17 00:46:08.358872 systemd[1]: Finished sysroot-boot.service. May 17 00:46:08.363000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:08.369600 ignition[1001]: INFO : Ignition 2.14.0 May 17 00:46:08.369600 ignition[1001]: INFO : Stage: mount May 17 00:46:08.369600 ignition[1001]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:46:08.369600 ignition[1001]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 17 00:46:08.369600 ignition[1001]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" May 17 00:46:08.380000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:08.414612 ignition[1001]: INFO : mount: mount passed May 17 00:46:08.414612 ignition[1001]: INFO : Ignition finished successfully May 17 00:46:08.374514 systemd[1]: Finished ignition-mount.service. May 17 00:46:08.814948 coreos-metadata[931]: May 17 00:46:08.814 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 May 17 00:46:08.825118 coreos-metadata[931]: May 17 00:46:08.825 INFO Fetch successful May 17 00:46:08.857923 coreos-metadata[931]: May 17 00:46:08.857 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 May 17 00:46:08.871306 coreos-metadata[931]: May 17 00:46:08.871 INFO Fetch successful May 17 00:46:08.886591 coreos-metadata[931]: May 17 00:46:08.886 INFO wrote hostname ci-3510.3.7-n-4234abe502 to /sysroot/etc/hostname May 17 00:46:08.888496 systemd[1]: Finished flatcar-metadata-hostname.service. May 17 00:46:08.901000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:08.903255 systemd[1]: Starting ignition-files.service... May 17 00:46:08.918463 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 17 00:46:08.938591 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (1011) May 17 00:46:08.950683 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm May 17 00:46:08.950731 kernel: BTRFS info (device sda6): using free space tree May 17 00:46:08.955162 kernel: BTRFS info (device sda6): has skinny extents May 17 00:46:08.961289 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 17 00:46:08.975107 ignition[1030]: INFO : Ignition 2.14.0 May 17 00:46:08.975107 ignition[1030]: INFO : Stage: files May 17 00:46:08.986974 ignition[1030]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:46:08.986974 ignition[1030]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 17 00:46:08.986974 ignition[1030]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" May 17 00:46:08.986974 ignition[1030]: DEBUG : files: compiled without relabeling support, skipping May 17 00:46:08.986974 ignition[1030]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 17 00:46:08.986974 ignition[1030]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 17 00:46:09.041577 ignition[1030]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 17 00:46:09.049183 ignition[1030]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 17 00:46:09.062802 unknown[1030]: wrote ssh authorized keys file for user: core May 17 00:46:09.069076 ignition[1030]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 17 00:46:09.069076 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.17.3-linux-arm64.tar.gz" May 17 00:46:09.069076 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.17.3-linux-arm64.tar.gz: attempt #1 May 17 00:46:09.137411 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK May 17 00:46:09.310274 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.17.3-linux-arm64.tar.gz" May 17 00:46:09.321390 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" May 17 00:46:09.321390 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" May 17 00:46:09.321390 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" May 17 00:46:09.321390 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" May 17 00:46:09.321390 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" May 17 00:46:09.321390 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" May 17 00:46:09.321390 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" May 17 00:46:09.321390 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" May 17 00:46:09.321390 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" May 17 00:46:09.420241 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 17 00:46:09.420241 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.33.0-arm64.raw" May 17 00:46:09.420241 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.33.0-arm64.raw" May 17 00:46:09.420241 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/waagent.service" May 17 00:46:09.420241 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition May 17 00:46:09.420241 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1347257518" May 17 00:46:09.420241 ignition[1030]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1347257518": device or resource busy May 17 00:46:09.420241 ignition[1030]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1347257518", trying btrfs: device or resource busy May 17 00:46:09.420241 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1347257518" May 17 00:46:09.420241 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1347257518" May 17 00:46:09.420241 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem1347257518" May 17 00:46:09.420241 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem1347257518" May 17 00:46:09.420241 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" May 17 00:46:09.420241 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" May 17 00:46:09.349475 systemd[1]: mnt-oem1347257518.mount: Deactivated successfully. May 17 00:46:09.587294 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(e): oem config not found in "/usr/share/oem", looking on oem partition May 17 00:46:09.587294 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(f): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1510378704" May 17 00:46:09.587294 ignition[1030]: CRITICAL : files: createFilesystemsFiles: createFiles: op(e): op(f): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1510378704": device or resource busy May 17 00:46:09.587294 ignition[1030]: ERROR : files: createFilesystemsFiles: createFiles: op(e): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1510378704", trying btrfs: device or resource busy May 17 00:46:09.587294 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1510378704" May 17 00:46:09.587294 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1510378704" May 17 00:46:09.587294 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [started] unmounting "/mnt/oem1510378704" May 17 00:46:09.587294 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [finished] unmounting "/mnt/oem1510378704" May 17 00:46:09.587294 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" May 17 00:46:09.587294 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(12): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.33.0-arm64.raw" May 17 00:46:09.587294 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(12): GET https://extensions.flatcar.org/extensions/kubernetes-v1.33.0-arm64.raw: attempt #1 May 17 00:46:10.164177 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(12): GET result: OK May 17 00:46:10.375352 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(12): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.33.0-arm64.raw" May 17 00:46:10.375352 ignition[1030]: INFO : files: op(13): [started] processing unit "waagent.service" May 17 00:46:10.375352 ignition[1030]: INFO : files: op(13): [finished] processing unit "waagent.service" May 17 00:46:10.375352 ignition[1030]: INFO : files: op(14): [started] processing unit "nvidia.service" May 17 00:46:10.375352 ignition[1030]: INFO : files: op(14): [finished] processing unit "nvidia.service" May 17 00:46:10.476939 kernel: kauditd_printk_skb: 7 callbacks suppressed May 17 00:46:10.476970 kernel: audit: type=1130 audit(1747442770.398:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:10.476982 kernel: audit: type=1130 audit(1747442770.453:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:10.398000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:10.453000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:10.390039 systemd[1]: Finished ignition-files.service. May 17 00:46:10.485716 ignition[1030]: INFO : files: op(15): [started] processing unit "prepare-helm.service" May 17 00:46:10.485716 ignition[1030]: INFO : files: op(15): op(16): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 17 00:46:10.485716 ignition[1030]: INFO : files: op(15): op(16): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 17 00:46:10.485716 ignition[1030]: INFO : files: op(15): [finished] processing unit "prepare-helm.service" May 17 00:46:10.485716 ignition[1030]: INFO : files: op(17): [started] setting preset to enabled for "waagent.service" May 17 00:46:10.485716 ignition[1030]: INFO : files: op(17): [finished] setting preset to enabled for "waagent.service" May 17 00:46:10.485716 ignition[1030]: INFO : files: op(18): [started] setting preset to enabled for "nvidia.service" May 17 00:46:10.485716 ignition[1030]: INFO : files: op(18): [finished] setting preset to enabled for "nvidia.service" May 17 00:46:10.485716 ignition[1030]: INFO : files: op(19): [started] setting preset to enabled for "prepare-helm.service" May 17 00:46:10.485716 ignition[1030]: INFO : files: op(19): [finished] setting preset to enabled for "prepare-helm.service" May 17 00:46:10.485716 ignition[1030]: INFO : files: createResultFile: createFiles: op(1a): [started] writing file "/sysroot/etc/.ignition-result.json" May 17 00:46:10.485716 ignition[1030]: INFO : files: createResultFile: createFiles: op(1a): [finished] writing file "/sysroot/etc/.ignition-result.json" May 17 00:46:10.485716 ignition[1030]: INFO : files: files passed May 17 00:46:10.485716 ignition[1030]: INFO : Ignition finished successfully May 17 00:46:10.699075 kernel: audit: type=1130 audit(1747442770.515:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:10.699102 kernel: audit: type=1131 audit(1747442770.544:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:10.699122 kernel: audit: type=1130 audit(1747442770.596:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:10.699132 kernel: audit: type=1131 audit(1747442770.621:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:10.515000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:10.544000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:10.596000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:10.621000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:10.409935 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 17 00:46:10.703000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:10.723358 initrd-setup-root-after-ignition[1053]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 17 00:46:10.734868 kernel: audit: type=1130 audit(1747442770.703:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:10.437417 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 17 00:46:10.438302 systemd[1]: Starting ignition-quench.service... May 17 00:46:10.448389 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 17 00:46:10.454374 systemd[1]: Reached target ignition-complete.target. May 17 00:46:10.765000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:10.482384 systemd[1]: Starting initrd-parse-etc.service... May 17 00:46:10.498460 systemd[1]: ignition-quench.service: Deactivated successfully. May 17 00:46:10.498589 systemd[1]: Finished ignition-quench.service. May 17 00:46:10.841943 kernel: audit: type=1130 audit(1747442770.765:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:10.842005 kernel: audit: type=1131 audit(1747442770.790:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:10.790000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:10.585802 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 17 00:46:10.585919 systemd[1]: Finished initrd-parse-etc.service. May 17 00:46:10.880496 kernel: audit: type=1131 audit(1747442770.857:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:10.857000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:10.621782 systemd[1]: Reached target initrd-fs.target. May 17 00:46:10.651713 systemd[1]: Reached target initrd.target. May 17 00:46:10.663483 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 17 00:46:10.673513 systemd[1]: Starting dracut-pre-pivot.service... May 17 00:46:10.696078 systemd[1]: Finished dracut-pre-pivot.service. May 17 00:46:10.734312 systemd[1]: Starting initrd-cleanup.service... May 17 00:46:10.758887 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 17 00:46:10.758992 systemd[1]: Finished initrd-cleanup.service. May 17 00:46:10.791027 systemd[1]: Stopped target nss-lookup.target. May 17 00:46:10.803828 systemd[1]: Stopped target remote-cryptsetup.target. May 17 00:46:10.833404 systemd[1]: Stopped target timers.target. May 17 00:46:10.846742 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 17 00:46:10.986000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:10.846821 systemd[1]: Stopped dracut-pre-pivot.service. May 17 00:46:10.857756 systemd[1]: Stopped target initrd.target. May 17 00:46:11.004000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:10.880671 systemd[1]: Stopped target basic.target. May 17 00:46:11.013000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:10.889356 systemd[1]: Stopped target ignition-complete.target. May 17 00:46:11.022000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:10.898705 systemd[1]: Stopped target ignition-diskful.target. May 17 00:46:11.033000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:10.911752 systemd[1]: Stopped target initrd-root-device.target. May 17 00:46:11.059000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:10.922318 systemd[1]: Stopped target remote-fs.target. May 17 00:46:11.064659 ignition[1068]: INFO : Ignition 2.14.0 May 17 00:46:11.064659 ignition[1068]: INFO : Stage: umount May 17 00:46:11.064659 ignition[1068]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:46:11.064659 ignition[1068]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 17 00:46:11.064659 ignition[1068]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" May 17 00:46:11.064659 ignition[1068]: INFO : umount: umount passed May 17 00:46:11.064659 ignition[1068]: INFO : Ignition finished successfully May 17 00:46:11.082000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:11.087000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:11.102000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:11.123000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:11.136000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:11.146000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:10.931805 systemd[1]: Stopped target remote-fs-pre.target. May 17 00:46:10.941275 systemd[1]: Stopped target sysinit.target. May 17 00:46:11.162000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:10.952504 systemd[1]: Stopped target local-fs.target. May 17 00:46:10.961166 systemd[1]: Stopped target local-fs-pre.target. May 17 00:46:11.181000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:10.970189 systemd[1]: Stopped target swap.target. May 17 00:46:10.978613 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 17 00:46:10.978688 systemd[1]: Stopped dracut-pre-mount.service. May 17 00:46:10.986773 systemd[1]: Stopped target cryptsetup.target. May 17 00:46:10.996098 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 17 00:46:10.996164 systemd[1]: Stopped dracut-initqueue.service. May 17 00:46:11.004533 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 17 00:46:11.004592 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 17 00:46:11.258000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:11.014072 systemd[1]: ignition-files.service: Deactivated successfully. May 17 00:46:11.014118 systemd[1]: Stopped ignition-files.service. May 17 00:46:11.022793 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. May 17 00:46:11.292000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:11.022835 systemd[1]: Stopped flatcar-metadata-hostname.service. May 17 00:46:11.034260 systemd[1]: Stopping ignition-mount.service... May 17 00:46:11.320000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:11.043094 systemd[1]: Stopping iscsiuio.service... May 17 00:46:11.331000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:11.049862 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 17 00:46:11.341000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:11.049942 systemd[1]: Stopped kmod-static-nodes.service. May 17 00:46:11.061231 systemd[1]: Stopping sysroot-boot.service... May 17 00:46:11.068489 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 17 00:46:11.367000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:11.070814 systemd[1]: Stopped systemd-udev-trigger.service. May 17 00:46:11.378000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:11.082709 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 17 00:46:11.388000 audit: BPF prog-id=6 op=UNLOAD May 17 00:46:11.082773 systemd[1]: Stopped dracut-pre-trigger.service. May 17 00:46:11.405000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:11.088822 systemd[1]: iscsiuio.service: Deactivated successfully. May 17 00:46:11.414000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:11.088920 systemd[1]: Stopped iscsiuio.service. May 17 00:46:11.424000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:11.103331 systemd[1]: ignition-mount.service: Deactivated successfully. May 17 00:46:11.103424 systemd[1]: Stopped ignition-mount.service. May 17 00:46:11.125017 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 17 00:46:11.125440 systemd[1]: ignition-disks.service: Deactivated successfully. May 17 00:46:11.451000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:11.125490 systemd[1]: Stopped ignition-disks.service. May 17 00:46:11.475864 kernel: mlx5_core 7ed6:00:02.0: poll_health:739:(pid 276): device's health compromised - reached miss count May 17 00:46:11.462000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:11.462000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:11.136665 systemd[1]: ignition-kargs.service: Deactivated successfully. May 17 00:46:11.136715 systemd[1]: Stopped ignition-kargs.service. May 17 00:46:11.147088 systemd[1]: ignition-fetch.service: Deactivated successfully. May 17 00:46:11.147130 systemd[1]: Stopped ignition-fetch.service. May 17 00:46:11.163050 systemd[1]: Stopped target network.target. May 17 00:46:11.171914 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 17 00:46:11.511318 kernel: hv_netvsc 000d3afc-db20-000d-3afc-db20000d3afc eth0: Data path switched from VF: enP32470s1 May 17 00:46:11.171971 systemd[1]: Stopped ignition-fetch-offline.service. May 17 00:46:11.181650 systemd[1]: Stopped target paths.target. May 17 00:46:11.190968 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 17 00:46:11.201595 systemd[1]: Stopped systemd-ask-password-console.path. May 17 00:46:11.206957 systemd[1]: Stopped target slices.target. May 17 00:46:11.216017 systemd[1]: Stopped target sockets.target. May 17 00:46:11.227456 systemd[1]: iscsid.socket: Deactivated successfully. May 17 00:46:11.227497 systemd[1]: Closed iscsid.socket. May 17 00:46:11.237743 systemd[1]: iscsiuio.socket: Deactivated successfully. May 17 00:46:11.237790 systemd[1]: Closed iscsiuio.socket. May 17 00:46:11.246556 systemd[1]: ignition-setup.service: Deactivated successfully. May 17 00:46:11.246609 systemd[1]: Stopped ignition-setup.service. May 17 00:46:11.259220 systemd[1]: Stopping systemd-networkd.service... May 17 00:46:11.269615 systemd-networkd[870]: eth0: DHCPv6 lease lost May 17 00:46:11.567000 audit: BPF prog-id=9 op=UNLOAD May 17 00:46:11.270496 systemd[1]: Stopping systemd-resolved.service... May 17 00:46:11.280074 systemd[1]: systemd-networkd.service: Deactivated successfully. May 17 00:46:11.280174 systemd[1]: Stopped systemd-networkd.service. May 17 00:46:11.294619 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 17 00:46:11.294667 systemd[1]: Closed systemd-networkd.socket. May 17 00:46:11.306491 systemd[1]: Stopping network-cleanup.service... May 17 00:46:11.315786 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 17 00:46:11.315855 systemd[1]: Stopped parse-ip-for-networkd.service. May 17 00:46:11.321316 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 17 00:46:11.321396 systemd[1]: Stopped systemd-sysctl.service. May 17 00:46:11.336874 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 17 00:46:11.336962 systemd[1]: Stopped systemd-modules-load.service. May 17 00:46:11.342982 systemd[1]: Stopping systemd-udevd.service... May 17 00:46:11.353725 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 17 00:46:11.354244 systemd[1]: systemd-resolved.service: Deactivated successfully. May 17 00:46:11.354355 systemd[1]: Stopped systemd-resolved.service. May 17 00:46:11.368041 systemd[1]: systemd-udevd.service: Deactivated successfully. May 17 00:46:11.368169 systemd[1]: Stopped systemd-udevd.service. May 17 00:46:11.380073 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 17 00:46:11.380128 systemd[1]: Closed systemd-udevd-control.socket. May 17 00:46:11.671000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:11.389232 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 17 00:46:11.389266 systemd[1]: Closed systemd-udevd-kernel.socket. May 17 00:46:11.394862 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 17 00:46:11.394916 systemd[1]: Stopped dracut-pre-udev.service. May 17 00:46:11.405650 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 17 00:46:11.405696 systemd[1]: Stopped dracut-cmdline.service. May 17 00:46:11.414836 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 17 00:46:11.414880 systemd[1]: Stopped dracut-cmdline-ask.service. May 17 00:46:11.425858 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 17 00:46:11.442798 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 17 00:46:11.442885 systemd[1]: Stopped systemd-vconsole-setup.service. May 17 00:46:11.452453 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 17 00:46:11.452577 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 17 00:46:11.667160 systemd[1]: network-cleanup.service: Deactivated successfully. May 17 00:46:11.667290 systemd[1]: Stopped network-cleanup.service. May 17 00:46:13.684409 systemd[1]: sysroot-boot.service: Deactivated successfully. May 17 00:46:13.688597 systemd[1]: Stopped sysroot-boot.service. May 17 00:46:13.693000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:13.694248 systemd[1]: Reached target initrd-switch-root.target. May 17 00:46:13.702846 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 17 00:46:13.711000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:13.702910 systemd[1]: Stopped initrd-setup-root.service. May 17 00:46:13.712434 systemd[1]: Starting initrd-switch-root.service... May 17 00:46:13.728754 systemd[1]: Switching root. May 17 00:46:13.755215 iscsid[879]: iscsid shutting down. May 17 00:46:13.758866 systemd-journald[276]: Received SIGTERM from PID 1 (systemd). May 17 00:46:13.758914 systemd-journald[276]: Journal stopped May 17 00:46:24.203012 kernel: SELinux: Class mctp_socket not defined in policy. May 17 00:46:24.203034 kernel: SELinux: Class anon_inode not defined in policy. May 17 00:46:24.203044 kernel: SELinux: the above unknown classes and permissions will be allowed May 17 00:46:24.203054 kernel: SELinux: policy capability network_peer_controls=1 May 17 00:46:24.203062 kernel: SELinux: policy capability open_perms=1 May 17 00:46:24.203070 kernel: SELinux: policy capability extended_socket_class=1 May 17 00:46:24.203079 kernel: SELinux: policy capability always_check_network=0 May 17 00:46:24.203087 kernel: SELinux: policy capability cgroup_seclabel=1 May 17 00:46:24.203095 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 17 00:46:24.203103 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 17 00:46:24.203111 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 17 00:46:24.203120 kernel: kauditd_printk_skb: 32 callbacks suppressed May 17 00:46:24.203129 kernel: audit: type=1403 audit(1747442775.945:80): auid=4294967295 ses=4294967295 lsm=selinux res=1 May 17 00:46:24.203139 systemd[1]: Successfully loaded SELinux policy in 266.102ms. May 17 00:46:24.203150 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 26.776ms. May 17 00:46:24.203162 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 17 00:46:24.203171 systemd[1]: Detected virtualization microsoft. May 17 00:46:24.203180 systemd[1]: Detected architecture arm64. May 17 00:46:24.203189 systemd[1]: Detected first boot. May 17 00:46:24.203199 systemd[1]: Hostname set to . May 17 00:46:24.203209 systemd[1]: Initializing machine ID from random generator. May 17 00:46:24.203218 kernel: audit: type=1400 audit(1747442776.622:81): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 17 00:46:24.203229 kernel: audit: type=1400 audit(1747442776.622:82): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 17 00:46:24.203238 kernel: audit: type=1334 audit(1747442776.645:83): prog-id=10 op=LOAD May 17 00:46:24.203247 kernel: audit: type=1334 audit(1747442776.645:84): prog-id=10 op=UNLOAD May 17 00:46:24.203255 kernel: audit: type=1334 audit(1747442776.664:85): prog-id=11 op=LOAD May 17 00:46:24.203263 kernel: audit: type=1334 audit(1747442776.664:86): prog-id=11 op=UNLOAD May 17 00:46:24.203272 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 17 00:46:24.203281 kernel: audit: type=1400 audit(1747442777.814:87): avc: denied { associate } for pid=1101 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 17 00:46:24.203292 kernel: audit: type=1300 audit(1747442777.814:87): arch=c00000b7 syscall=5 success=yes exit=0 a0=40000222fc a1=40000283d8 a2=4000026840 a3=32 items=0 ppid=1084 pid=1101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:46:24.203302 kernel: audit: type=1327 audit(1747442777.814:87): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 17 00:46:24.203312 systemd[1]: Populated /etc with preset unit settings. May 17 00:46:24.203322 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:46:24.203331 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:46:24.203342 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:46:24.203352 kernel: kauditd_printk_skb: 6 callbacks suppressed May 17 00:46:24.203361 kernel: audit: type=1334 audit(1747442783.426:89): prog-id=12 op=LOAD May 17 00:46:24.203369 kernel: audit: type=1334 audit(1747442783.426:90): prog-id=3 op=UNLOAD May 17 00:46:24.203378 systemd[1]: iscsid.service: Deactivated successfully. May 17 00:46:24.203387 kernel: audit: type=1334 audit(1747442783.433:91): prog-id=13 op=LOAD May 17 00:46:24.203399 systemd[1]: Stopped iscsid.service. May 17 00:46:24.203408 kernel: audit: type=1334 audit(1747442783.439:92): prog-id=14 op=LOAD May 17 00:46:24.203418 kernel: audit: type=1334 audit(1747442783.439:93): prog-id=4 op=UNLOAD May 17 00:46:24.203428 kernel: audit: type=1334 audit(1747442783.439:94): prog-id=5 op=UNLOAD May 17 00:46:24.203437 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 17 00:46:24.203447 kernel: audit: type=1131 audit(1747442783.440:95): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:24.203457 systemd[1]: Stopped initrd-switch-root.service. May 17 00:46:24.203466 kernel: audit: type=1334 audit(1747442783.473:96): prog-id=12 op=UNLOAD May 17 00:46:24.203476 kernel: audit: type=1131 audit(1747442783.483:97): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:24.203485 kernel: audit: type=1130 audit(1747442783.543:98): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:24.203496 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 17 00:46:24.203506 systemd[1]: Created slice system-addon\x2dconfig.slice. May 17 00:46:24.203515 systemd[1]: Created slice system-addon\x2drun.slice. May 17 00:46:24.203525 systemd[1]: Created slice system-getty.slice. May 17 00:46:24.203536 systemd[1]: Created slice system-modprobe.slice. May 17 00:46:24.203545 systemd[1]: Created slice system-serial\x2dgetty.slice. May 17 00:46:24.203555 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 17 00:46:24.203565 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 17 00:46:24.203584 systemd[1]: Created slice user.slice. May 17 00:46:24.203595 systemd[1]: Started systemd-ask-password-console.path. May 17 00:46:24.203605 systemd[1]: Started systemd-ask-password-wall.path. May 17 00:46:24.203614 systemd[1]: Set up automount boot.automount. May 17 00:46:24.203623 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 17 00:46:24.203634 systemd[1]: Stopped target initrd-switch-root.target. May 17 00:46:24.203643 systemd[1]: Stopped target initrd-fs.target. May 17 00:46:24.203652 systemd[1]: Stopped target initrd-root-fs.target. May 17 00:46:24.203662 systemd[1]: Reached target integritysetup.target. May 17 00:46:24.203672 systemd[1]: Reached target remote-cryptsetup.target. May 17 00:46:24.203681 systemd[1]: Reached target remote-fs.target. May 17 00:46:24.203691 systemd[1]: Reached target slices.target. May 17 00:46:24.203700 systemd[1]: Reached target swap.target. May 17 00:46:24.203710 systemd[1]: Reached target torcx.target. May 17 00:46:24.203720 systemd[1]: Reached target veritysetup.target. May 17 00:46:24.203729 systemd[1]: Listening on systemd-coredump.socket. May 17 00:46:24.203741 systemd[1]: Listening on systemd-initctl.socket. May 17 00:46:24.203750 systemd[1]: Listening on systemd-networkd.socket. May 17 00:46:24.203760 systemd[1]: Listening on systemd-udevd-control.socket. May 17 00:46:24.203771 systemd[1]: Listening on systemd-udevd-kernel.socket. May 17 00:46:24.203780 systemd[1]: Listening on systemd-userdbd.socket. May 17 00:46:24.203790 systemd[1]: Mounting dev-hugepages.mount... May 17 00:46:24.203801 systemd[1]: Mounting dev-mqueue.mount... May 17 00:46:24.203810 systemd[1]: Mounting media.mount... May 17 00:46:24.203820 systemd[1]: Mounting sys-kernel-debug.mount... May 17 00:46:24.203829 systemd[1]: Mounting sys-kernel-tracing.mount... May 17 00:46:24.203838 systemd[1]: Mounting tmp.mount... May 17 00:46:24.203848 systemd[1]: Starting flatcar-tmpfiles.service... May 17 00:46:24.203857 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:46:24.203867 systemd[1]: Starting kmod-static-nodes.service... May 17 00:46:24.203877 systemd[1]: Starting modprobe@configfs.service... May 17 00:46:24.203887 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:46:24.203897 systemd[1]: Starting modprobe@drm.service... May 17 00:46:24.203906 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:46:24.203915 systemd[1]: Starting modprobe@fuse.service... May 17 00:46:24.203925 systemd[1]: Starting modprobe@loop.service... May 17 00:46:24.203934 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 17 00:46:24.203944 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 17 00:46:24.203954 systemd[1]: Stopped systemd-fsck-root.service. May 17 00:46:24.203963 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 17 00:46:24.203975 systemd[1]: Stopped systemd-fsck-usr.service. May 17 00:46:24.203984 systemd[1]: Stopped systemd-journald.service. May 17 00:46:24.203994 systemd[1]: systemd-journald.service: Consumed 3.455s CPU time. May 17 00:46:24.204003 systemd[1]: Starting systemd-journald.service... May 17 00:46:24.204012 kernel: loop: module loaded May 17 00:46:24.204021 kernel: fuse: init (API version 7.34) May 17 00:46:24.204030 systemd[1]: Starting systemd-modules-load.service... May 17 00:46:24.204039 systemd[1]: Starting systemd-network-generator.service... May 17 00:46:24.204049 systemd[1]: Starting systemd-remount-fs.service... May 17 00:46:24.204060 systemd[1]: Starting systemd-udev-trigger.service... May 17 00:46:24.204069 systemd[1]: verity-setup.service: Deactivated successfully. May 17 00:46:24.204078 systemd[1]: Stopped verity-setup.service. May 17 00:46:24.204088 systemd[1]: Mounted dev-hugepages.mount. May 17 00:46:24.204097 systemd[1]: Mounted dev-mqueue.mount. May 17 00:46:24.204110 systemd-journald[1208]: Journal started May 17 00:46:24.204149 systemd-journald[1208]: Runtime Journal (/run/log/journal/19604390bb564a78b39ce97bdb210dd2) is 8.0M, max 78.5M, 70.5M free. May 17 00:46:15.945000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 17 00:46:16.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 17 00:46:16.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 17 00:46:16.645000 audit: BPF prog-id=10 op=LOAD May 17 00:46:16.645000 audit: BPF prog-id=10 op=UNLOAD May 17 00:46:16.664000 audit: BPF prog-id=11 op=LOAD May 17 00:46:16.664000 audit: BPF prog-id=11 op=UNLOAD May 17 00:46:17.814000 audit[1101]: AVC avc: denied { associate } for pid=1101 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 17 00:46:17.814000 audit[1101]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=40000222fc a1=40000283d8 a2=4000026840 a3=32 items=0 ppid=1084 pid=1101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:46:17.814000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 17 00:46:17.823000 audit[1101]: AVC avc: denied { associate } for pid=1101 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 17 00:46:17.823000 audit[1101]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=40000223d5 a2=1ed a3=0 items=2 ppid=1084 pid=1101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:46:17.823000 audit: CWD cwd="/" May 17 00:46:17.823000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:46:17.823000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:46:17.823000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 17 00:46:23.426000 audit: BPF prog-id=12 op=LOAD May 17 00:46:23.426000 audit: BPF prog-id=3 op=UNLOAD May 17 00:46:23.433000 audit: BPF prog-id=13 op=LOAD May 17 00:46:23.439000 audit: BPF prog-id=14 op=LOAD May 17 00:46:23.439000 audit: BPF prog-id=4 op=UNLOAD May 17 00:46:23.439000 audit: BPF prog-id=5 op=UNLOAD May 17 00:46:23.440000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:23.473000 audit: BPF prog-id=12 op=UNLOAD May 17 00:46:23.483000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:23.543000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:23.543000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:24.060000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:24.077000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:24.087000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:24.087000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:24.094000 audit: BPF prog-id=15 op=LOAD May 17 00:46:24.095000 audit: BPF prog-id=16 op=LOAD May 17 00:46:24.095000 audit: BPF prog-id=17 op=LOAD May 17 00:46:24.095000 audit: BPF prog-id=13 op=UNLOAD May 17 00:46:24.095000 audit: BPF prog-id=14 op=UNLOAD May 17 00:46:24.189000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:24.200000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 17 00:46:24.200000 audit[1208]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=6 a1=ffffe522e250 a2=4000 a3=1 items=0 ppid=1 pid=1208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:46:24.200000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 17 00:46:17.767873 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2025-05-17T00:46:17Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:46:23.425361 systemd[1]: Queued start job for default target multi-user.target. May 17 00:46:17.768153 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2025-05-17T00:46:17Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 17 00:46:23.425375 systemd[1]: Unnecessary job was removed for dev-sda6.device. May 17 00:46:17.768171 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2025-05-17T00:46:17Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 17 00:46:23.440889 systemd[1]: systemd-journald.service: Deactivated successfully. May 17 00:46:17.768205 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2025-05-17T00:46:17Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 17 00:46:23.441241 systemd[1]: systemd-journald.service: Consumed 3.455s CPU time. May 17 00:46:17.768215 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2025-05-17T00:46:17Z" level=debug msg="skipped missing lower profile" missing profile=oem May 17 00:46:17.768243 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2025-05-17T00:46:17Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 17 00:46:17.768255 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2025-05-17T00:46:17Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 17 00:46:17.768444 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2025-05-17T00:46:17Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 17 00:46:17.768475 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2025-05-17T00:46:17Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 17 00:46:17.768486 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2025-05-17T00:46:17Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 17 00:46:17.800016 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2025-05-17T00:46:17Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 17 00:46:17.800055 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2025-05-17T00:46:17Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 17 00:46:17.800076 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2025-05-17T00:46:17Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 17 00:46:17.800091 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2025-05-17T00:46:17Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 17 00:46:17.800111 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2025-05-17T00:46:17Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 17 00:46:17.800123 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2025-05-17T00:46:17Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 17 00:46:22.478878 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2025-05-17T00:46:22Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:46:22.479177 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2025-05-17T00:46:22Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:46:22.479285 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2025-05-17T00:46:22Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:46:22.479480 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2025-05-17T00:46:22Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:46:22.479532 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2025-05-17T00:46:22Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 17 00:46:22.479608 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2025-05-17T00:46:22Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 17 00:46:24.219733 systemd[1]: Started systemd-journald.service. May 17 00:46:24.219000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:24.220497 systemd[1]: Mounted media.mount. May 17 00:46:24.224468 systemd[1]: Mounted sys-kernel-debug.mount. May 17 00:46:24.229010 systemd[1]: Mounted sys-kernel-tracing.mount. May 17 00:46:24.233708 systemd[1]: Mounted tmp.mount. May 17 00:46:24.238688 systemd[1]: Finished flatcar-tmpfiles.service. May 17 00:46:24.243000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:24.244224 systemd[1]: Finished kmod-static-nodes.service. May 17 00:46:24.248000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:24.249235 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 17 00:46:24.249362 systemd[1]: Finished modprobe@configfs.service. May 17 00:46:24.253000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:24.253000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:24.254397 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:46:24.254525 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:46:24.259000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:24.259000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:24.260061 systemd[1]: modprobe@drm.service: Deactivated successfully. May 17 00:46:24.260188 systemd[1]: Finished modprobe@drm.service. May 17 00:46:24.264000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:24.264000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:24.264834 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:46:24.264960 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:46:24.269000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:24.269000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:24.270209 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 17 00:46:24.270337 systemd[1]: Finished modprobe@fuse.service. May 17 00:46:24.274000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:24.274000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:24.275390 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:46:24.275510 systemd[1]: Finished modprobe@loop.service. May 17 00:46:24.279000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:24.279000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:24.280285 systemd[1]: Finished systemd-modules-load.service. May 17 00:46:24.285000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:24.286519 systemd[1]: Finished systemd-network-generator.service. May 17 00:46:24.291000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:24.292444 systemd[1]: Finished systemd-remount-fs.service. May 17 00:46:24.297000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:24.298042 systemd[1]: Reached target network-pre.target. May 17 00:46:24.304784 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 17 00:46:24.310541 systemd[1]: Mounting sys-kernel-config.mount... May 17 00:46:24.315338 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 17 00:46:24.363112 systemd[1]: Starting systemd-hwdb-update.service... May 17 00:46:24.368977 systemd[1]: Starting systemd-journal-flush.service... May 17 00:46:24.373506 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:46:24.374767 systemd[1]: Starting systemd-random-seed.service... May 17 00:46:24.379352 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:46:24.380653 systemd[1]: Starting systemd-sysctl.service... May 17 00:46:24.388115 systemd[1]: Starting systemd-sysusers.service... May 17 00:46:24.394700 systemd[1]: Finished systemd-udev-trigger.service. May 17 00:46:24.399000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:24.400545 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 17 00:46:24.405766 systemd[1]: Mounted sys-kernel-config.mount. May 17 00:46:24.411597 systemd[1]: Starting systemd-udev-settle.service... May 17 00:46:24.421590 udevadm[1222]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. May 17 00:46:24.428926 systemd-journald[1208]: Time spent on flushing to /var/log/journal/19604390bb564a78b39ce97bdb210dd2 is 13.675ms for 1093 entries. May 17 00:46:24.428926 systemd-journald[1208]: System Journal (/var/log/journal/19604390bb564a78b39ce97bdb210dd2) is 8.0M, max 2.6G, 2.6G free. May 17 00:46:24.525776 systemd-journald[1208]: Received client request to flush runtime journal. May 17 00:46:24.449000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:24.480000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:24.531000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:24.444924 systemd[1]: Finished systemd-random-seed.service. May 17 00:46:24.449983 systemd[1]: Reached target first-boot-complete.target. May 17 00:46:24.475699 systemd[1]: Finished systemd-sysctl.service. May 17 00:46:24.526839 systemd[1]: Finished systemd-journal-flush.service. May 17 00:46:24.914724 systemd[1]: Finished systemd-sysusers.service. May 17 00:46:24.919000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:25.498551 systemd[1]: Finished systemd-hwdb-update.service. May 17 00:46:25.503000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:25.504000 audit: BPF prog-id=18 op=LOAD May 17 00:46:25.504000 audit: BPF prog-id=19 op=LOAD May 17 00:46:25.504000 audit: BPF prog-id=7 op=UNLOAD May 17 00:46:25.504000 audit: BPF prog-id=8 op=UNLOAD May 17 00:46:25.505606 systemd[1]: Starting systemd-udevd.service... May 17 00:46:25.524675 systemd-udevd[1225]: Using default interface naming scheme 'v252'. May 17 00:46:25.775440 systemd[1]: Started systemd-udevd.service. May 17 00:46:25.785000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:25.787000 audit: BPF prog-id=20 op=LOAD May 17 00:46:25.788561 systemd[1]: Starting systemd-networkd.service... May 17 00:46:25.814297 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. May 17 00:46:25.859608 systemd[1]: Starting systemd-userdbd.service... May 17 00:46:25.858000 audit: BPF prog-id=21 op=LOAD May 17 00:46:25.858000 audit: BPF prog-id=22 op=LOAD May 17 00:46:25.858000 audit: BPF prog-id=23 op=LOAD May 17 00:46:25.893603 kernel: mousedev: PS/2 mouse device common for all mice May 17 00:46:25.900637 kernel: hv_vmbus: registering driver hyperv_fb May 17 00:46:25.900745 kernel: hyperv_fb: Synthvid Version major 3, minor 5 May 17 00:46:25.912243 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 May 17 00:46:25.908000 audit[1227]: AVC avc: denied { confidentiality } for pid=1227 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 17 00:46:25.923082 kernel: hv_vmbus: registering driver hv_balloon May 17 00:46:25.923220 kernel: Console: switching to colour dummy device 80x25 May 17 00:46:25.925599 kernel: Console: switching to colour frame buffer device 128x48 May 17 00:46:25.930818 systemd[1]: Started systemd-userdbd.service. May 17 00:46:25.936000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:25.950678 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 May 17 00:46:25.950773 kernel: hv_balloon: Memory hot add disabled on ARM64 May 17 00:46:25.908000 audit[1227]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaafe383910 a1=aa2c a2=ffffbb8324b0 a3=aaaafe2e4010 items=12 ppid=1225 pid=1227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:46:25.908000 audit: CWD cwd="/" May 17 00:46:25.908000 audit: PATH item=0 name=(null) inode=5822 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:46:25.908000 audit: PATH item=1 name=(null) inode=10178 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:46:25.908000 audit: PATH item=2 name=(null) inode=10178 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:46:25.908000 audit: PATH item=3 name=(null) inode=10179 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:46:25.908000 audit: PATH item=4 name=(null) inode=10178 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:46:25.908000 audit: PATH item=5 name=(null) inode=10180 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:46:25.908000 audit: PATH item=6 name=(null) inode=10178 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:46:25.908000 audit: PATH item=7 name=(null) inode=10181 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:46:25.908000 audit: PATH item=8 name=(null) inode=10178 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:46:25.908000 audit: PATH item=9 name=(null) inode=10182 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:46:25.908000 audit: PATH item=10 name=(null) inode=10178 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:46:25.908000 audit: PATH item=11 name=(null) inode=10183 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:46:25.908000 audit: PROCTITLE proctitle="(udev-worker)" May 17 00:46:25.980300 kernel: hv_utils: Registering HyperV Utility Driver May 17 00:46:25.980616 kernel: hv_vmbus: registering driver hv_utils May 17 00:46:25.991094 kernel: hv_utils: Heartbeat IC version 3.0 May 17 00:46:25.991206 kernel: hv_utils: Shutdown IC version 3.2 May 17 00:46:25.991244 kernel: hv_utils: TimeSync IC version 4.0 May 17 00:46:26.423602 systemd-networkd[1246]: lo: Link UP May 17 00:46:26.423614 systemd-networkd[1246]: lo: Gained carrier May 17 00:46:26.424042 systemd-networkd[1246]: Enumeration completed May 17 00:46:26.428000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:26.424163 systemd[1]: Started systemd-networkd.service. May 17 00:46:26.431175 systemd[1]: Starting systemd-networkd-wait-online.service... May 17 00:46:26.450824 systemd-networkd[1246]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 17 00:46:26.474447 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 17 00:46:26.484685 systemd[1]: Finished systemd-udev-settle.service. May 17 00:46:26.488000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:26.491308 systemd[1]: Starting lvm2-activation-early.service... May 17 00:46:26.512260 kernel: mlx5_core 7ed6:00:02.0 enP32470s1: Link up May 17 00:46:26.558262 kernel: hv_netvsc 000d3afc-db20-000d-3afc-db20000d3afc eth0: Data path switched to VF: enP32470s1 May 17 00:46:26.560176 systemd-networkd[1246]: enP32470s1: Link UP May 17 00:46:26.560504 systemd-networkd[1246]: eth0: Link UP May 17 00:46:26.560516 systemd-networkd[1246]: eth0: Gained carrier May 17 00:46:26.564892 systemd-networkd[1246]: enP32470s1: Gained carrier May 17 00:46:26.583376 systemd-networkd[1246]: eth0: DHCPv4 address 10.200.20.34/24, gateway 10.200.20.1 acquired from 168.63.129.16 May 17 00:46:26.744796 lvm[1303]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 17 00:46:26.768193 systemd[1]: Finished lvm2-activation-early.service. May 17 00:46:26.772000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:26.773712 systemd[1]: Reached target cryptsetup.target. May 17 00:46:26.779671 systemd[1]: Starting lvm2-activation.service... May 17 00:46:26.784200 lvm[1304]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 17 00:46:26.810152 systemd[1]: Finished lvm2-activation.service. May 17 00:46:26.814000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:26.815642 systemd[1]: Reached target local-fs-pre.target. May 17 00:46:26.820693 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 17 00:46:26.820723 systemd[1]: Reached target local-fs.target. May 17 00:46:26.825041 systemd[1]: Reached target machines.target. May 17 00:46:26.830700 systemd[1]: Starting ldconfig.service... May 17 00:46:26.835025 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:46:26.835092 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:46:26.836411 systemd[1]: Starting systemd-boot-update.service... May 17 00:46:26.841784 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 17 00:46:26.848796 systemd[1]: Starting systemd-machine-id-commit.service... May 17 00:46:26.855710 systemd[1]: Starting systemd-sysext.service... May 17 00:46:26.894912 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1306 (bootctl) May 17 00:46:26.896398 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 17 00:46:26.922355 systemd[1]: Unmounting usr-share-oem.mount... May 17 00:46:27.145371 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 17 00:46:27.151000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:27.233035 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 17 00:46:27.233259 systemd[1]: Unmounted usr-share-oem.mount. May 17 00:46:27.930269 kernel: loop0: detected capacity change from 0 to 211168 May 17 00:46:28.317356 systemd-networkd[1246]: eth0: Gained IPv6LL May 17 00:46:28.324252 systemd[1]: Finished systemd-networkd-wait-online.service. May 17 00:46:28.329000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:29.027169 systemd-fsck[1314]: fsck.fat 4.2 (2021-01-31) May 17 00:46:29.027169 systemd-fsck[1314]: /dev/sda1: 236 files, 117182/258078 clusters May 17 00:46:29.069336 kernel: kauditd_printk_skb: 70 callbacks suppressed May 17 00:46:29.069399 kernel: audit: type=1130 audit(1747442789.035:152): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:29.069426 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 17 00:46:29.035000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:29.029157 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 17 00:46:29.068708 systemd[1]: Mounting boot.mount... May 17 00:46:29.093264 kernel: loop1: detected capacity change from 0 to 211168 May 17 00:46:29.096964 (sd-sysext)[1323]: Using extensions 'kubernetes'. May 17 00:46:29.097309 (sd-sysext)[1323]: Merged extensions into '/usr'. May 17 00:46:29.114498 systemd[1]: Mounting usr-share-oem.mount... May 17 00:46:29.122669 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:46:29.124125 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:46:29.131311 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:46:29.137051 systemd[1]: Starting modprobe@loop.service... May 17 00:46:29.142927 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:46:29.143081 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:46:29.145461 systemd[1]: Mounted usr-share-oem.mount. May 17 00:46:29.150779 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:46:29.150915 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:46:29.154000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:29.157905 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:46:29.158030 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:46:29.154000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:29.198685 kernel: audit: type=1130 audit(1747442789.154:153): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:29.198745 kernel: audit: type=1131 audit(1747442789.154:154): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:29.198000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:29.199856 systemd[1]: Mounted boot.mount. May 17 00:46:29.198000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:29.242435 kernel: audit: type=1130 audit(1747442789.198:155): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:29.242506 kernel: audit: type=1131 audit(1747442789.198:156): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:29.245438 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:46:29.246089 systemd[1]: Finished modprobe@loop.service. May 17 00:46:29.251000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:29.253125 systemd[1]: Finished systemd-boot-update.service. May 17 00:46:29.251000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:29.296055 kernel: audit: type=1130 audit(1747442789.251:157): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:29.296228 kernel: audit: type=1131 audit(1747442789.251:158): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:29.295000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:29.298628 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:46:29.298893 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:46:29.317055 systemd[1]: Finished systemd-sysext.service. May 17 00:46:29.317260 kernel: audit: type=1130 audit(1747442789.295:159): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:29.321000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:29.324086 systemd[1]: Starting ensure-sysext.service... May 17 00:46:29.346832 kernel: audit: type=1130 audit(1747442789.321:160): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:29.348733 systemd[1]: Starting systemd-tmpfiles-setup.service... May 17 00:46:29.357774 systemd[1]: Reloading. May 17 00:46:29.416365 /usr/lib/systemd/system-generators/torcx-generator[1350]: time="2025-05-17T00:46:29Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:46:29.416390 /usr/lib/systemd/system-generators/torcx-generator[1350]: time="2025-05-17T00:46:29Z" level=info msg="torcx already run" May 17 00:46:29.489359 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:46:30.005637 kernel: audit: type=1334 audit(1747442789.569:161): prog-id=24 op=LOAD May 17 00:46:29.569000 audit: BPF prog-id=24 op=LOAD May 17 00:46:29.569000 audit: BPF prog-id=15 op=UNLOAD May 17 00:46:29.575000 audit: BPF prog-id=25 op=LOAD May 17 00:46:29.575000 audit: BPF prog-id=26 op=LOAD May 17 00:46:29.575000 audit: BPF prog-id=16 op=UNLOAD May 17 00:46:29.575000 audit: BPF prog-id=17 op=UNLOAD May 17 00:46:29.577000 audit: BPF prog-id=27 op=LOAD May 17 00:46:29.577000 audit: BPF prog-id=21 op=UNLOAD May 17 00:46:29.577000 audit: BPF prog-id=28 op=LOAD May 17 00:46:29.577000 audit: BPF prog-id=29 op=LOAD May 17 00:46:29.577000 audit: BPF prog-id=22 op=UNLOAD May 17 00:46:29.577000 audit: BPF prog-id=23 op=UNLOAD May 17 00:46:29.577000 audit: BPF prog-id=30 op=LOAD May 17 00:46:29.577000 audit: BPF prog-id=31 op=LOAD May 17 00:46:29.577000 audit: BPF prog-id=18 op=UNLOAD May 17 00:46:29.577000 audit: BPF prog-id=19 op=UNLOAD May 17 00:46:29.578000 audit: BPF prog-id=32 op=LOAD May 17 00:46:29.578000 audit: BPF prog-id=20 op=UNLOAD May 17 00:46:29.619000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:29.619000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:29.625000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:29.625000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:29.630000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:29.630000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:29.655000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:29.655000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:29.660000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:29.660000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:29.666000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:29.666000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:29.698000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:29.698000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:29.704000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:29.704000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:29.709000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:29.709000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:29.714000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:29.714000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:29.721000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:29.489474 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:46:29.504985 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:46:29.595999 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:46:29.597385 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:46:29.603137 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:46:29.609397 systemd[1]: Starting modprobe@loop.service... May 17 00:46:29.613631 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:46:29.613774 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:46:29.614567 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:46:29.614724 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:46:29.620368 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:46:29.620494 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:46:29.626768 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:46:29.626893 systemd[1]: Finished modprobe@loop.service. May 17 00:46:29.632085 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:46:29.632179 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:46:29.633754 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:46:29.635113 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:46:29.640541 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:46:29.646347 systemd[1]: Starting modprobe@loop.service... May 17 00:46:29.650413 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:46:29.650548 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:46:29.651325 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:46:29.651477 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:46:29.656689 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:46:29.656807 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:46:29.662513 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:46:29.662630 systemd[1]: Finished modprobe@loop.service. May 17 00:46:29.667903 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:46:29.667996 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:46:29.670307 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:46:29.672300 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:46:29.678013 systemd[1]: Starting modprobe@drm.service... May 17 00:46:29.683466 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:46:29.689351 systemd[1]: Starting modprobe@loop.service... May 17 00:46:29.693600 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:46:29.693735 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:46:29.694644 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:46:29.694797 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:46:29.700099 systemd[1]: modprobe@drm.service: Deactivated successfully. May 17 00:46:29.700228 systemd[1]: Finished modprobe@drm.service. May 17 00:46:29.705401 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:46:29.705522 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:46:29.711003 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:46:29.711118 systemd[1]: Finished modprobe@loop.service. May 17 00:46:29.716349 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:46:29.716422 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:46:29.717523 systemd[1]: Finished ensure-sysext.service. May 17 00:46:31.029130 systemd-tmpfiles[1330]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 17 00:46:31.771859 systemd-tmpfiles[1330]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 17 00:46:32.182787 systemd-tmpfiles[1330]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 17 00:46:33.470273 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 17 00:46:33.471151 systemd[1]: Finished systemd-machine-id-commit.service. May 17 00:46:33.476000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:33.944274 systemd[1]: Finished systemd-tmpfiles-setup.service. May 17 00:46:33.948000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:33.951126 systemd[1]: Starting audit-rules.service... May 17 00:46:33.956945 systemd[1]: Starting clean-ca-certificates.service... May 17 00:46:33.962938 systemd[1]: Starting systemd-journal-catalog-update.service... May 17 00:46:33.968000 audit: BPF prog-id=33 op=LOAD May 17 00:46:33.970830 systemd[1]: Starting systemd-resolved.service... May 17 00:46:33.974000 audit: BPF prog-id=34 op=LOAD May 17 00:46:33.977105 systemd[1]: Starting systemd-timesyncd.service... May 17 00:46:33.982995 systemd[1]: Starting systemd-update-utmp.service... May 17 00:46:34.129000 audit[1426]: SYSTEM_BOOT pid=1426 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 17 00:46:34.134299 systemd[1]: Finished clean-ca-certificates.service. May 17 00:46:34.136156 kernel: kauditd_printk_skb: 42 callbacks suppressed May 17 00:46:34.136280 kernel: audit: type=1127 audit(1747442794.129:204): pid=1426 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 17 00:46:34.162060 kernel: audit: type=1130 audit(1747442794.160:205): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:34.160000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:34.161998 systemd[1]: Started systemd-timesyncd.service. May 17 00:46:34.185000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:34.187254 systemd[1]: Reached target time-set.target. May 17 00:46:34.207248 kernel: audit: type=1130 audit(1747442794.185:206): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:34.211626 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 17 00:46:34.211957 systemd[1]: Finished systemd-update-utmp.service. May 17 00:46:34.216000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:34.238263 kernel: audit: type=1130 audit(1747442794.216:207): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:34.332212 systemd-resolved[1423]: Positive Trust Anchors: May 17 00:46:34.332226 systemd-resolved[1423]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 17 00:46:34.332263 systemd-resolved[1423]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 17 00:46:34.489182 systemd[1]: Finished systemd-journal-catalog-update.service. May 17 00:46:34.493000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:34.516258 kernel: audit: type=1130 audit(1747442794.493:208): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:34.537328 systemd-resolved[1423]: Using system hostname 'ci-3510.3.7-n-4234abe502'. May 17 00:46:34.538977 systemd[1]: Started systemd-resolved.service. May 17 00:46:34.543000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:34.544171 systemd[1]: Reached target network.target. May 17 00:46:34.567974 kernel: audit: type=1130 audit(1747442794.543:209): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:46:34.568506 systemd[1]: Reached target network-online.target. May 17 00:46:34.573919 systemd[1]: Reached target nss-lookup.target. May 17 00:46:34.981729 augenrules[1441]: No rules May 17 00:46:34.980000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 17 00:46:34.988021 systemd[1]: Finished audit-rules.service. May 17 00:46:34.980000 audit[1441]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffe6366e00 a2=420 a3=0 items=0 ppid=1420 pid=1441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:46:35.027867 kernel: audit: type=1305 audit(1747442794.980:210): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 17 00:46:35.027956 kernel: audit: type=1300 audit(1747442794.980:210): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffe6366e00 a2=420 a3=0 items=0 ppid=1420 pid=1441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:46:35.027985 kernel: audit: type=1327 audit(1747442794.980:210): proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 17 00:46:34.980000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 17 00:46:40.470625 ldconfig[1305]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 17 00:46:40.483777 systemd[1]: Finished ldconfig.service. May 17 00:46:40.490507 systemd[1]: Starting systemd-update-done.service... May 17 00:46:40.516404 systemd[1]: Finished systemd-update-done.service. May 17 00:46:40.522446 systemd[1]: Reached target sysinit.target. May 17 00:46:40.527390 systemd[1]: Started motdgen.path. May 17 00:46:40.531385 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 17 00:46:40.538045 systemd[1]: Started logrotate.timer. May 17 00:46:40.543358 systemd[1]: Started mdadm.timer. May 17 00:46:40.548112 systemd[1]: Started systemd-tmpfiles-clean.timer. May 17 00:46:40.554014 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 17 00:46:40.554048 systemd[1]: Reached target paths.target. May 17 00:46:40.558666 systemd[1]: Reached target timers.target. May 17 00:46:40.563802 systemd[1]: Listening on dbus.socket. May 17 00:46:40.569377 systemd[1]: Starting docker.socket... May 17 00:46:40.590578 systemd[1]: Listening on sshd.socket. May 17 00:46:40.595088 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:46:40.595663 systemd[1]: Listening on docker.socket. May 17 00:46:40.600364 systemd[1]: Reached target sockets.target. May 17 00:46:40.605275 systemd[1]: Reached target basic.target. May 17 00:46:40.609714 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 17 00:46:40.609747 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 17 00:46:40.610926 systemd[1]: Starting containerd.service... May 17 00:46:40.616076 systemd[1]: Starting dbus.service... May 17 00:46:40.620815 systemd[1]: Starting enable-oem-cloudinit.service... May 17 00:46:40.626604 systemd[1]: Starting extend-filesystems.service... May 17 00:46:40.633483 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 17 00:46:40.634949 systemd[1]: Starting kubelet.service... May 17 00:46:40.640315 systemd[1]: Starting motdgen.service... May 17 00:46:40.645153 systemd[1]: Started nvidia.service. May 17 00:46:40.650905 systemd[1]: Starting prepare-helm.service... May 17 00:46:40.656195 systemd[1]: Starting ssh-key-proc-cmdline.service... May 17 00:46:40.662432 systemd[1]: Starting sshd-keygen.service... May 17 00:46:40.670441 systemd[1]: Starting systemd-logind.service... May 17 00:46:40.677942 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:46:40.678015 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 17 00:46:40.678779 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 17 00:46:40.680326 systemd[1]: Starting update-engine.service... May 17 00:46:40.688278 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 17 00:46:40.695562 jq[1451]: false May 17 00:46:40.695828 jq[1469]: true May 17 00:46:40.702353 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 17 00:46:40.702759 systemd[1]: Finished ssh-key-proc-cmdline.service. May 17 00:46:40.711859 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 17 00:46:40.712015 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 17 00:46:40.729686 extend-filesystems[1452]: Found loop1 May 17 00:46:40.729686 extend-filesystems[1452]: Found sda May 17 00:46:40.729686 extend-filesystems[1452]: Found sda1 May 17 00:46:40.754756 extend-filesystems[1452]: Found sda2 May 17 00:46:40.754756 extend-filesystems[1452]: Found sda3 May 17 00:46:40.754756 extend-filesystems[1452]: Found usr May 17 00:46:40.754756 extend-filesystems[1452]: Found sda4 May 17 00:46:40.754756 extend-filesystems[1452]: Found sda6 May 17 00:46:40.754756 extend-filesystems[1452]: Found sda7 May 17 00:46:40.754756 extend-filesystems[1452]: Found sda9 May 17 00:46:40.754756 extend-filesystems[1452]: Checking size of /dev/sda9 May 17 00:46:40.825855 jq[1474]: true May 17 00:46:40.747411 systemd[1]: motdgen.service: Deactivated successfully. May 17 00:46:40.747599 systemd[1]: Finished motdgen.service. May 17 00:46:40.780970 systemd-logind[1466]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard) May 17 00:46:40.784397 systemd-logind[1466]: New seat seat0. May 17 00:46:40.840258 tar[1473]: linux-arm64/LICENSE May 17 00:46:40.840258 tar[1473]: linux-arm64/helm May 17 00:46:40.853084 env[1480]: time="2025-05-17T00:46:40.852691080Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 17 00:46:40.885650 extend-filesystems[1452]: Old size kept for /dev/sda9 May 17 00:46:40.897519 extend-filesystems[1452]: Found sr0 May 17 00:46:40.891783 systemd[1]: extend-filesystems.service: Deactivated successfully. May 17 00:46:40.927719 bash[1503]: Updated "/home/core/.ssh/authorized_keys" May 17 00:46:40.891990 systemd[1]: Finished extend-filesystems.service. May 17 00:46:40.915788 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 17 00:46:40.946721 dbus-daemon[1450]: [system] SELinux support is enabled May 17 00:46:40.946939 systemd[1]: Started dbus.service. May 17 00:46:40.953155 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 17 00:46:40.953742 dbus-daemon[1450]: [system] Successfully activated service 'org.freedesktop.systemd1' May 17 00:46:40.953189 systemd[1]: Reached target system-config.target. May 17 00:46:40.963691 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 17 00:46:40.963718 systemd[1]: Reached target user-config.target. May 17 00:46:40.971304 systemd[1]: Started systemd-logind.service. May 17 00:46:40.981400 env[1480]: time="2025-05-17T00:46:40.981291440Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 17 00:46:40.981692 env[1480]: time="2025-05-17T00:46:40.981671400Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 17 00:46:40.989371 env[1480]: time="2025-05-17T00:46:40.989320080Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.182-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 17 00:46:40.989949 env[1480]: time="2025-05-17T00:46:40.989928200Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 17 00:46:40.990356 env[1480]: time="2025-05-17T00:46:40.990330520Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 17 00:46:40.991070 env[1480]: time="2025-05-17T00:46:40.991052920Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 17 00:46:40.991171 env[1480]: time="2025-05-17T00:46:40.991138640Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 17 00:46:40.991259 env[1480]: time="2025-05-17T00:46:40.991225480Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 17 00:46:40.991415 env[1480]: time="2025-05-17T00:46:40.991399400Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 17 00:46:40.991752 env[1480]: time="2025-05-17T00:46:40.991732080Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 17 00:46:40.992183 env[1480]: time="2025-05-17T00:46:40.992159360Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 17 00:46:40.994673 env[1480]: time="2025-05-17T00:46:40.994645040Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 17 00:46:40.994883 env[1480]: time="2025-05-17T00:46:40.994864280Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 17 00:46:40.994966 env[1480]: time="2025-05-17T00:46:40.994952080Z" level=info msg="metadata content store policy set" policy=shared May 17 00:46:41.010261 env[1480]: time="2025-05-17T00:46:41.009202680Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 17 00:46:41.010261 env[1480]: time="2025-05-17T00:46:41.009296200Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 17 00:46:41.010261 env[1480]: time="2025-05-17T00:46:41.009311080Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 17 00:46:41.010261 env[1480]: time="2025-05-17T00:46:41.009351600Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 17 00:46:41.010261 env[1480]: time="2025-05-17T00:46:41.009372200Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 17 00:46:41.010261 env[1480]: time="2025-05-17T00:46:41.009387400Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 17 00:46:41.010261 env[1480]: time="2025-05-17T00:46:41.009400480Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 17 00:46:41.010261 env[1480]: time="2025-05-17T00:46:41.009786280Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 17 00:46:41.010261 env[1480]: time="2025-05-17T00:46:41.009806000Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 17 00:46:41.010261 env[1480]: time="2025-05-17T00:46:41.009821600Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 17 00:46:41.010261 env[1480]: time="2025-05-17T00:46:41.009852400Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 17 00:46:41.010261 env[1480]: time="2025-05-17T00:46:41.009866840Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 17 00:46:41.010261 env[1480]: time="2025-05-17T00:46:41.010021960Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 17 00:46:41.010261 env[1480]: time="2025-05-17T00:46:41.010105520Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 17 00:46:41.010885 env[1480]: time="2025-05-17T00:46:41.010843520Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 17 00:46:41.010932 env[1480]: time="2025-05-17T00:46:41.010899000Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 17 00:46:41.010932 env[1480]: time="2025-05-17T00:46:41.010916440Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 17 00:46:41.010987 env[1480]: time="2025-05-17T00:46:41.010974960Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 17 00:46:41.011014 env[1480]: time="2025-05-17T00:46:41.010989240Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 17 00:46:41.011014 env[1480]: time="2025-05-17T00:46:41.011002440Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 17 00:46:41.011055 env[1480]: time="2025-05-17T00:46:41.011014400Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 17 00:46:41.011055 env[1480]: time="2025-05-17T00:46:41.011027400Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 17 00:46:41.011055 env[1480]: time="2025-05-17T00:46:41.011039760Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 17 00:46:41.011055 env[1480]: time="2025-05-17T00:46:41.011051000Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 17 00:46:41.011140 env[1480]: time="2025-05-17T00:46:41.011064240Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 17 00:46:41.011140 env[1480]: time="2025-05-17T00:46:41.011078920Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 17 00:46:41.011280 env[1480]: time="2025-05-17T00:46:41.011255840Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 17 00:46:41.011317 env[1480]: time="2025-05-17T00:46:41.011280200Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 17 00:46:41.011317 env[1480]: time="2025-05-17T00:46:41.011293800Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 17 00:46:41.011317 env[1480]: time="2025-05-17T00:46:41.011305200Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 17 00:46:41.011384 env[1480]: time="2025-05-17T00:46:41.011320280Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 17 00:46:41.011384 env[1480]: time="2025-05-17T00:46:41.011332760Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 17 00:46:41.011384 env[1480]: time="2025-05-17T00:46:41.011351160Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 17 00:46:41.011447 env[1480]: time="2025-05-17T00:46:41.011387040Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 17 00:46:41.011651 env[1480]: time="2025-05-17T00:46:41.011592800Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 17 00:46:41.027836 env[1480]: time="2025-05-17T00:46:41.011656080Z" level=info msg="Connect containerd service" May 17 00:46:41.027836 env[1480]: time="2025-05-17T00:46:41.011687840Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 17 00:46:41.027836 env[1480]: time="2025-05-17T00:46:41.012340920Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 17 00:46:41.027836 env[1480]: time="2025-05-17T00:46:41.012616400Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 17 00:46:41.027836 env[1480]: time="2025-05-17T00:46:41.012654440Z" level=info msg=serving... address=/run/containerd/containerd.sock May 17 00:46:41.027836 env[1480]: time="2025-05-17T00:46:41.018006480Z" level=info msg="containerd successfully booted in 0.188364s" May 17 00:46:41.027836 env[1480]: time="2025-05-17T00:46:41.023519960Z" level=info msg="Start subscribing containerd event" May 17 00:46:41.027836 env[1480]: time="2025-05-17T00:46:41.023699400Z" level=info msg="Start recovering state" May 17 00:46:41.027836 env[1480]: time="2025-05-17T00:46:41.023787920Z" level=info msg="Start event monitor" May 17 00:46:41.027836 env[1480]: time="2025-05-17T00:46:41.023811600Z" level=info msg="Start snapshots syncer" May 17 00:46:41.027836 env[1480]: time="2025-05-17T00:46:41.023824440Z" level=info msg="Start cni network conf syncer for default" May 17 00:46:41.027836 env[1480]: time="2025-05-17T00:46:41.023836560Z" level=info msg="Start streaming server" May 17 00:46:41.012781 systemd[1]: Started containerd.service. May 17 00:46:41.037398 systemd[1]: nvidia.service: Deactivated successfully. May 17 00:46:41.434546 update_engine[1468]: I0517 00:46:41.420991 1468 main.cc:92] Flatcar Update Engine starting May 17 00:46:41.482395 systemd[1]: Started update-engine.service. May 17 00:46:41.488988 update_engine[1468]: I0517 00:46:41.488940 1468 update_check_scheduler.cc:74] Next update check in 4m1s May 17 00:46:41.490557 systemd[1]: Started locksmithd.service. May 17 00:46:41.613700 tar[1473]: linux-arm64/README.md May 17 00:46:41.618893 systemd[1]: Finished prepare-helm.service. May 17 00:46:41.775328 systemd[1]: Started kubelet.service. May 17 00:46:42.162572 kubelet[1555]: E0517 00:46:42.162436 1555 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:46:42.164546 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:46:42.164676 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:46:42.851807 locksmithd[1551]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 17 00:46:43.722333 sshd_keygen[1467]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 17 00:46:43.741380 systemd[1]: Finished sshd-keygen.service. May 17 00:46:43.747872 systemd[1]: Starting issuegen.service... May 17 00:46:43.753585 systemd[1]: Started waagent.service. May 17 00:46:43.758820 systemd[1]: issuegen.service: Deactivated successfully. May 17 00:46:43.759017 systemd[1]: Finished issuegen.service. May 17 00:46:43.765146 systemd[1]: Starting systemd-user-sessions.service... May 17 00:46:43.886316 systemd[1]: Finished systemd-user-sessions.service. May 17 00:46:43.893177 systemd[1]: Started getty@tty1.service. May 17 00:46:43.899504 systemd[1]: Started serial-getty@ttyAMA0.service. May 17 00:46:43.904685 systemd[1]: Reached target getty.target. May 17 00:46:43.912887 systemd[1]: Reached target multi-user.target. May 17 00:46:43.920070 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 17 00:46:43.929975 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 17 00:46:43.930283 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 17 00:46:43.938315 systemd[1]: Startup finished in 762ms (kernel) + 15.842s (initrd) + 28.167s (userspace) = 44.772s. May 17 00:46:44.602389 login[1579]: pam_lastlog(login:session): file /var/log/lastlog is locked/write May 17 00:46:44.603708 login[1578]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) May 17 00:46:44.655669 systemd[1]: Created slice user-500.slice. May 17 00:46:44.656848 systemd[1]: Starting user-runtime-dir@500.service... May 17 00:46:44.659718 systemd-logind[1466]: New session 1 of user core. May 17 00:46:44.695912 systemd[1]: Finished user-runtime-dir@500.service. May 17 00:46:44.697542 systemd[1]: Starting user@500.service... May 17 00:46:44.728312 (systemd)[1582]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 17 00:46:44.914804 systemd[1582]: Queued start job for default target default.target. May 17 00:46:44.915746 systemd[1582]: Reached target paths.target. May 17 00:46:44.915776 systemd[1582]: Reached target sockets.target. May 17 00:46:44.915788 systemd[1582]: Reached target timers.target. May 17 00:46:44.915798 systemd[1582]: Reached target basic.target. May 17 00:46:44.915910 systemd[1]: Started user@500.service. May 17 00:46:44.916857 systemd[1]: Started session-1.scope. May 17 00:46:44.918696 systemd[1582]: Reached target default.target. May 17 00:46:44.919701 systemd[1582]: Startup finished in 183ms. May 17 00:46:45.603935 login[1579]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) May 17 00:46:45.609200 systemd[1]: Started session-2.scope. May 17 00:46:45.609806 systemd-logind[1466]: New session 2 of user core. May 17 00:46:52.166760 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 17 00:46:52.166939 systemd[1]: Stopped kubelet.service. May 17 00:46:52.168354 systemd[1]: Starting kubelet.service... May 17 00:46:57.921070 systemd[1]: Started kubelet.service. May 17 00:46:57.955490 kubelet[1609]: E0517 00:46:57.955434 1609 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:46:57.958449 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:46:57.958570 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:46:58.635752 waagent[1576]: 2025-05-17T00:46:58.635637Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 May 17 00:46:58.644023 waagent[1576]: 2025-05-17T00:46:58.643918Z INFO Daemon Daemon OS: flatcar 3510.3.7 May 17 00:46:58.649546 waagent[1576]: 2025-05-17T00:46:58.649444Z INFO Daemon Daemon Python: 3.9.16 May 17 00:46:58.654868 waagent[1576]: 2025-05-17T00:46:58.654768Z INFO Daemon Daemon Run daemon May 17 00:46:58.660313 waagent[1576]: 2025-05-17T00:46:58.660210Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.7' May 17 00:46:58.679393 waagent[1576]: 2025-05-17T00:46:58.679200Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. May 17 00:46:58.697010 waagent[1576]: 2025-05-17T00:46:58.696859Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' May 17 00:46:58.708178 waagent[1576]: 2025-05-17T00:46:58.708076Z INFO Daemon Daemon cloud-init is enabled: False May 17 00:46:58.714354 waagent[1576]: 2025-05-17T00:46:58.714247Z INFO Daemon Daemon Using waagent for provisioning May 17 00:46:58.721213 waagent[1576]: 2025-05-17T00:46:58.721125Z INFO Daemon Daemon Activate resource disk May 17 00:46:58.727026 waagent[1576]: 2025-05-17T00:46:58.726929Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb May 17 00:46:58.742882 waagent[1576]: 2025-05-17T00:46:58.742783Z INFO Daemon Daemon Found device: None May 17 00:46:58.748416 waagent[1576]: 2025-05-17T00:46:58.748319Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology May 17 00:46:58.758290 waagent[1576]: 2025-05-17T00:46:58.758152Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 May 17 00:46:58.771963 waagent[1576]: 2025-05-17T00:46:58.771883Z INFO Daemon Daemon Clean protocol and wireserver endpoint May 17 00:46:58.778511 waagent[1576]: 2025-05-17T00:46:58.778417Z INFO Daemon Daemon Running default provisioning handler May 17 00:46:58.792728 waagent[1576]: 2025-05-17T00:46:58.792569Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. May 17 00:46:58.809579 waagent[1576]: 2025-05-17T00:46:58.809425Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' May 17 00:46:58.820756 waagent[1576]: 2025-05-17T00:46:58.820651Z INFO Daemon Daemon cloud-init is enabled: False May 17 00:46:58.826866 waagent[1576]: 2025-05-17T00:46:58.826761Z INFO Daemon Daemon Copying ovf-env.xml May 17 00:46:58.937668 waagent[1576]: 2025-05-17T00:46:58.937511Z INFO Daemon Daemon Successfully mounted dvd May 17 00:46:59.016886 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. May 17 00:46:59.052956 waagent[1576]: 2025-05-17T00:46:59.052790Z INFO Daemon Daemon Detect protocol endpoint May 17 00:46:59.059348 waagent[1576]: 2025-05-17T00:46:59.059253Z INFO Daemon Daemon Clean protocol and wireserver endpoint May 17 00:46:59.066324 waagent[1576]: 2025-05-17T00:46:59.066222Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler May 17 00:46:59.074759 waagent[1576]: 2025-05-17T00:46:59.074673Z INFO Daemon Daemon Test for route to 168.63.129.16 May 17 00:46:59.081156 waagent[1576]: 2025-05-17T00:46:59.081077Z INFO Daemon Daemon Route to 168.63.129.16 exists May 17 00:46:59.087315 waagent[1576]: 2025-05-17T00:46:59.087221Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 May 17 00:46:59.249114 waagent[1576]: 2025-05-17T00:46:59.248995Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 May 17 00:46:59.257401 waagent[1576]: 2025-05-17T00:46:59.257354Z INFO Daemon Daemon Wire protocol version:2012-11-30 May 17 00:46:59.263978 waagent[1576]: 2025-05-17T00:46:59.263897Z INFO Daemon Daemon Server preferred version:2015-04-05 May 17 00:46:59.872403 waagent[1576]: 2025-05-17T00:46:59.872210Z INFO Daemon Daemon Initializing goal state during protocol detection May 17 00:46:59.890641 waagent[1576]: 2025-05-17T00:46:59.890544Z INFO Daemon Daemon Forcing an update of the goal state.. May 17 00:46:59.896822 waagent[1576]: 2025-05-17T00:46:59.896739Z INFO Daemon Daemon Fetching goal state [incarnation 1] May 17 00:46:59.992264 waagent[1576]: 2025-05-17T00:46:59.992092Z INFO Daemon Daemon Found private key matching thumbprint 63FA20198F5DAF8E94FB638B3D38CB71AB4DC776 May 17 00:47:00.000817 waagent[1576]: 2025-05-17T00:47:00.000731Z INFO Daemon Daemon Certificate with thumbprint B3AD1BA9546D8D264616C0B22DAF4D105AF086AE has no matching private key. May 17 00:47:00.011144 waagent[1576]: 2025-05-17T00:47:00.011059Z INFO Daemon Daemon Fetch goal state completed May 17 00:47:00.079807 waagent[1576]: 2025-05-17T00:47:00.079741Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: dc587b3e-e993-4f1a-aeca-5e3d8fac7a70 New eTag: 5014814362951520304] May 17 00:47:00.091417 waagent[1576]: 2025-05-17T00:47:00.091331Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob May 17 00:47:00.108820 waagent[1576]: 2025-05-17T00:47:00.108757Z INFO Daemon Daemon Starting provisioning May 17 00:47:00.115752 waagent[1576]: 2025-05-17T00:47:00.115654Z INFO Daemon Daemon Handle ovf-env.xml. May 17 00:47:00.120796 waagent[1576]: 2025-05-17T00:47:00.120722Z INFO Daemon Daemon Set hostname [ci-3510.3.7-n-4234abe502] May 17 00:47:00.162406 waagent[1576]: 2025-05-17T00:47:00.162259Z INFO Daemon Daemon Publish hostname [ci-3510.3.7-n-4234abe502] May 17 00:47:00.169636 waagent[1576]: 2025-05-17T00:47:00.169547Z INFO Daemon Daemon Examine /proc/net/route for primary interface May 17 00:47:00.176733 waagent[1576]: 2025-05-17T00:47:00.176652Z INFO Daemon Daemon Primary interface is [eth0] May 17 00:47:00.193550 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. May 17 00:47:00.193728 systemd[1]: Stopped systemd-networkd-wait-online.service. May 17 00:47:00.193789 systemd[1]: Stopping systemd-networkd-wait-online.service... May 17 00:47:00.194042 systemd[1]: Stopping systemd-networkd.service... May 17 00:47:00.206286 systemd-networkd[1246]: eth0: DHCPv6 lease lost May 17 00:47:00.207192 systemd-timesyncd[1425]: Network configuration changed, trying to establish connection. May 17 00:47:00.207698 systemd[1]: systemd-networkd.service: Deactivated successfully. May 17 00:47:00.207868 systemd[1]: Stopped systemd-networkd.service. May 17 00:47:00.209985 systemd[1]: Starting systemd-networkd.service... May 17 00:47:00.239670 systemd-networkd[1635]: enP32470s1: Link UP May 17 00:47:00.239971 systemd-networkd[1635]: enP32470s1: Gained carrier May 17 00:47:00.241143 systemd-networkd[1635]: eth0: Link UP May 17 00:47:00.241285 systemd-networkd[1635]: eth0: Gained carrier May 17 00:47:00.241671 systemd-networkd[1635]: lo: Link UP May 17 00:47:00.241742 systemd-networkd[1635]: lo: Gained carrier May 17 00:47:00.242028 systemd-networkd[1635]: eth0: Gained IPv6LL May 17 00:47:00.242336 systemd-networkd[1635]: Enumeration completed May 17 00:47:00.242514 systemd[1]: Started systemd-networkd.service. May 17 00:47:00.245961 waagent[1576]: 2025-05-17T00:47:00.244299Z INFO Daemon Daemon Create user account if not exists May 17 00:47:00.242812 systemd-timesyncd[1425]: Network configuration changed, trying to establish connection. May 17 00:47:00.244342 systemd[1]: Starting systemd-networkd-wait-online.service... May 17 00:47:00.250914 waagent[1576]: 2025-05-17T00:47:00.250822Z INFO Daemon Daemon User core already exists, skip useradd May 17 00:47:00.256967 systemd-timesyncd[1425]: Network configuration changed, trying to establish connection. May 17 00:47:00.257731 waagent[1576]: 2025-05-17T00:47:00.257631Z INFO Daemon Daemon Configure sudoer May 17 00:47:00.258024 systemd-timesyncd[1425]: Network configuration changed, trying to establish connection. May 17 00:47:00.258577 systemd-networkd[1635]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 17 00:47:00.263422 waagent[1576]: 2025-05-17T00:47:00.263320Z INFO Daemon Daemon Configure sshd May 17 00:47:00.268073 waagent[1576]: 2025-05-17T00:47:00.267975Z INFO Daemon Daemon Deploy ssh public key. May 17 00:47:00.274423 systemd-timesyncd[1425]: Network configuration changed, trying to establish connection. May 17 00:47:00.275698 systemd-timesyncd[1425]: Network configuration changed, trying to establish connection. May 17 00:47:00.284554 systemd-networkd[1635]: eth0: DHCPv4 address 10.200.20.34/24, gateway 10.200.20.1 acquired from 168.63.129.16 May 17 00:47:00.286125 systemd-timesyncd[1425]: Network configuration changed, trying to establish connection. May 17 00:47:00.287408 systemd-timesyncd[1425]: Network configuration changed, trying to establish connection. May 17 00:47:00.288699 systemd-timesyncd[1425]: Network configuration changed, trying to establish connection. May 17 00:47:00.289861 systemd[1]: Finished systemd-networkd-wait-online.service. May 17 00:47:01.435022 waagent[1576]: 2025-05-17T00:47:01.434927Z INFO Daemon Daemon Provisioning complete May 17 00:47:01.458440 waagent[1576]: 2025-05-17T00:47:01.458356Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping May 17 00:47:01.465488 waagent[1576]: 2025-05-17T00:47:01.465381Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. May 17 00:47:01.477184 waagent[1576]: 2025-05-17T00:47:01.477078Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent May 17 00:47:01.835931 waagent[1644]: 2025-05-17T00:47:01.835747Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent May 17 00:47:01.836678 waagent[1644]: 2025-05-17T00:47:01.836616Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file May 17 00:47:01.836822 waagent[1644]: 2025-05-17T00:47:01.836771Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 May 17 00:47:01.849875 waagent[1644]: 2025-05-17T00:47:01.849757Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. May 17 00:47:01.850078 waagent[1644]: 2025-05-17T00:47:01.850026Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] May 17 00:47:01.926959 waagent[1644]: 2025-05-17T00:47:01.926803Z INFO ExtHandler ExtHandler Found private key matching thumbprint 63FA20198F5DAF8E94FB638B3D38CB71AB4DC776 May 17 00:47:01.927198 waagent[1644]: 2025-05-17T00:47:01.927140Z INFO ExtHandler ExtHandler Certificate with thumbprint B3AD1BA9546D8D264616C0B22DAF4D105AF086AE has no matching private key. May 17 00:47:01.927481 waagent[1644]: 2025-05-17T00:47:01.927426Z INFO ExtHandler ExtHandler Fetch goal state completed May 17 00:47:01.943925 waagent[1644]: 2025-05-17T00:47:01.943856Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: 3a968a2e-6066-4c2d-8f24-23461040217e New eTag: 5014814362951520304] May 17 00:47:01.944562 waagent[1644]: 2025-05-17T00:47:01.944497Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob May 17 00:47:02.045782 waagent[1644]: 2025-05-17T00:47:02.045622Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.7; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; May 17 00:47:02.056385 waagent[1644]: 2025-05-17T00:47:02.056291Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1644 May 17 00:47:02.060450 waagent[1644]: 2025-05-17T00:47:02.060362Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.7', '', 'Flatcar Container Linux by Kinvolk'] May 17 00:47:02.061866 waagent[1644]: 2025-05-17T00:47:02.061792Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules May 17 00:47:02.164671 waagent[1644]: 2025-05-17T00:47:02.164551Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service May 17 00:47:02.165092 waagent[1644]: 2025-05-17T00:47:02.165031Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup May 17 00:47:02.173383 waagent[1644]: 2025-05-17T00:47:02.173310Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now May 17 00:47:02.174046 waagent[1644]: 2025-05-17T00:47:02.173977Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' May 17 00:47:02.175368 waagent[1644]: 2025-05-17T00:47:02.175302Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] May 17 00:47:02.176856 waagent[1644]: 2025-05-17T00:47:02.176779Z INFO ExtHandler ExtHandler Starting env monitor service. May 17 00:47:02.177573 waagent[1644]: 2025-05-17T00:47:02.177507Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file May 17 00:47:02.177861 waagent[1644]: 2025-05-17T00:47:02.177809Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 May 17 00:47:02.178678 waagent[1644]: 2025-05-17T00:47:02.178605Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. May 17 00:47:02.179282 waagent[1644]: 2025-05-17T00:47:02.179186Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file May 17 00:47:02.179483 waagent[1644]: 2025-05-17T00:47:02.179423Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 May 17 00:47:02.180175 waagent[1644]: 2025-05-17T00:47:02.180101Z INFO EnvHandler ExtHandler Configure routes May 17 00:47:02.180587 waagent[1644]: 2025-05-17T00:47:02.180523Z INFO EnvHandler ExtHandler Gateway:None May 17 00:47:02.180826 waagent[1644]: 2025-05-17T00:47:02.180765Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. May 17 00:47:02.181208 waagent[1644]: 2025-05-17T00:47:02.181135Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: May 17 00:47:02.181208 waagent[1644]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT May 17 00:47:02.181208 waagent[1644]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 May 17 00:47:02.181208 waagent[1644]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 May 17 00:47:02.181208 waagent[1644]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 May 17 00:47:02.181208 waagent[1644]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 May 17 00:47:02.181208 waagent[1644]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 May 17 00:47:02.181438 waagent[1644]: 2025-05-17T00:47:02.181281Z INFO EnvHandler ExtHandler Routes:None May 17 00:47:02.184829 waagent[1644]: 2025-05-17T00:47:02.184720Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread May 17 00:47:02.185052 waagent[1644]: 2025-05-17T00:47:02.184966Z INFO ExtHandler ExtHandler Start Extension Telemetry service. May 17 00:47:02.186357 waagent[1644]: 2025-05-17T00:47:02.186260Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True May 17 00:47:02.186717 waagent[1644]: 2025-05-17T00:47:02.186641Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. May 17 00:47:02.187339 waagent[1644]: 2025-05-17T00:47:02.187229Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread May 17 00:47:02.203056 waagent[1644]: 2025-05-17T00:47:02.202979Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) May 17 00:47:02.203996 waagent[1644]: 2025-05-17T00:47:02.203918Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required May 17 00:47:02.206213 waagent[1644]: 2025-05-17T00:47:02.206138Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' May 17 00:47:02.239011 waagent[1644]: 2025-05-17T00:47:02.238903Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1635' May 17 00:47:02.245390 waagent[1644]: 2025-05-17T00:47:02.245314Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. May 17 00:47:02.329487 waagent[1644]: 2025-05-17T00:47:02.329334Z INFO MonitorHandler ExtHandler Network interfaces: May 17 00:47:02.329487 waagent[1644]: Executing ['ip', '-a', '-o', 'link']: May 17 00:47:02.329487 waagent[1644]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 May 17 00:47:02.329487 waagent[1644]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:fc:db:20 brd ff:ff:ff:ff:ff:ff May 17 00:47:02.329487 waagent[1644]: 3: enP32470s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:fc:db:20 brd ff:ff:ff:ff:ff:ff\ altname enP32470p0s2 May 17 00:47:02.329487 waagent[1644]: Executing ['ip', '-4', '-a', '-o', 'address']: May 17 00:47:02.329487 waagent[1644]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever May 17 00:47:02.329487 waagent[1644]: 2: eth0 inet 10.200.20.34/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever May 17 00:47:02.329487 waagent[1644]: Executing ['ip', '-6', '-a', '-o', 'address']: May 17 00:47:02.329487 waagent[1644]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever May 17 00:47:02.329487 waagent[1644]: 2: eth0 inet6 fe80::20d:3aff:fefc:db20/64 scope link \ valid_lft forever preferred_lft forever May 17 00:47:02.560504 waagent[1644]: 2025-05-17T00:47:02.560436Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.13.1.1 -- exiting May 17 00:47:03.482422 waagent[1576]: 2025-05-17T00:47:03.482297Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running May 17 00:47:03.487372 waagent[1576]: 2025-05-17T00:47:03.487312Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.13.1.1 to be the latest agent May 17 00:47:04.802102 waagent[1676]: 2025-05-17T00:47:04.802004Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.13.1.1) May 17 00:47:04.804068 waagent[1676]: 2025-05-17T00:47:04.803996Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.7 May 17 00:47:04.804359 waagent[1676]: 2025-05-17T00:47:04.804307Z INFO ExtHandler ExtHandler Python: 3.9.16 May 17 00:47:04.804573 waagent[1676]: 2025-05-17T00:47:04.804527Z INFO ExtHandler ExtHandler CPU Arch: aarch64 May 17 00:47:04.818951 waagent[1676]: 2025-05-17T00:47:04.818825Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.7; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; Arch: aarch64; systemd: True; systemd_version: systemd 252 (252); LISDrivers: Absent; logrotate: logrotate 3.20.1; May 17 00:47:04.819646 waagent[1676]: 2025-05-17T00:47:04.819585Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file May 17 00:47:04.819910 waagent[1676]: 2025-05-17T00:47:04.819861Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 May 17 00:47:04.820215 waagent[1676]: 2025-05-17T00:47:04.820164Z INFO ExtHandler ExtHandler Initializing the goal state... May 17 00:47:04.834414 waagent[1676]: 2025-05-17T00:47:04.834315Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] May 17 00:47:04.843702 waagent[1676]: 2025-05-17T00:47:04.843639Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.164 May 17 00:47:04.844991 waagent[1676]: 2025-05-17T00:47:04.844933Z INFO ExtHandler May 17 00:47:04.845274 waagent[1676]: 2025-05-17T00:47:04.845204Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: 6de0264f-1507-4763-8bf2-454233a5174e eTag: 5014814362951520304 source: Fabric] May 17 00:47:04.846158 waagent[1676]: 2025-05-17T00:47:04.846102Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. May 17 00:47:04.847534 waagent[1676]: 2025-05-17T00:47:04.847475Z INFO ExtHandler May 17 00:47:04.847763 waagent[1676]: 2025-05-17T00:47:04.847715Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] May 17 00:47:04.855007 waagent[1676]: 2025-05-17T00:47:04.854951Z INFO ExtHandler ExtHandler Downloading artifacts profile blob May 17 00:47:04.855682 waagent[1676]: 2025-05-17T00:47:04.855637Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required May 17 00:47:04.877916 waagent[1676]: 2025-05-17T00:47:04.877847Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. May 17 00:47:04.955707 waagent[1676]: 2025-05-17T00:47:04.955560Z INFO ExtHandler Downloaded certificate {'thumbprint': 'B3AD1BA9546D8D264616C0B22DAF4D105AF086AE', 'hasPrivateKey': False} May 17 00:47:04.956966 waagent[1676]: 2025-05-17T00:47:04.956902Z INFO ExtHandler Downloaded certificate {'thumbprint': '63FA20198F5DAF8E94FB638B3D38CB71AB4DC776', 'hasPrivateKey': True} May 17 00:47:04.958301 waagent[1676]: 2025-05-17T00:47:04.958209Z INFO ExtHandler Fetch goal state from WireServer completed May 17 00:47:04.959312 waagent[1676]: 2025-05-17T00:47:04.959229Z INFO ExtHandler ExtHandler Goal state initialization completed. May 17 00:47:04.980469 waagent[1676]: 2025-05-17T00:47:04.980343Z INFO ExtHandler ExtHandler OpenSSL version: OpenSSL 3.0.15 3 Sep 2024 (Library: OpenSSL 3.0.15 3 Sep 2024) May 17 00:47:04.989650 waagent[1676]: 2025-05-17T00:47:04.989529Z INFO ExtHandler ExtHandler Using iptables [version 1.8.8] to manage firewall rules May 17 00:47:04.993812 waagent[1676]: 2025-05-17T00:47:04.993694Z INFO ExtHandler ExtHandler Did not find a legacy firewall rule: ['iptables', '-w', '-t', 'security', '-C', 'OUTPUT', '-d', '168.63.129.16', '-p', 'tcp', '-m', 'conntrack', '--ctstate', 'INVALID,NEW', '-j', 'ACCEPT'] May 17 00:47:04.994223 waagent[1676]: 2025-05-17T00:47:04.994170Z INFO ExtHandler ExtHandler Checking state of the firewall May 17 00:47:05.173881 waagent[1676]: 2025-05-17T00:47:05.173752Z INFO ExtHandler ExtHandler Created firewall rules for Azure Fabric: May 17 00:47:05.173881 waagent[1676]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) May 17 00:47:05.173881 waagent[1676]: pkts bytes target prot opt in out source destination May 17 00:47:05.173881 waagent[1676]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) May 17 00:47:05.173881 waagent[1676]: pkts bytes target prot opt in out source destination May 17 00:47:05.173881 waagent[1676]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) May 17 00:47:05.173881 waagent[1676]: pkts bytes target prot opt in out source destination May 17 00:47:05.173881 waagent[1676]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 May 17 00:47:05.173881 waagent[1676]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 May 17 00:47:05.173881 waagent[1676]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW May 17 00:47:05.175478 waagent[1676]: 2025-05-17T00:47:05.175411Z INFO ExtHandler ExtHandler Setting up persistent firewall rules May 17 00:47:05.178828 waagent[1676]: 2025-05-17T00:47:05.178701Z INFO ExtHandler ExtHandler The firewalld service is not present on the system May 17 00:47:05.179311 waagent[1676]: 2025-05-17T00:47:05.179215Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service May 17 00:47:05.179812 waagent[1676]: 2025-05-17T00:47:05.179757Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup May 17 00:47:05.190467 waagent[1676]: 2025-05-17T00:47:05.190406Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now May 17 00:47:05.191306 waagent[1676]: 2025-05-17T00:47:05.191216Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' May 17 00:47:05.200092 waagent[1676]: 2025-05-17T00:47:05.200005Z INFO ExtHandler ExtHandler WALinuxAgent-2.13.1.1 running as process 1676 May 17 00:47:05.203587 waagent[1676]: 2025-05-17T00:47:05.203501Z INFO ExtHandler ExtHandler [CGI] Cgroups is not currently supported on ['flatcar', '3510.3.7', '', 'Flatcar Container Linux by Kinvolk'] May 17 00:47:05.204641 waagent[1676]: 2025-05-17T00:47:05.204579Z INFO ExtHandler ExtHandler [CGI] Agent will reset the quotas in case cgroup usage went from enabled to disabled May 17 00:47:05.205692 waagent[1676]: 2025-05-17T00:47:05.205635Z INFO ExtHandler ExtHandler [CGI] Agent cgroups enabled: False May 17 00:47:05.208698 waagent[1676]: 2025-05-17T00:47:05.208634Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: 1. configuration enabled [True], 2. cgroups v1 enabled [False] OR cgroups v2 is in use and v2 resource limiting configuration enabled [False], 3. python supported: [True] May 17 00:47:05.210211 waagent[1676]: 2025-05-17T00:47:05.210143Z INFO ExtHandler ExtHandler Starting env monitor service. May 17 00:47:05.210521 waagent[1676]: 2025-05-17T00:47:05.210448Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file May 17 00:47:05.211037 waagent[1676]: 2025-05-17T00:47:05.210971Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 May 17 00:47:05.211637 waagent[1676]: 2025-05-17T00:47:05.211570Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. May 17 00:47:05.211964 waagent[1676]: 2025-05-17T00:47:05.211903Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: May 17 00:47:05.211964 waagent[1676]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT May 17 00:47:05.211964 waagent[1676]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 May 17 00:47:05.211964 waagent[1676]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 May 17 00:47:05.211964 waagent[1676]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 May 17 00:47:05.211964 waagent[1676]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 May 17 00:47:05.211964 waagent[1676]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 May 17 00:47:05.214587 waagent[1676]: 2025-05-17T00:47:05.214459Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. May 17 00:47:05.215024 waagent[1676]: 2025-05-17T00:47:05.214951Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file May 17 00:47:05.215546 waagent[1676]: 2025-05-17T00:47:05.215476Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 May 17 00:47:05.216487 waagent[1676]: 2025-05-17T00:47:05.216333Z INFO EnvHandler ExtHandler Configure routes May 17 00:47:05.216722 waagent[1676]: 2025-05-17T00:47:05.216655Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread May 17 00:47:05.216897 waagent[1676]: 2025-05-17T00:47:05.216833Z INFO ExtHandler ExtHandler Start Extension Telemetry service. May 17 00:47:05.219790 waagent[1676]: 2025-05-17T00:47:05.219607Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True May 17 00:47:05.220078 waagent[1676]: 2025-05-17T00:47:05.219988Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. May 17 00:47:05.220774 waagent[1676]: 2025-05-17T00:47:05.220696Z INFO EnvHandler ExtHandler Gateway:None May 17 00:47:05.221254 waagent[1676]: 2025-05-17T00:47:05.221182Z INFO EnvHandler ExtHandler Routes:None May 17 00:47:05.222540 waagent[1676]: 2025-05-17T00:47:05.222475Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread May 17 00:47:05.231575 waagent[1676]: 2025-05-17T00:47:05.231484Z INFO MonitorHandler ExtHandler Network interfaces: May 17 00:47:05.231575 waagent[1676]: Executing ['ip', '-a', '-o', 'link']: May 17 00:47:05.231575 waagent[1676]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 May 17 00:47:05.231575 waagent[1676]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:fc:db:20 brd ff:ff:ff:ff:ff:ff May 17 00:47:05.231575 waagent[1676]: 3: enP32470s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:fc:db:20 brd ff:ff:ff:ff:ff:ff\ altname enP32470p0s2 May 17 00:47:05.231575 waagent[1676]: Executing ['ip', '-4', '-a', '-o', 'address']: May 17 00:47:05.231575 waagent[1676]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever May 17 00:47:05.231575 waagent[1676]: 2: eth0 inet 10.200.20.34/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever May 17 00:47:05.231575 waagent[1676]: Executing ['ip', '-6', '-a', '-o', 'address']: May 17 00:47:05.231575 waagent[1676]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever May 17 00:47:05.231575 waagent[1676]: 2: eth0 inet6 fe80::20d:3aff:fefc:db20/64 scope link \ valid_lft forever preferred_lft forever May 17 00:47:05.247963 waagent[1676]: 2025-05-17T00:47:05.247865Z INFO ExtHandler ExtHandler Downloading agent manifest May 17 00:47:05.263419 waagent[1676]: 2025-05-17T00:47:05.263317Z INFO ExtHandler ExtHandler May 17 00:47:05.264476 waagent[1676]: 2025-05-17T00:47:05.264407Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: dd8ee082-61a5-4bc7-9628-47de3c85ed3f correlation 95f893c1-d63f-47fb-a41f-73b74d295ab9 created: 2025-05-17T00:45:12.701271Z] May 17 00:47:05.268669 waagent[1676]: 2025-05-17T00:47:05.268590Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. May 17 00:47:05.272766 waagent[1676]: 2025-05-17T00:47:05.272695Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 9 ms] May 17 00:47:05.300161 waagent[1676]: 2025-05-17T00:47:05.300033Z INFO EnvHandler ExtHandler Using iptables [version 1.8.8] to manage firewall rules May 17 00:47:05.305088 waagent[1676]: 2025-05-17T00:47:05.305004Z INFO ExtHandler ExtHandler Looking for existing remote access users. May 17 00:47:05.310609 waagent[1676]: 2025-05-17T00:47:05.310424Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.13.1.1 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: F15E459E-70A2-411A-85F3-B3894120B289;UpdateGSErrors: 0;AutoUpdate: 1;UpdateMode: SelfUpdate;] May 17 00:47:05.317465 waagent[1676]: 2025-05-17T00:47:05.317384Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 May 17 00:47:08.166774 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. May 17 00:47:08.166946 systemd[1]: Stopped kubelet.service. May 17 00:47:08.168364 systemd[1]: Starting kubelet.service... May 17 00:47:08.258052 systemd[1]: Started kubelet.service. May 17 00:47:08.391906 kubelet[1723]: E0517 00:47:08.391867 1723 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:47:08.394172 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:47:08.394319 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:47:14.392737 kernel: hv_balloon: Max. dynamic memory size: 4096 MB May 17 00:47:18.416810 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. May 17 00:47:18.416991 systemd[1]: Stopped kubelet.service. May 17 00:47:18.418393 systemd[1]: Starting kubelet.service... May 17 00:47:18.846530 systemd[1]: Started kubelet.service. May 17 00:47:18.880249 kubelet[1732]: E0517 00:47:18.880197 1732 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:47:18.882527 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:47:18.882647 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:47:27.192722 update_engine[1468]: I0517 00:47:27.192278 1468 update_attempter.cc:509] Updating boot flags... May 17 00:47:28.916760 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. May 17 00:47:28.916932 systemd[1]: Stopped kubelet.service. May 17 00:47:28.918396 systemd[1]: Starting kubelet.service... May 17 00:47:29.354337 systemd[1]: Started kubelet.service. May 17 00:47:29.389222 kubelet[1807]: E0517 00:47:29.389181 1807 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:47:29.391579 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:47:29.391699 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:47:29.774733 systemd[1]: Created slice system-sshd.slice. May 17 00:47:29.776318 systemd[1]: Started sshd@0-10.200.20.34:22-10.200.16.10:59010.service. May 17 00:47:30.587962 systemd-timesyncd[1425]: Contacted time server 64.142.54.12:123 (0.flatcar.pool.ntp.org). May 17 00:47:30.588188 systemd-timesyncd[1425]: Initial clock synchronization to Sat 2025-05-17 00:47:30.595585 UTC. May 17 00:47:33.229692 sshd[1813]: Accepted publickey for core from 10.200.16.10 port 59010 ssh2: RSA SHA256:kTalk4vvVOHJD+odK+kI4Z4CxTmNI3TSVyFiPn8PnHg May 17 00:47:33.248955 sshd[1813]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:47:33.253015 systemd-logind[1466]: New session 3 of user core. May 17 00:47:33.253519 systemd[1]: Started session-3.scope. May 17 00:47:33.645638 systemd[1]: Started sshd@1-10.200.20.34:22-10.200.16.10:59018.service. May 17 00:47:34.063997 sshd[1818]: Accepted publickey for core from 10.200.16.10 port 59018 ssh2: RSA SHA256:kTalk4vvVOHJD+odK+kI4Z4CxTmNI3TSVyFiPn8PnHg May 17 00:47:34.065738 sshd[1818]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:47:34.070135 systemd[1]: Started session-4.scope. May 17 00:47:34.071290 systemd-logind[1466]: New session 4 of user core. May 17 00:47:34.370030 sshd[1818]: pam_unix(sshd:session): session closed for user core May 17 00:47:34.372804 systemd-logind[1466]: Session 4 logged out. Waiting for processes to exit. May 17 00:47:34.373412 systemd[1]: session-4.scope: Deactivated successfully. May 17 00:47:34.373924 systemd[1]: sshd@1-10.200.20.34:22-10.200.16.10:59018.service: Deactivated successfully. May 17 00:47:34.374936 systemd-logind[1466]: Removed session 4. May 17 00:47:34.444365 systemd[1]: Started sshd@2-10.200.20.34:22-10.200.16.10:59032.service. May 17 00:47:34.896766 sshd[1824]: Accepted publickey for core from 10.200.16.10 port 59032 ssh2: RSA SHA256:kTalk4vvVOHJD+odK+kI4Z4CxTmNI3TSVyFiPn8PnHg May 17 00:47:34.898064 sshd[1824]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:47:34.902031 systemd-logind[1466]: New session 5 of user core. May 17 00:47:34.902542 systemd[1]: Started session-5.scope. May 17 00:47:35.234427 sshd[1824]: pam_unix(sshd:session): session closed for user core May 17 00:47:35.236888 systemd[1]: sshd@2-10.200.20.34:22-10.200.16.10:59032.service: Deactivated successfully. May 17 00:47:35.237620 systemd[1]: session-5.scope: Deactivated successfully. May 17 00:47:35.238115 systemd-logind[1466]: Session 5 logged out. Waiting for processes to exit. May 17 00:47:35.238811 systemd-logind[1466]: Removed session 5. May 17 00:47:35.303729 systemd[1]: Started sshd@3-10.200.20.34:22-10.200.16.10:59044.service. May 17 00:47:35.721683 sshd[1830]: Accepted publickey for core from 10.200.16.10 port 59044 ssh2: RSA SHA256:kTalk4vvVOHJD+odK+kI4Z4CxTmNI3TSVyFiPn8PnHg May 17 00:47:35.723298 sshd[1830]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:47:35.727558 systemd[1]: Started session-6.scope. May 17 00:47:35.728287 systemd-logind[1466]: New session 6 of user core. May 17 00:47:36.028494 sshd[1830]: pam_unix(sshd:session): session closed for user core May 17 00:47:36.031294 systemd[1]: sshd@3-10.200.20.34:22-10.200.16.10:59044.service: Deactivated successfully. May 17 00:47:36.031971 systemd[1]: session-6.scope: Deactivated successfully. May 17 00:47:36.032503 systemd-logind[1466]: Session 6 logged out. Waiting for processes to exit. May 17 00:47:36.033280 systemd-logind[1466]: Removed session 6. May 17 00:47:36.101986 systemd[1]: Started sshd@4-10.200.20.34:22-10.200.16.10:59058.service. May 17 00:47:36.545646 sshd[1836]: Accepted publickey for core from 10.200.16.10 port 59058 ssh2: RSA SHA256:kTalk4vvVOHJD+odK+kI4Z4CxTmNI3TSVyFiPn8PnHg May 17 00:47:36.547253 sshd[1836]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:47:36.550995 systemd-logind[1466]: New session 7 of user core. May 17 00:47:36.551511 systemd[1]: Started session-7.scope. May 17 00:47:37.129147 sudo[1839]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 17 00:47:37.129393 sudo[1839]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:47:37.192373 dbus-daemon[1450]: avc: received setenforce notice (enforcing=1) May 17 00:47:37.193317 sudo[1839]: pam_unix(sudo:session): session closed for user root May 17 00:47:37.280465 sshd[1836]: pam_unix(sshd:session): session closed for user core May 17 00:47:37.283728 systemd[1]: sshd@4-10.200.20.34:22-10.200.16.10:59058.service: Deactivated successfully. May 17 00:47:37.284578 systemd[1]: session-7.scope: Deactivated successfully. May 17 00:47:37.285133 systemd-logind[1466]: Session 7 logged out. Waiting for processes to exit. May 17 00:47:37.285949 systemd-logind[1466]: Removed session 7. May 17 00:47:37.349662 systemd[1]: Started sshd@5-10.200.20.34:22-10.200.16.10:59074.service. May 17 00:47:37.761841 sshd[1843]: Accepted publickey for core from 10.200.16.10 port 59074 ssh2: RSA SHA256:kTalk4vvVOHJD+odK+kI4Z4CxTmNI3TSVyFiPn8PnHg May 17 00:47:37.763215 sshd[1843]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:47:37.767210 systemd-logind[1466]: New session 8 of user core. May 17 00:47:37.767666 systemd[1]: Started session-8.scope. May 17 00:47:37.998145 sudo[1847]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 17 00:47:37.998386 sudo[1847]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:47:38.001055 sudo[1847]: pam_unix(sudo:session): session closed for user root May 17 00:47:38.005720 sudo[1846]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 17 00:47:38.006198 sudo[1846]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:47:38.015004 systemd[1]: Stopping audit-rules.service... May 17 00:47:38.015000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 17 00:47:38.028446 auditctl[1850]: No rules May 17 00:47:38.015000 audit[1850]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffff2f92640 a2=420 a3=0 items=0 ppid=1 pid=1850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:38.029169 systemd[1]: audit-rules.service: Deactivated successfully. May 17 00:47:38.029378 systemd[1]: Stopped audit-rules.service. May 17 00:47:38.031080 systemd[1]: Starting audit-rules.service... May 17 00:47:38.051724 augenrules[1867]: No rules May 17 00:47:38.055543 kernel: audit: type=1305 audit(1747442858.015:211): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 17 00:47:38.055652 kernel: audit: type=1300 audit(1747442858.015:211): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffff2f92640 a2=420 a3=0 items=0 ppid=1 pid=1850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:38.055688 kernel: audit: type=1327 audit(1747442858.015:211): proctitle=2F7362696E2F617564697463746C002D44 May 17 00:47:38.015000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 17 00:47:38.053802 sudo[1846]: pam_unix(sudo:session): session closed for user root May 17 00:47:38.052704 systemd[1]: Finished audit-rules.service. May 17 00:47:38.028000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:38.079984 kernel: audit: type=1131 audit(1747442858.028:212): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:38.080136 kernel: audit: type=1130 audit(1747442858.051:213): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:38.051000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:38.052000 audit[1846]: USER_END pid=1846 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:47:38.117330 kernel: audit: type=1106 audit(1747442858.052:214): pid=1846 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:47:38.117411 kernel: audit: type=1104 audit(1747442858.052:215): pid=1846 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:47:38.052000 audit[1846]: CRED_DISP pid=1846 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:47:38.135699 sshd[1843]: pam_unix(sshd:session): session closed for user core May 17 00:47:38.135000 audit[1843]: USER_END pid=1843 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:47:38.138466 systemd[1]: session-8.scope: Deactivated successfully. May 17 00:47:38.139175 systemd[1]: sshd@5-10.200.20.34:22-10.200.16.10:59074.service: Deactivated successfully. May 17 00:47:38.135000 audit[1843]: CRED_DISP pid=1843 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:47:38.181609 kernel: audit: type=1106 audit(1747442858.135:216): pid=1843 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:47:38.181699 kernel: audit: type=1104 audit(1747442858.135:217): pid=1843 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:47:38.138000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.34:22-10.200.16.10:59074 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:38.200993 kernel: audit: type=1131 audit(1747442858.138:218): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.34:22-10.200.16.10:59074 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:38.199638 systemd[1]: Started sshd@6-10.200.20.34:22-10.200.16.10:59086.service. May 17 00:47:38.200483 systemd-logind[1466]: Session 8 logged out. Waiting for processes to exit. May 17 00:47:38.202000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.34:22-10.200.16.10:59086 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:38.204447 systemd-logind[1466]: Removed session 8. May 17 00:47:38.644000 audit[1873]: USER_ACCT pid=1873 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:47:38.645855 sshd[1873]: Accepted publickey for core from 10.200.16.10 port 59086 ssh2: RSA SHA256:kTalk4vvVOHJD+odK+kI4Z4CxTmNI3TSVyFiPn8PnHg May 17 00:47:38.645000 audit[1873]: CRED_ACQ pid=1873 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:47:38.645000 audit[1873]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffebfe6680 a2=3 a3=1 items=0 ppid=1 pid=1873 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:38.645000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:47:38.647482 sshd[1873]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:47:38.651789 systemd[1]: Started session-9.scope. May 17 00:47:38.653132 systemd-logind[1466]: New session 9 of user core. May 17 00:47:38.656000 audit[1873]: USER_START pid=1873 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:47:38.657000 audit[1875]: CRED_ACQ pid=1875 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:47:38.897000 audit[1876]: USER_ACCT pid=1876 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:47:38.898821 sudo[1876]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 17 00:47:38.897000 audit[1876]: CRED_REFR pid=1876 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:47:38.899053 sudo[1876]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:47:38.899000 audit[1876]: USER_START pid=1876 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:47:38.920505 systemd[1]: Starting docker.service... May 17 00:47:38.953356 env[1886]: time="2025-05-17T00:47:38.953291584Z" level=info msg="Starting up" May 17 00:47:38.954623 env[1886]: time="2025-05-17T00:47:38.954595908Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 17 00:47:38.954712 env[1886]: time="2025-05-17T00:47:38.954698940Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 17 00:47:38.954790 env[1886]: time="2025-05-17T00:47:38.954773003Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 17 00:47:38.954841 env[1886]: time="2025-05-17T00:47:38.954830060Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 17 00:47:38.956867 env[1886]: time="2025-05-17T00:47:38.956830999Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 17 00:47:38.956867 env[1886]: time="2025-05-17T00:47:38.956858928Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 17 00:47:38.957040 env[1886]: time="2025-05-17T00:47:38.956876854Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 17 00:47:38.957040 env[1886]: time="2025-05-17T00:47:38.956886136Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 17 00:47:39.416844 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 5. May 17 00:47:39.417013 systemd[1]: Stopped kubelet.service. May 17 00:47:39.415000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:39.415000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:39.418475 systemd[1]: Starting kubelet.service... May 17 00:47:41.240000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:41.240614 systemd[1]: Started kubelet.service. May 17 00:47:41.276480 kubelet[1897]: E0517 00:47:41.276406 1897 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:47:41.277000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 17 00:47:41.278727 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:47:41.278848 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:47:41.386920 env[1886]: time="2025-05-17T00:47:41.386851202Z" level=info msg="Loading containers: start." May 17 00:47:41.475000 audit[1922]: NETFILTER_CFG table=nat:5 family=2 entries=2 op=nft_register_chain pid=1922 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:41.475000 audit[1922]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=116 a0=3 a1=ffffd1de6f10 a2=0 a3=1 items=0 ppid=1886 pid=1922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:41.475000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 May 17 00:47:41.477000 audit[1924]: NETFILTER_CFG table=filter:6 family=2 entries=2 op=nft_register_chain pid=1924 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:41.477000 audit[1924]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=ffffd2577090 a2=0 a3=1 items=0 ppid=1886 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:41.477000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 May 17 00:47:41.479000 audit[1926]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_chain pid=1926 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:41.479000 audit[1926]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffdb27f720 a2=0 a3=1 items=0 ppid=1886 pid=1926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:41.479000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 17 00:47:41.480000 audit[1928]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1928 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:41.480000 audit[1928]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffeec6ace0 a2=0 a3=1 items=0 ppid=1886 pid=1928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:41.480000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 17 00:47:41.482000 audit[1930]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1930 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:41.482000 audit[1930]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffc0db4e00 a2=0 a3=1 items=0 ppid=1886 pid=1930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:41.482000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E May 17 00:47:41.484000 audit[1932]: NETFILTER_CFG table=filter:10 family=2 entries=1 op=nft_register_rule pid=1932 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:41.484000 audit[1932]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffc18244a0 a2=0 a3=1 items=0 ppid=1886 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:41.484000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E May 17 00:47:41.506000 audit[1934]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_chain pid=1934 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:41.506000 audit[1934]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffd0b71f20 a2=0 a3=1 items=0 ppid=1886 pid=1934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:41.506000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 May 17 00:47:41.507000 audit[1936]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1936 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:41.507000 audit[1936]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=212 a0=3 a1=fffff2e547e0 a2=0 a3=1 items=0 ppid=1886 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:41.507000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E May 17 00:47:41.509000 audit[1938]: NETFILTER_CFG table=filter:13 family=2 entries=2 op=nft_register_chain pid=1938 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:41.509000 audit[1938]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=308 a0=3 a1=ffffef878040 a2=0 a3=1 items=0 ppid=1886 pid=1938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:41.509000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 17 00:47:41.534000 audit[1942]: NETFILTER_CFG table=filter:14 family=2 entries=1 op=nft_unregister_rule pid=1942 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:41.534000 audit[1942]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffc67a37e0 a2=0 a3=1 items=0 ppid=1886 pid=1942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:41.534000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 17 00:47:41.543000 audit[1943]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1943 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:41.543000 audit[1943]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffeddff940 a2=0 a3=1 items=0 ppid=1886 pid=1943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:41.543000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 17 00:47:41.582256 kernel: Initializing XFRM netlink socket May 17 00:47:41.602577 env[1886]: time="2025-05-17T00:47:41.602526001Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" May 17 00:47:41.700000 audit[1951]: NETFILTER_CFG table=nat:16 family=2 entries=2 op=nft_register_chain pid=1951 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:41.700000 audit[1951]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=492 a0=3 a1=ffffeb34c9f0 a2=0 a3=1 items=0 ppid=1886 pid=1951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:41.700000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 May 17 00:47:41.738000 audit[1954]: NETFILTER_CFG table=nat:17 family=2 entries=1 op=nft_register_rule pid=1954 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:41.738000 audit[1954]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=288 a0=3 a1=ffffc5616830 a2=0 a3=1 items=0 ppid=1886 pid=1954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:41.738000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E May 17 00:47:41.741000 audit[1957]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_rule pid=1957 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:41.741000 audit[1957]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffe1fce8d0 a2=0 a3=1 items=0 ppid=1886 pid=1957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:41.741000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 May 17 00:47:41.743000 audit[1959]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1959 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:41.743000 audit[1959]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffd519a910 a2=0 a3=1 items=0 ppid=1886 pid=1959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:41.743000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 May 17 00:47:41.745000 audit[1961]: NETFILTER_CFG table=nat:20 family=2 entries=2 op=nft_register_chain pid=1961 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:41.745000 audit[1961]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=356 a0=3 a1=ffffdf289a10 a2=0 a3=1 items=0 ppid=1886 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:41.745000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 May 17 00:47:41.746000 audit[1963]: NETFILTER_CFG table=nat:21 family=2 entries=2 op=nft_register_chain pid=1963 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:41.746000 audit[1963]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=444 a0=3 a1=fffffdaaa700 a2=0 a3=1 items=0 ppid=1886 pid=1963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:41.746000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 May 17 00:47:41.748000 audit[1965]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1965 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:41.748000 audit[1965]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=fffff7871c60 a2=0 a3=1 items=0 ppid=1886 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:41.748000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 May 17 00:47:41.750000 audit[1967]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1967 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:41.750000 audit[1967]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=508 a0=3 a1=ffffdb6bc6b0 a2=0 a3=1 items=0 ppid=1886 pid=1967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:41.750000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 May 17 00:47:41.752000 audit[1969]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1969 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:41.752000 audit[1969]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=240 a0=3 a1=ffffdaff7a50 a2=0 a3=1 items=0 ppid=1886 pid=1969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:41.752000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 17 00:47:41.753000 audit[1971]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1971 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:41.753000 audit[1971]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=428 a0=3 a1=fffff7ec4870 a2=0 a3=1 items=0 ppid=1886 pid=1971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:41.753000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 17 00:47:41.755000 audit[1973]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1973 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:41.755000 audit[1973]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffda6daf20 a2=0 a3=1 items=0 ppid=1886 pid=1973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:41.755000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 May 17 00:47:41.757372 systemd-networkd[1635]: docker0: Link UP May 17 00:47:41.777000 audit[1977]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_unregister_rule pid=1977 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:41.777000 audit[1977]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffdf6ce270 a2=0 a3=1 items=0 ppid=1886 pid=1977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:41.777000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 17 00:47:41.785000 audit[1978]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_rule pid=1978 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:41.785000 audit[1978]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffc0e3bd10 a2=0 a3=1 items=0 ppid=1886 pid=1978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:41.785000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 17 00:47:41.786702 env[1886]: time="2025-05-17T00:47:41.786673001Z" level=info msg="Loading containers: done." May 17 00:47:41.796905 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck3128339323-merged.mount: Deactivated successfully. May 17 00:47:41.834019 env[1886]: time="2025-05-17T00:47:41.833980225Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 May 17 00:47:41.834410 env[1886]: time="2025-05-17T00:47:41.834392250Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 May 17 00:47:41.834614 env[1886]: time="2025-05-17T00:47:41.834599543Z" level=info msg="Daemon has completed initialization" May 17 00:47:41.888360 systemd[1]: Started docker.service. May 17 00:47:41.887000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:41.891392 env[1886]: time="2025-05-17T00:47:41.891342413Z" level=info msg="API listen on /run/docker.sock" May 17 00:47:43.037200 env[1480]: time="2025-05-17T00:47:43.037162030Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.33.1\"" May 17 00:47:43.997972 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2414785680.mount: Deactivated successfully. May 17 00:47:49.423385 env[1480]: time="2025-05-17T00:47:49.423322734Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.33.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:47:49.435099 env[1480]: time="2025-05-17T00:47:49.435050678Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9a2b7cf4f8540534c6ec5b758462c6d7885c6e734652172078bba899c0e3089a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:47:49.440713 env[1480]: time="2025-05-17T00:47:49.440666173Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.33.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:47:49.447376 env[1480]: time="2025-05-17T00:47:49.447337868Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:d8ae2fb01c39aa1c7add84f3d54425cf081c24c11e3946830292a8cfa4293548,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:47:49.447875 env[1480]: time="2025-05-17T00:47:49.447849666Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.33.1\" returns image reference \"sha256:9a2b7cf4f8540534c6ec5b758462c6d7885c6e734652172078bba899c0e3089a\"" May 17 00:47:49.449944 env[1480]: time="2025-05-17T00:47:49.449914821Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.33.1\"" May 17 00:47:51.416810 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 6. May 17 00:47:51.416983 systemd[1]: Stopped kubelet.service. May 17 00:47:51.437837 kernel: kauditd_printk_skb: 88 callbacks suppressed May 17 00:47:51.437948 kernel: audit: type=1130 audit(1747442871.416:257): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:51.416000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:51.418437 systemd[1]: Starting kubelet.service... May 17 00:47:51.416000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:51.454864 kernel: audit: type=1131 audit(1747442871.416:258): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:53.066000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:53.067552 systemd[1]: Started kubelet.service. May 17 00:47:53.085312 kernel: audit: type=1130 audit(1747442873.066:259): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:53.108603 kubelet[2015]: E0517 00:47:53.108552 2015 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:47:53.110588 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:47:53.110717 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:47:53.109000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 17 00:47:53.130259 kernel: audit: type=1131 audit(1747442873.109:260): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 17 00:47:56.228132 env[1480]: time="2025-05-17T00:47:56.227896494Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.33.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:47:56.235312 env[1480]: time="2025-05-17T00:47:56.235262967Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:674996a72aa5900cbbbcd410437021fa4c62a7f829a56f58eb23ac430f2ae383,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:47:56.242785 env[1480]: time="2025-05-17T00:47:56.242731331Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.33.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:47:56.250647 env[1480]: time="2025-05-17T00:47:56.250592212Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:7c9bea694e3a3c01ed6a5ee02d55a6124cc08e0b2eec6caa33f2c396b8cbc3f8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:47:56.251478 env[1480]: time="2025-05-17T00:47:56.251450255Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.33.1\" returns image reference \"sha256:674996a72aa5900cbbbcd410437021fa4c62a7f829a56f58eb23ac430f2ae383\"" May 17 00:47:56.252175 env[1480]: time="2025-05-17T00:47:56.252148563Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.33.1\"" May 17 00:48:00.668213 env[1480]: time="2025-05-17T00:48:00.668163046Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.33.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:00.680032 env[1480]: time="2025-05-17T00:48:00.679989051Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:014094c90caacf743dc5fb4281363492da1df31cd8218aeceab3be3326277d2e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:00.687609 env[1480]: time="2025-05-17T00:48:00.687569339Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.33.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:00.694634 env[1480]: time="2025-05-17T00:48:00.694592864Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:395b7de7cdbdcc3c3a3db270844a3f71d757e2447a1e4db76b4cce46fba7fd55,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:00.695325 env[1480]: time="2025-05-17T00:48:00.695292517Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.33.1\" returns image reference \"sha256:014094c90caacf743dc5fb4281363492da1df31cd8218aeceab3be3326277d2e\"" May 17 00:48:00.695914 env[1480]: time="2025-05-17T00:48:00.695886281Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.33.1\"" May 17 00:48:02.250350 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2083981209.mount: Deactivated successfully. May 17 00:48:02.783088 env[1480]: time="2025-05-17T00:48:02.783032201Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.33.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:02.793105 env[1480]: time="2025-05-17T00:48:02.793053621Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3e58848989f556e36aa29d7852ab1712163960651e074d11cae9d31fb27192db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:02.798661 env[1480]: time="2025-05-17T00:48:02.798620787Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.33.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:02.810048 env[1480]: time="2025-05-17T00:48:02.810004615Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:7ddf379897139ae8ade8b33cb9373b70c632a4d5491da6e234f5d830e0a50807,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:02.810759 env[1480]: time="2025-05-17T00:48:02.810727423Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.33.1\" returns image reference \"sha256:3e58848989f556e36aa29d7852ab1712163960651e074d11cae9d31fb27192db\"" May 17 00:48:02.811537 env[1480]: time="2025-05-17T00:48:02.811496154Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.12.0\"" May 17 00:48:03.165000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:03.166745 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 7. May 17 00:48:03.166914 systemd[1]: Stopped kubelet.service. May 17 00:48:03.168447 systemd[1]: Starting kubelet.service... May 17 00:48:03.165000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:03.203489 kernel: audit: type=1130 audit(1747442883.165:261): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:03.270677 kernel: audit: type=1131 audit(1747442883.165:262): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:03.333045 systemd[1]: Started kubelet.service. May 17 00:48:03.332000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:03.353274 kernel: audit: type=1130 audit(1747442883.332:263): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:03.390259 kubelet[2025]: E0517 00:48:03.390201 2025 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:48:03.392073 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:48:03.392189 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:48:03.391000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 17 00:48:03.411390 kernel: audit: type=1131 audit(1747442883.391:264): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 17 00:48:09.320572 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4052380472.mount: Deactivated successfully. May 17 00:48:13.416781 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 8. May 17 00:48:13.415000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:13.416954 systemd[1]: Stopped kubelet.service. May 17 00:48:13.418488 systemd[1]: Starting kubelet.service... May 17 00:48:13.415000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:13.455047 kernel: audit: type=1130 audit(1747442893.415:265): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:13.455174 kernel: audit: type=1131 audit(1747442893.415:266): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:13.512496 systemd[1]: Started kubelet.service. May 17 00:48:13.511000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:13.534661 kernel: audit: type=1130 audit(1747442893.511:267): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:13.631360 kubelet[2036]: E0517 00:48:13.631311 2036 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:48:16.817642 kernel: audit: type=1131 audit(1747442893.632:268): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 17 00:48:13.632000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 17 00:48:13.633058 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:48:13.633175 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:48:18.300077 env[1480]: time="2025-05-17T00:48:18.300022487Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.12.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:18.308151 env[1480]: time="2025-05-17T00:48:18.308090316Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f72407be9e08c3a1b29a88318cbfee87b9f2da489f84015a5090b1e386e4dbc1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:18.315908 env[1480]: time="2025-05-17T00:48:18.315854098Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.12.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:18.321288 env[1480]: time="2025-05-17T00:48:18.321211143Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:40384aa1f5ea6bfdc77997d243aec73da05f27aed0c5e9d65bfa98933c519d97,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:18.322166 env[1480]: time="2025-05-17T00:48:18.322135765Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.12.0\" returns image reference \"sha256:f72407be9e08c3a1b29a88318cbfee87b9f2da489f84015a5090b1e386e4dbc1\"" May 17 00:48:18.322858 env[1480]: time="2025-05-17T00:48:18.322833301Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" May 17 00:48:19.900856 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2736704309.mount: Deactivated successfully. May 17 00:48:20.072412 env[1480]: time="2025-05-17T00:48:20.072363455Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:20.123385 env[1480]: time="2025-05-17T00:48:20.122868135Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:afb61768ce381961ca0beff95337601f29dc70ff3ed14e5e4b3e5699057e6aa8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:20.168664 env[1480]: time="2025-05-17T00:48:20.168608477Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:20.214478 env[1480]: time="2025-05-17T00:48:20.214432780Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:20.215095 env[1480]: time="2025-05-17T00:48:20.215064353Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:afb61768ce381961ca0beff95337601f29dc70ff3ed14e5e4b3e5699057e6aa8\"" May 17 00:48:20.215756 env[1480]: time="2025-05-17T00:48:20.215732007Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.21-0\"" May 17 00:48:23.666749 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 9. May 17 00:48:23.666933 systemd[1]: Stopped kubelet.service. May 17 00:48:23.665000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:23.668409 systemd[1]: Starting kubelet.service... May 17 00:48:23.665000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:23.706305 kernel: audit: type=1130 audit(1747442903.665:269): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:23.706383 kernel: audit: type=1131 audit(1747442903.665:270): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:28.684000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:28.684454 systemd[1]: Started kubelet.service. May 17 00:48:28.704339 kernel: audit: type=1130 audit(1747442908.684:271): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:28.728390 kubelet[2045]: E0517 00:48:28.728335 2045 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:48:28.730000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 17 00:48:28.730657 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:48:28.730777 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:48:28.750272 kernel: audit: type=1131 audit(1747442908.730:272): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 17 00:48:33.877018 env[1480]: time="2025-05-17T00:48:33.876953667Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.21-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:33.901124 env[1480]: time="2025-05-17T00:48:33.901079882Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:31747a36ce712f0bf61b50a0c06e99768522025e7b8daedd6dc63d1ae84837b5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:33.911537 env[1480]: time="2025-05-17T00:48:33.911496335Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.21-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:33.923429 env[1480]: time="2025-05-17T00:48:33.923372800Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:d58c035df557080a27387d687092e3fc2b64c6d0e3162dc51453a115f847d121,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:33.924176 env[1480]: time="2025-05-17T00:48:33.924145887Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.21-0\" returns image reference \"sha256:31747a36ce712f0bf61b50a0c06e99768522025e7b8daedd6dc63d1ae84837b5\"" May 17 00:48:38.916844 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 10. May 17 00:48:38.917017 systemd[1]: Stopped kubelet.service. May 17 00:48:38.918373 systemd[1]: Starting kubelet.service... May 17 00:48:38.915000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:38.915000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:38.958273 kernel: audit: type=1130 audit(1747442918.915:273): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:38.958396 kernel: audit: type=1131 audit(1747442918.915:274): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:38.975214 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM May 17 00:48:38.975300 systemd[1]: kubelet.service: Failed with result 'signal'. May 17 00:48:38.975493 systemd[1]: Stopped kubelet.service. May 17 00:48:38.974000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 17 00:48:38.978098 systemd[1]: Starting kubelet.service... May 17 00:48:38.997298 kernel: audit: type=1130 audit(1747442918.974:275): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 17 00:48:39.025917 systemd[1]: Reloading. May 17 00:48:39.117266 /usr/lib/systemd/system-generators/torcx-generator[2101]: time="2025-05-17T00:48:39Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:48:39.117293 /usr/lib/systemd/system-generators/torcx-generator[2101]: time="2025-05-17T00:48:39Z" level=info msg="torcx already run" May 17 00:48:39.186349 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:48:39.186570 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:48:39.202144 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:48:39.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.307917 kernel: audit: type=1400 audit(1747442919.272:276): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.308011 kernel: audit: type=1400 audit(1747442919.272:277): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.308042 kernel: audit: type=1400 audit(1747442919.272:278): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.358490 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 17 00:48:39.358580 kernel: audit: type=1400 audit(1747442919.272:279): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.358604 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 May 17 00:48:39.362811 kernel: audit: backlog limit exceeded May 17 00:48:39.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.290000 audit: BPF prog-id=41 op=LOAD May 17 00:48:39.290000 audit: BPF prog-id=24 op=UNLOAD May 17 00:48:39.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.306000 audit: BPF prog-id=42 op=LOAD May 17 00:48:39.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.325000 audit: BPF prog-id=43 op=LOAD May 17 00:48:39.325000 audit: BPF prog-id=25 op=UNLOAD May 17 00:48:39.325000 audit: BPF prog-id=26 op=UNLOAD May 17 00:48:39.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.326000 audit: BPF prog-id=44 op=LOAD May 17 00:48:39.326000 audit: BPF prog-id=38 op=UNLOAD May 17 00:48:39.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.327000 audit: BPF prog-id=45 op=LOAD May 17 00:48:39.327000 audit: BPF prog-id=33 op=UNLOAD May 17 00:48:39.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:39.362000 audit: BPF prog-id=34 op=UNLOAD May 17 00:48:39.390888 systemd[1]: Started kubelet.service. May 17 00:48:39.390000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:39.393161 systemd[1]: Stopping kubelet.service... May 17 00:48:39.393638 systemd[1]: kubelet.service: Deactivated successfully. May 17 00:48:39.393901 systemd[1]: Stopped kubelet.service. May 17 00:48:39.392000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:39.395602 systemd[1]: Starting kubelet.service... May 17 00:48:42.773559 systemd[1]: Started kubelet.service. May 17 00:48:42.773000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:42.814316 kubelet[2165]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:48:42.814316 kubelet[2165]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. May 17 00:48:42.814316 kubelet[2165]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:48:42.814667 kubelet[2165]: I0517 00:48:42.814397 2165 server.go:212] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 17 00:48:43.287852 kubelet[2165]: I0517 00:48:43.287816 2165 server.go:530] "Kubelet version" kubeletVersion="v1.33.0" May 17 00:48:43.288017 kubelet[2165]: I0517 00:48:43.288007 2165 server.go:532] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 17 00:48:43.288338 kubelet[2165]: I0517 00:48:43.288322 2165 server.go:956] "Client rotation is on, will bootstrap in background" May 17 00:48:43.311120 kubelet[2165]: E0517 00:48:43.311080 2165 certificate_manager.go:596] "Failed while requesting a signed certificate from the control plane" err="cannot create certificate signing request: Post \"https://10.200.20.34:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.200.20.34:6443: connect: connection refused" logger="kubernetes.io/kube-apiserver-client-kubelet.UnhandledError" May 17 00:48:43.312286 kubelet[2165]: I0517 00:48:43.312268 2165 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 17 00:48:43.324511 kubelet[2165]: E0517 00:48:43.324463 2165 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 17 00:48:43.324511 kubelet[2165]: I0517 00:48:43.324510 2165 server.go:1423] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 17 00:48:43.327572 kubelet[2165]: I0517 00:48:43.327550 2165 server.go:782] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 17 00:48:43.329455 kubelet[2165]: I0517 00:48:43.329411 2165 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 17 00:48:43.329630 kubelet[2165]: I0517 00:48:43.329460 2165 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510.3.7-n-4234abe502","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"MemoryManagerPolicy":"None","MemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 17 00:48:43.329732 kubelet[2165]: I0517 00:48:43.329640 2165 topology_manager.go:138] "Creating topology manager with none policy" May 17 00:48:43.329732 kubelet[2165]: I0517 00:48:43.329649 2165 container_manager_linux.go:303] "Creating device plugin manager" May 17 00:48:43.329800 kubelet[2165]: I0517 00:48:43.329780 2165 state_mem.go:36] "Initialized new in-memory state store" May 17 00:48:43.333009 kubelet[2165]: I0517 00:48:43.332985 2165 kubelet.go:480] "Attempting to sync node with API server" May 17 00:48:43.333059 kubelet[2165]: I0517 00:48:43.333014 2165 kubelet.go:375] "Adding static pod path" path="/etc/kubernetes/manifests" May 17 00:48:43.333111 kubelet[2165]: I0517 00:48:43.333096 2165 kubelet.go:386] "Adding apiserver pod source" May 17 00:48:43.337026 kubelet[2165]: E0517 00:48:43.336992 2165 reflector.go:200] "Failed to watch" err="failed to list *v1.Node: Get \"https://10.200.20.34:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.7-n-4234abe502&limit=500&resourceVersion=0\": dial tcp 10.200.20.34:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Node" May 17 00:48:43.338183 kubelet[2165]: I0517 00:48:43.338165 2165 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 17 00:48:43.339105 kubelet[2165]: E0517 00:48:43.339080 2165 reflector.go:200] "Failed to watch" err="failed to list *v1.Service: Get \"https://10.200.20.34:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.200.20.34:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Service" May 17 00:48:43.339394 kubelet[2165]: I0517 00:48:43.339377 2165 kuberuntime_manager.go:279] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 17 00:48:43.340013 kubelet[2165]: I0517 00:48:43.339993 2165 kubelet.go:935] "Not starting ClusterTrustBundle informer because we are in static kubelet mode or the ClusterTrustBundleProjection featuregate is disabled" May 17 00:48:43.340143 kubelet[2165]: W0517 00:48:43.340132 2165 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 17 00:48:43.348796 kubelet[2165]: I0517 00:48:43.348775 2165 watchdog_linux.go:99] "Systemd watchdog is not enabled" May 17 00:48:43.348957 kubelet[2165]: I0517 00:48:43.348945 2165 server.go:1289] "Started kubelet" May 17 00:48:43.350000 audit[2165]: AVC avc: denied { mac_admin } for pid=2165 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.350000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:48:43.350000 audit[2165]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000a0a300 a1=400090ba28 a2=4000a0a2d0 a3=25 items=0 ppid=1 pid=2165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:43.350000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:48:43.351302 kubelet[2165]: I0517 00:48:43.351262 2165 kubelet.go:1552] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" May 17 00:48:43.351000 audit[2165]: AVC avc: denied { mac_admin } for pid=2165 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.351000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:48:43.351000 audit[2165]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40008cbb80 a1=400090ba40 a2=4000a0a390 a3=25 items=0 ppid=1 pid=2165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:43.351000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:48:43.351641 kubelet[2165]: I0517 00:48:43.351621 2165 kubelet.go:1556] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" May 17 00:48:43.351843 kubelet[2165]: I0517 00:48:43.351830 2165 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 17 00:48:43.352042 kubelet[2165]: I0517 00:48:43.351976 2165 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 17 00:48:43.352328 kubelet[2165]: I0517 00:48:43.352298 2165 server.go:255] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 17 00:48:43.352383 kubelet[2165]: I0517 00:48:43.352360 2165 server.go:180] "Starting to listen" address="0.0.0.0" port=10250 May 17 00:48:43.353140 kubelet[2165]: I0517 00:48:43.353100 2165 server.go:317] "Adding debug handlers to kubelet server" May 17 00:48:43.356000 audit[2181]: NETFILTER_CFG table=mangle:29 family=2 entries=2 op=nft_register_chain pid=2181 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:43.356000 audit[2181]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=fffffd6a7170 a2=0 a3=1 items=0 ppid=2165 pid=2181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:43.356000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 17 00:48:43.358000 audit[2182]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=2182 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:43.358000 audit[2182]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe65ae810 a2=0 a3=1 items=0 ppid=2165 pid=2182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:43.358000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 17 00:48:43.359132 kubelet[2165]: I0517 00:48:43.359087 2165 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 17 00:48:43.359927 kubelet[2165]: I0517 00:48:43.359909 2165 volume_manager.go:297] "Starting Kubelet Volume Manager" May 17 00:48:43.360304 kubelet[2165]: E0517 00:48:43.360282 2165 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-4234abe502\" not found" May 17 00:48:43.361377 kubelet[2165]: E0517 00:48:43.361332 2165 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.34:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.7-n-4234abe502?timeout=10s\": dial tcp 10.200.20.34:6443: connect: connection refused" interval="200ms" May 17 00:48:43.361000 audit[2184]: NETFILTER_CFG table=filter:31 family=2 entries=2 op=nft_register_chain pid=2184 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:43.361000 audit[2184]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffdc5b9a80 a2=0 a3=1 items=0 ppid=2165 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:43.361000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:48:43.362325 kubelet[2165]: E0517 00:48:43.361432 2165 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.200.20.34:6443/api/v1/namespaces/default/events\": dial tcp 10.200.20.34:6443: connect: connection refused" event="&Event{ObjectMeta:{ci-3510.3.7-n-4234abe502.18402a14977b8b6d default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510.3.7-n-4234abe502,UID:ci-3510.3.7-n-4234abe502,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510.3.7-n-4234abe502,},FirstTimestamp:2025-05-17 00:48:43.348921197 +0000 UTC m=+0.569759278,LastTimestamp:2025-05-17 00:48:43.348921197 +0000 UTC m=+0.569759278,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510.3.7-n-4234abe502,}" May 17 00:48:43.362559 kubelet[2165]: I0517 00:48:43.362529 2165 factory.go:223] Registration of the systemd container factory successfully May 17 00:48:43.362624 kubelet[2165]: I0517 00:48:43.362611 2165 factory.go:221] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 17 00:48:43.363327 kubelet[2165]: E0517 00:48:43.363297 2165 kubelet.go:1600] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 17 00:48:43.363965 kubelet[2165]: I0517 00:48:43.363942 2165 desired_state_of_world_populator.go:150] "Desired state populator starts to run" May 17 00:48:43.364856 kubelet[2165]: I0517 00:48:43.364457 2165 reconciler.go:26] "Reconciler: start to sync state" May 17 00:48:43.365119 kubelet[2165]: I0517 00:48:43.365089 2165 factory.go:223] Registration of the containerd container factory successfully May 17 00:48:43.365000 audit[2186]: NETFILTER_CFG table=filter:32 family=2 entries=2 op=nft_register_chain pid=2186 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:43.365000 audit[2186]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=fffff082d870 a2=0 a3=1 items=0 ppid=2165 pid=2186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:43.365000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:48:43.385282 kubelet[2165]: E0517 00:48:43.385229 2165 reflector.go:200] "Failed to watch" err="failed to list *v1.CSIDriver: Get \"https://10.200.20.34:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.200.20.34:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.CSIDriver" May 17 00:48:43.460801 kubelet[2165]: E0517 00:48:43.460773 2165 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-4234abe502\" not found" May 17 00:48:43.563007 kubelet[2165]: E0517 00:48:43.561111 2165 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-4234abe502\" not found" May 17 00:48:43.563571 kubelet[2165]: E0517 00:48:43.563535 2165 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.34:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.7-n-4234abe502?timeout=10s\": dial tcp 10.200.20.34:6443: connect: connection refused" interval="400ms" May 17 00:48:43.662030 kubelet[2165]: E0517 00:48:43.662003 2165 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-4234abe502\" not found" May 17 00:48:43.762797 kubelet[2165]: E0517 00:48:43.762759 2165 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-4234abe502\" not found" May 17 00:48:43.864032 kubelet[2165]: E0517 00:48:43.863660 2165 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-4234abe502\" not found" May 17 00:48:43.964518 kubelet[2165]: E0517 00:48:43.964494 2165 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-4234abe502\" not found" May 17 00:48:43.964645 kubelet[2165]: E0517 00:48:43.964542 2165 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.34:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.7-n-4234abe502?timeout=10s\": dial tcp 10.200.20.34:6443: connect: connection refused" interval="800ms" May 17 00:48:44.065226 kubelet[2165]: E0517 00:48:44.065194 2165 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-4234abe502\" not found" May 17 00:48:46.530546 kubelet[2165]: E0517 00:48:44.165731 2165 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-4234abe502\" not found" May 17 00:48:46.530546 kubelet[2165]: E0517 00:48:44.266363 2165 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-4234abe502\" not found" May 17 00:48:46.530546 kubelet[2165]: E0517 00:48:44.267817 2165 reflector.go:200] "Failed to watch" err="failed to list *v1.CSIDriver: Get \"https://10.200.20.34:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.200.20.34:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.CSIDriver" May 17 00:48:46.530546 kubelet[2165]: E0517 00:48:44.367429 2165 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-4234abe502\" not found" May 17 00:48:46.530546 kubelet[2165]: E0517 00:48:44.468106 2165 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-4234abe502\" not found" May 17 00:48:46.530546 kubelet[2165]: E0517 00:48:44.568813 2165 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-4234abe502\" not found" May 17 00:48:46.530546 kubelet[2165]: E0517 00:48:44.580459 2165 reflector.go:200] "Failed to watch" err="failed to list *v1.Service: Get \"https://10.200.20.34:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.200.20.34:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Service" May 17 00:48:46.530546 kubelet[2165]: E0517 00:48:44.599030 2165 reflector.go:200] "Failed to watch" err="failed to list *v1.Node: Get \"https://10.200.20.34:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.7-n-4234abe502&limit=500&resourceVersion=0\": dial tcp 10.200.20.34:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Node" May 17 00:48:46.530546 kubelet[2165]: E0517 00:48:44.669669 2165 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-4234abe502\" not found" May 17 00:48:46.530964 kubelet[2165]: E0517 00:48:44.765520 2165 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.34:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.7-n-4234abe502?timeout=10s\": dial tcp 10.200.20.34:6443: connect: connection refused" interval="1.6s" May 17 00:48:46.530964 kubelet[2165]: E0517 00:48:44.770687 2165 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-4234abe502\" not found" May 17 00:48:46.530964 kubelet[2165]: E0517 00:48:44.871747 2165 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-4234abe502\" not found" May 17 00:48:46.530964 kubelet[2165]: E0517 00:48:44.972381 2165 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-4234abe502\" not found" May 17 00:48:46.530964 kubelet[2165]: E0517 00:48:45.073019 2165 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-4234abe502\" not found" May 17 00:48:46.530964 kubelet[2165]: E0517 00:48:45.173665 2165 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-4234abe502\" not found" May 17 00:48:46.530964 kubelet[2165]: E0517 00:48:45.274318 2165 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-4234abe502\" not found" May 17 00:48:46.530964 kubelet[2165]: E0517 00:48:45.375126 2165 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-4234abe502\" not found" May 17 00:48:46.530964 kubelet[2165]: E0517 00:48:45.378430 2165 certificate_manager.go:596] "Failed while requesting a signed certificate from the control plane" err="cannot create certificate signing request: Post \"https://10.200.20.34:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.200.20.34:6443: connect: connection refused" logger="kubernetes.io/kube-apiserver-client-kubelet.UnhandledError" May 17 00:48:46.530964 kubelet[2165]: E0517 00:48:45.476025 2165 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-4234abe502\" not found" May 17 00:48:46.531163 kubelet[2165]: E0517 00:48:45.576716 2165 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-4234abe502\" not found" May 17 00:48:46.531163 kubelet[2165]: E0517 00:48:45.677408 2165 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-4234abe502\" not found" May 17 00:48:46.531163 kubelet[2165]: E0517 00:48:45.778040 2165 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-4234abe502\" not found" May 17 00:48:46.531163 kubelet[2165]: E0517 00:48:45.878998 2165 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-4234abe502\" not found" May 17 00:48:46.531163 kubelet[2165]: E0517 00:48:45.904576 2165 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.200.20.34:6443/api/v1/namespaces/default/events\": dial tcp 10.200.20.34:6443: connect: connection refused" event="&Event{ObjectMeta:{ci-3510.3.7-n-4234abe502.18402a14977b8b6d default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510.3.7-n-4234abe502,UID:ci-3510.3.7-n-4234abe502,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510.3.7-n-4234abe502,},FirstTimestamp:2025-05-17 00:48:43.348921197 +0000 UTC m=+0.569759278,LastTimestamp:2025-05-17 00:48:43.348921197 +0000 UTC m=+0.569759278,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510.3.7-n-4234abe502,}" May 17 00:48:46.531163 kubelet[2165]: E0517 00:48:45.980017 2165 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-4234abe502\" not found" May 17 00:48:46.531163 kubelet[2165]: E0517 00:48:46.080681 2165 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-4234abe502\" not found" May 17 00:48:46.531163 kubelet[2165]: E0517 00:48:46.181364 2165 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-4234abe502\" not found" May 17 00:48:46.531395 kubelet[2165]: E0517 00:48:46.282028 2165 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-4234abe502\" not found" May 17 00:48:46.531395 kubelet[2165]: E0517 00:48:46.366687 2165 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.34:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.7-n-4234abe502?timeout=10s\": dial tcp 10.200.20.34:6443: connect: connection refused" interval="3.2s" May 17 00:48:46.531395 kubelet[2165]: E0517 00:48:46.382768 2165 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-4234abe502\" not found" May 17 00:48:46.531395 kubelet[2165]: E0517 00:48:46.483443 2165 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-4234abe502\" not found" May 17 00:48:46.584134 kubelet[2165]: E0517 00:48:46.584094 2165 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-4234abe502\" not found" May 17 00:48:46.632060 kubelet[2165]: I0517 00:48:46.632038 2165 cpu_manager.go:221] "Starting CPU manager" policy="none" May 17 00:48:46.632210 kubelet[2165]: I0517 00:48:46.632198 2165 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" May 17 00:48:46.632318 kubelet[2165]: I0517 00:48:46.632308 2165 state_mem.go:36] "Initialized new in-memory state store" May 17 00:48:46.685049 kubelet[2165]: E0517 00:48:46.685012 2165 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-4234abe502\" not found" May 17 00:48:46.726000 audit[2193]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2193 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:46.801195 kernel: kauditd_printk_skb: 394 callbacks suppressed May 17 00:48:46.801372 kernel: audit: type=1325 audit(1747442926.726:354): table=filter:33 family=2 entries=1 op=nft_register_rule pid=2193 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:46.801405 kernel: audit: type=1300 audit(1747442926.726:354): arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffd589e1c0 a2=0 a3=1 items=0 ppid=2165 pid=2193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:46.801433 kernel: audit: type=1327 audit(1747442926.726:354): proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 17 00:48:46.801471 kernel: audit: type=1325 audit(1747442926.726:355): table=mangle:34 family=10 entries=2 op=nft_register_chain pid=2194 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:48:46.726000 audit[2193]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffd589e1c0 a2=0 a3=1 items=0 ppid=2165 pid=2193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:46.726000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 17 00:48:46.726000 audit[2194]: NETFILTER_CFG table=mangle:34 family=10 entries=2 op=nft_register_chain pid=2194 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:48:46.801704 kubelet[2165]: I0517 00:48:46.728534 2165 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv4" May 17 00:48:46.801704 kubelet[2165]: I0517 00:48:46.729732 2165 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv6" May 17 00:48:46.801704 kubelet[2165]: I0517 00:48:46.729750 2165 status_manager.go:230] "Starting to sync pod status with apiserver" May 17 00:48:46.801704 kubelet[2165]: I0517 00:48:46.729772 2165 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." May 17 00:48:46.801704 kubelet[2165]: I0517 00:48:46.729779 2165 kubelet.go:2436] "Starting kubelet main sync loop" May 17 00:48:46.801704 kubelet[2165]: E0517 00:48:46.729817 2165 kubelet.go:2460] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 17 00:48:46.801704 kubelet[2165]: E0517 00:48:46.732349 2165 reflector.go:200] "Failed to watch" err="failed to list *v1.RuntimeClass: Get \"https://10.200.20.34:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.200.20.34:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.RuntimeClass" May 17 00:48:46.801704 kubelet[2165]: E0517 00:48:46.785974 2165 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-4234abe502\" not found" May 17 00:48:46.726000 audit[2194]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffe1f1d670 a2=0 a3=1 items=0 ppid=2165 pid=2194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:46.830033 kubelet[2165]: E0517 00:48:46.830002 2165 kubelet.go:2460] "Skipping pod synchronization" err="container runtime status check may not have completed yet" May 17 00:48:46.843335 kernel: audit: type=1300 audit(1747442926.726:355): arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffe1f1d670 a2=0 a3=1 items=0 ppid=2165 pid=2194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:46.843487 kernel: audit: type=1327 audit(1747442926.726:355): proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 17 00:48:46.726000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 17 00:48:46.726000 audit[2195]: NETFILTER_CFG table=mangle:35 family=2 entries=1 op=nft_register_chain pid=2195 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:46.871341 kernel: audit: type=1325 audit(1747442926.726:356): table=mangle:35 family=2 entries=1 op=nft_register_chain pid=2195 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:46.871545 kubelet[2165]: I0517 00:48:46.871519 2165 policy_none.go:49] "None policy: Start" May 17 00:48:46.726000 audit[2195]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffdc8694c0 a2=0 a3=1 items=0 ppid=2165 pid=2195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:46.871794 kubelet[2165]: I0517 00:48:46.871652 2165 memory_manager.go:186] "Starting memorymanager" policy="None" May 17 00:48:46.871875 kubelet[2165]: I0517 00:48:46.871865 2165 state_mem.go:35] "Initializing new in-memory state store" May 17 00:48:46.886369 kubelet[2165]: E0517 00:48:46.886339 2165 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-4234abe502\" not found" May 17 00:48:46.899309 kernel: audit: type=1300 audit(1747442926.726:356): arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffdc8694c0 a2=0 a3=1 items=0 ppid=2165 pid=2195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:46.726000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 17 00:48:46.914514 kernel: audit: type=1327 audit(1747442926.726:356): proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 17 00:48:46.726000 audit[2196]: NETFILTER_CFG table=mangle:36 family=10 entries=1 op=nft_register_chain pid=2196 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:48:46.928835 kernel: audit: type=1325 audit(1747442926.726:357): table=mangle:36 family=10 entries=1 op=nft_register_chain pid=2196 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:48:46.726000 audit[2196]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc0d73ee0 a2=0 a3=1 items=0 ppid=2165 pid=2196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:46.726000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 17 00:48:46.732000 audit[2197]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2197 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:46.732000 audit[2197]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffff562d50 a2=0 a3=1 items=0 ppid=2165 pid=2197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:46.732000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 17 00:48:46.732000 audit[2198]: NETFILTER_CFG table=nat:38 family=10 entries=2 op=nft_register_chain pid=2198 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:48:46.732000 audit[2198]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffd1ea5670 a2=0 a3=1 items=0 ppid=2165 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:46.732000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 17 00:48:46.732000 audit[2199]: NETFILTER_CFG table=filter:39 family=2 entries=1 op=nft_register_chain pid=2199 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:46.732000 audit[2199]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffadf7600 a2=0 a3=1 items=0 ppid=2165 pid=2199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:46.732000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 17 00:48:46.732000 audit[2200]: NETFILTER_CFG table=filter:40 family=10 entries=2 op=nft_register_chain pid=2200 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:48:46.732000 audit[2200]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffce1aa750 a2=0 a3=1 items=0 ppid=2165 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:46.732000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 17 00:48:46.987279 kubelet[2165]: E0517 00:48:46.987215 2165 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-4234abe502\" not found" May 17 00:48:46.996818 kubelet[2165]: E0517 00:48:46.996789 2165 reflector.go:200] "Failed to watch" err="failed to list *v1.CSIDriver: Get \"https://10.200.20.34:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.200.20.34:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.CSIDriver" May 17 00:48:47.031152 kubelet[2165]: E0517 00:48:47.031124 2165 kubelet.go:2460] "Skipping pod synchronization" err="container runtime status check may not have completed yet" May 17 00:48:47.216084 kubelet[2165]: E0517 00:48:47.087600 2165 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-4234abe502\" not found" May 17 00:48:47.216084 kubelet[2165]: E0517 00:48:47.188089 2165 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-4234abe502\" not found" May 17 00:48:47.216084 kubelet[2165]: E0517 00:48:47.191671 2165 reflector.go:200] "Failed to watch" err="failed to list *v1.Node: Get \"https://10.200.20.34:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.7-n-4234abe502&limit=500&resourceVersion=0\": dial tcp 10.200.20.34:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Node" May 17 00:48:47.288315 kubelet[2165]: E0517 00:48:47.288276 2165 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-4234abe502\" not found" May 17 00:48:47.317908 systemd[1]: Created slice kubepods.slice. May 17 00:48:47.323410 systemd[1]: Created slice kubepods-besteffort.slice. May 17 00:48:47.333670 systemd[1]: Created slice kubepods-burstable.slice. May 17 00:48:47.335357 kubelet[2165]: E0517 00:48:47.335313 2165 manager.go:517] "Failed to read data from checkpoint" err="checkpoint is not found" checkpoint="kubelet_internal_checkpoint" May 17 00:48:47.335475 kubelet[2165]: E0517 00:48:47.335385 2165 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" path="/var/lib/kubelet/device-plugins/" May 17 00:48:47.335545 kubelet[2165]: I0517 00:48:47.335522 2165 eviction_manager.go:189] "Eviction manager: starting control loop" May 17 00:48:47.335588 kubelet[2165]: I0517 00:48:47.335541 2165 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 17 00:48:47.334000 audit[2165]: AVC avc: denied { mac_admin } for pid=2165 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:47.334000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:48:47.334000 audit[2165]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000da3e00 a1=4000dd0858 a2=4000da3dd0 a3=25 items=0 ppid=1 pid=2165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:47.334000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:48:47.336510 kubelet[2165]: I0517 00:48:47.335984 2165 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 17 00:48:47.338313 kubelet[2165]: E0517 00:48:47.338291 2165 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" May 17 00:48:47.338465 kubelet[2165]: E0517 00:48:47.338452 2165 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.7-n-4234abe502\" not found" May 17 00:48:47.437333 kubelet[2165]: I0517 00:48:47.437307 2165 kubelet_node_status.go:75] "Attempting to register node" node="ci-3510.3.7-n-4234abe502" May 17 00:48:47.437807 kubelet[2165]: E0517 00:48:47.437784 2165 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.200.20.34:6443/api/v1/nodes\": dial tcp 10.200.20.34:6443: connect: connection refused" node="ci-3510.3.7-n-4234abe502" May 17 00:48:47.492314 kubelet[2165]: I0517 00:48:47.491528 2165 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/257afa09293e3aad4231d78871e31e99-kubeconfig\") pod \"kube-scheduler-ci-3510.3.7-n-4234abe502\" (UID: \"257afa09293e3aad4231d78871e31e99\") " pod="kube-system/kube-scheduler-ci-3510.3.7-n-4234abe502" May 17 00:48:47.530005 kubelet[2165]: E0517 00:48:47.529968 2165 reflector.go:200] "Failed to watch" err="failed to list *v1.Service: Get \"https://10.200.20.34:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.200.20.34:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Service" May 17 00:48:47.640339 kubelet[2165]: I0517 00:48:47.640312 2165 kubelet_node_status.go:75] "Attempting to register node" node="ci-3510.3.7-n-4234abe502" May 17 00:48:47.641041 kubelet[2165]: E0517 00:48:47.641012 2165 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.200.20.34:6443/api/v1/nodes\": dial tcp 10.200.20.34:6443: connect: connection refused" node="ci-3510.3.7-n-4234abe502" May 17 00:48:48.018156 kubelet[2165]: E0517 00:48:48.018118 2165 reflector.go:200] "Failed to watch" err="failed to list *v1.RuntimeClass: Get \"https://10.200.20.34:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.200.20.34:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.RuntimeClass" May 17 00:48:48.043041 kubelet[2165]: I0517 00:48:48.043014 2165 kubelet_node_status.go:75] "Attempting to register node" node="ci-3510.3.7-n-4234abe502" May 17 00:48:48.043356 kubelet[2165]: E0517 00:48:48.043330 2165 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.200.20.34:6443/api/v1/nodes\": dial tcp 10.200.20.34:6443: connect: connection refused" node="ci-3510.3.7-n-4234abe502" May 17 00:48:49.015676 kubelet[2165]: I0517 00:48:48.844776 2165 kubelet_node_status.go:75] "Attempting to register node" node="ci-3510.3.7-n-4234abe502" May 17 00:48:49.015676 kubelet[2165]: E0517 00:48:48.845153 2165 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.200.20.34:6443/api/v1/nodes\": dial tcp 10.200.20.34:6443: connect: connection refused" node="ci-3510.3.7-n-4234abe502" May 17 00:48:49.028116 systemd[1]: Created slice kubepods-burstable-pod257afa09293e3aad4231d78871e31e99.slice. May 17 00:48:49.035992 kubelet[2165]: E0517 00:48:49.035950 2165 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.7-n-4234abe502\" not found" node="ci-3510.3.7-n-4234abe502" May 17 00:48:49.037274 env[1480]: time="2025-05-17T00:48:49.036980758Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.7-n-4234abe502,Uid:257afa09293e3aad4231d78871e31e99,Namespace:kube-system,Attempt:0,}" May 17 00:48:49.040839 systemd[1]: Created slice kubepods-burstable-podd12526a423431f3356a478e42143892c.slice. May 17 00:48:49.044639 kubelet[2165]: E0517 00:48:49.044277 2165 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.7-n-4234abe502\" not found" node="ci-3510.3.7-n-4234abe502" May 17 00:48:49.044531 systemd[1]: Created slice kubepods-burstable-podbf1e1439cd69155246433fe5749634d7.slice. May 17 00:48:49.046663 kubelet[2165]: E0517 00:48:49.046634 2165 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.7-n-4234abe502\" not found" node="ci-3510.3.7-n-4234abe502" May 17 00:48:49.099497 kubelet[2165]: I0517 00:48:49.099456 2165 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/d12526a423431f3356a478e42143892c-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.7-n-4234abe502\" (UID: \"d12526a423431f3356a478e42143892c\") " pod="kube-system/kube-apiserver-ci-3510.3.7-n-4234abe502" May 17 00:48:49.099641 kubelet[2165]: I0517 00:48:49.099500 2165 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/bf1e1439cd69155246433fe5749634d7-ca-certs\") pod \"kube-controller-manager-ci-3510.3.7-n-4234abe502\" (UID: \"bf1e1439cd69155246433fe5749634d7\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-4234abe502" May 17 00:48:49.099641 kubelet[2165]: I0517 00:48:49.099522 2165 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/bf1e1439cd69155246433fe5749634d7-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.7-n-4234abe502\" (UID: \"bf1e1439cd69155246433fe5749634d7\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-4234abe502" May 17 00:48:49.099641 kubelet[2165]: I0517 00:48:49.099549 2165 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/bf1e1439cd69155246433fe5749634d7-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.7-n-4234abe502\" (UID: \"bf1e1439cd69155246433fe5749634d7\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-4234abe502" May 17 00:48:49.099641 kubelet[2165]: I0517 00:48:49.099564 2165 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/bf1e1439cd69155246433fe5749634d7-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.7-n-4234abe502\" (UID: \"bf1e1439cd69155246433fe5749634d7\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-4234abe502" May 17 00:48:49.099641 kubelet[2165]: I0517 00:48:49.099580 2165 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/d12526a423431f3356a478e42143892c-ca-certs\") pod \"kube-apiserver-ci-3510.3.7-n-4234abe502\" (UID: \"d12526a423431f3356a478e42143892c\") " pod="kube-system/kube-apiserver-ci-3510.3.7-n-4234abe502" May 17 00:48:49.099765 kubelet[2165]: I0517 00:48:49.099594 2165 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/d12526a423431f3356a478e42143892c-k8s-certs\") pod \"kube-apiserver-ci-3510.3.7-n-4234abe502\" (UID: \"d12526a423431f3356a478e42143892c\") " pod="kube-system/kube-apiserver-ci-3510.3.7-n-4234abe502" May 17 00:48:49.099765 kubelet[2165]: I0517 00:48:49.099609 2165 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/bf1e1439cd69155246433fe5749634d7-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.7-n-4234abe502\" (UID: \"bf1e1439cd69155246433fe5749634d7\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-4234abe502" May 17 00:48:49.345966 env[1480]: time="2025-05-17T00:48:49.345123305Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.7-n-4234abe502,Uid:d12526a423431f3356a478e42143892c,Namespace:kube-system,Attempt:0,}" May 17 00:48:49.347855 env[1480]: time="2025-05-17T00:48:49.347820780Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.7-n-4234abe502,Uid:bf1e1439cd69155246433fe5749634d7,Namespace:kube-system,Attempt:0,}" May 17 00:48:49.473805 kubelet[2165]: E0517 00:48:49.473763 2165 certificate_manager.go:596] "Failed while requesting a signed certificate from the control plane" err="cannot create certificate signing request: Post \"https://10.200.20.34:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.200.20.34:6443: connect: connection refused" logger="kubernetes.io/kube-apiserver-client-kubelet.UnhandledError" May 17 00:48:49.568098 kubelet[2165]: E0517 00:48:49.568056 2165 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.34:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.7-n-4234abe502?timeout=10s\": dial tcp 10.200.20.34:6443: connect: connection refused" interval="6.4s" May 17 00:48:50.447388 kubelet[2165]: I0517 00:48:50.447354 2165 kubelet_node_status.go:75] "Attempting to register node" node="ci-3510.3.7-n-4234abe502" May 17 00:48:50.447710 kubelet[2165]: E0517 00:48:50.447659 2165 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.200.20.34:6443/api/v1/nodes\": dial tcp 10.200.20.34:6443: connect: connection refused" node="ci-3510.3.7-n-4234abe502" May 17 00:48:50.632405 kubelet[2165]: E0517 00:48:50.632360 2165 reflector.go:200] "Failed to watch" err="failed to list *v1.CSIDriver: Get \"https://10.200.20.34:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.200.20.34:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.CSIDriver" May 17 00:48:50.781712 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2353251548.mount: Deactivated successfully. May 17 00:48:50.980364 kubelet[2165]: E0517 00:48:50.980318 2165 reflector.go:200] "Failed to watch" err="failed to list *v1.RuntimeClass: Get \"https://10.200.20.34:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.200.20.34:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.RuntimeClass" May 17 00:48:51.121265 env[1480]: time="2025-05-17T00:48:51.121141903Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:51.174796 env[1480]: time="2025-05-17T00:48:51.174746062Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:51.226982 env[1480]: time="2025-05-17T00:48:51.226921464Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:51.275057 env[1480]: time="2025-05-17T00:48:51.275015727Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:51.376501 env[1480]: time="2025-05-17T00:48:51.376384763Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:51.462756 env[1480]: time="2025-05-17T00:48:51.462670309Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:51.524096 env[1480]: time="2025-05-17T00:48:51.524033231Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:51.563437 env[1480]: time="2025-05-17T00:48:51.563391171Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:51.570932 env[1480]: time="2025-05-17T00:48:51.570887872Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:51.637260 env[1480]: time="2025-05-17T00:48:51.637145360Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:51.715777 env[1480]: time="2025-05-17T00:48:51.715729348Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:51.826639 env[1480]: time="2025-05-17T00:48:51.826586370Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:52.226164 env[1480]: time="2025-05-17T00:48:52.226076936Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:48:52.226164 env[1480]: time="2025-05-17T00:48:52.226123420Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:48:52.229272 env[1480]: time="2025-05-17T00:48:52.226134261Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:48:52.229272 env[1480]: time="2025-05-17T00:48:52.226612419Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a490091855618627e0ddc3f85d490452208289413c7ef3ab5318188434f66b3e pid=2209 runtime=io.containerd.runc.v2 May 17 00:48:52.244647 systemd[1]: run-containerd-runc-k8s.io-a490091855618627e0ddc3f85d490452208289413c7ef3ab5318188434f66b3e-runc.rwyN87.mount: Deactivated successfully. May 17 00:48:52.253851 systemd[1]: Started cri-containerd-a490091855618627e0ddc3f85d490452208289413c7ef3ab5318188434f66b3e.scope. May 17 00:48:52.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.280490 kernel: kauditd_printk_skb: 18 callbacks suppressed May 17 00:48:52.280599 kernel: audit: type=1400 audit(1747442932.273:363): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.339609 kernel: audit: type=1400 audit(1747442932.273:364): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.339678 kernel: audit: type=1400 audit(1747442932.273:365): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.357618 kernel: audit: type=1400 audit(1747442932.273:366): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.375163 kernel: audit: type=1400 audit(1747442932.273:367): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.394892 kernel: audit: type=1400 audit(1747442932.273:368): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.414635 kernel: audit: type=1400 audit(1747442932.273:369): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.434117 kernel: audit: type=1400 audit(1747442932.273:370): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.434196 kernel: audit: type=1400 audit(1747442932.273:371): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.434585 env[1480]: time="2025-05-17T00:48:52.434546835Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.7-n-4234abe502,Uid:bf1e1439cd69155246433fe5749634d7,Namespace:kube-system,Attempt:0,} returns sandbox id \"a490091855618627e0ddc3f85d490452208289413c7ef3ab5318188434f66b3e\"" May 17 00:48:52.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.469192 kernel: audit: type=1400 audit(1747442932.273:372): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.273000 audit: BPF prog-id=56 op=LOAD May 17 00:48:52.279000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.279000 audit[2218]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2209 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:52.279000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134393030393138353536313836323765306464633366383564343930 May 17 00:48:52.279000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.279000 audit[2218]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2209 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:52.279000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134393030393138353536313836323765306464633366383564343930 May 17 00:48:52.279000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.279000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.279000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.279000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.279000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.279000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.279000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.279000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.279000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.279000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.279000 audit: BPF prog-id=57 op=LOAD May 17 00:48:52.279000 audit[2218]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2209 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:52.279000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134393030393138353536313836323765306464633366383564343930 May 17 00:48:52.297000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.297000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.297000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.297000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.297000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.297000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.297000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.297000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.297000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.297000 audit: BPF prog-id=58 op=LOAD May 17 00:48:52.297000 audit[2218]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2209 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:52.297000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134393030393138353536313836323765306464633366383564343930 May 17 00:48:52.297000 audit: BPF prog-id=58 op=UNLOAD May 17 00:48:52.297000 audit: BPF prog-id=57 op=UNLOAD May 17 00:48:52.297000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.297000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.297000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.297000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.297000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.297000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.297000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.297000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.297000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.297000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.297000 audit: BPF prog-id=59 op=LOAD May 17 00:48:52.297000 audit[2218]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2209 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:52.297000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134393030393138353536313836323765306464633366383564343930 May 17 00:48:52.478518 env[1480]: time="2025-05-17T00:48:52.478396413Z" level=info msg="CreateContainer within sandbox \"a490091855618627e0ddc3f85d490452208289413c7ef3ab5318188434f66b3e\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" May 17 00:48:52.532486 env[1480]: time="2025-05-17T00:48:52.532402090Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:48:52.532486 env[1480]: time="2025-05-17T00:48:52.532460255Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:48:52.532737 env[1480]: time="2025-05-17T00:48:52.532684553Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:48:52.533003 env[1480]: time="2025-05-17T00:48:52.532948694Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9609250ad0822d33ba8abb6c9a9efcddcdcec9783c478d6910db441813df2cab pid=2251 runtime=io.containerd.runc.v2 May 17 00:48:52.540451 env[1480]: time="2025-05-17T00:48:52.540257564Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:48:52.540451 env[1480]: time="2025-05-17T00:48:52.540307168Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:48:52.540451 env[1480]: time="2025-05-17T00:48:52.540317369Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:48:52.540638 env[1480]: time="2025-05-17T00:48:52.540493263Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/189e26cccef8ba176544bdde6cfec825ceb706338e0efbdca693c1597a945644 pid=2279 runtime=io.containerd.runc.v2 May 17 00:48:52.544857 systemd[1]: Started cri-containerd-9609250ad0822d33ba8abb6c9a9efcddcdcec9783c478d6910db441813df2cab.scope. May 17 00:48:52.562896 systemd[1]: Started cri-containerd-189e26cccef8ba176544bdde6cfec825ceb706338e0efbdca693c1597a945644.scope. May 17 00:48:52.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.564000 audit: BPF prog-id=60 op=LOAD May 17 00:48:52.565000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.565000 audit[2266]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014db38 a2=10 a3=0 items=0 ppid=2251 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:52.565000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936303932353061643038323264333362613861626236633961396566 May 17 00:48:52.565000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.565000 audit[2266]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=2251 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:52.565000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936303932353061643038323264333362613861626236633961396566 May 17 00:48:52.566000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.566000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.566000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.566000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.566000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.566000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.566000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.566000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.566000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.566000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.566000 audit: BPF prog-id=61 op=LOAD May 17 00:48:52.566000 audit[2266]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=2251 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:52.566000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936303932353061643038323264333362613861626236633961396566 May 17 00:48:52.566000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.566000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.566000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.566000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.566000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.566000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.566000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.566000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.566000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.566000 audit: BPF prog-id=62 op=LOAD May 17 00:48:52.566000 audit[2266]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=2251 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:52.566000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936303932353061643038323264333362613861626236633961396566 May 17 00:48:52.567000 audit: BPF prog-id=62 op=UNLOAD May 17 00:48:52.567000 audit: BPF prog-id=61 op=UNLOAD May 17 00:48:52.567000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.567000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.567000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.567000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.567000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.567000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.567000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.567000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.567000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.567000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.567000 audit: BPF prog-id=63 op=LOAD May 17 00:48:52.567000 audit[2266]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=2251 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:52.567000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936303932353061643038323264333362613861626236633961396566 May 17 00:48:52.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.586000 audit: BPF prog-id=64 op=LOAD May 17 00:48:52.587000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.587000 audit[2291]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2279 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:52.587000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138396532366363636566386261313736353434626464653663666563 May 17 00:48:52.587000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.587000 audit[2291]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2279 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:52.587000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138396532366363636566386261313736353434626464653663666563 May 17 00:48:52.587000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.587000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.587000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.587000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.587000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.587000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.587000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.587000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.587000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.587000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.587000 audit: BPF prog-id=65 op=LOAD May 17 00:48:52.587000 audit[2291]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2279 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:52.587000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138396532366363636566386261313736353434626464653663666563 May 17 00:48:52.588000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.588000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.588000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.588000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.588000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.588000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.588000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.588000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.588000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.588000 audit: BPF prog-id=66 op=LOAD May 17 00:48:52.588000 audit[2291]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2279 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:52.588000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138396532366363636566386261313736353434626464653663666563 May 17 00:48:52.589000 audit: BPF prog-id=66 op=UNLOAD May 17 00:48:52.589000 audit: BPF prog-id=65 op=UNLOAD May 17 00:48:52.589000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.589000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.589000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.589000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.589000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.589000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.589000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.589000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.589000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.589000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:52.589000 audit: BPF prog-id=67 op=LOAD May 17 00:48:52.589000 audit[2291]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2279 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:52.589000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138396532366363636566386261313736353434626464653663666563 May 17 00:48:52.594661 env[1480]: time="2025-05-17T00:48:52.594609829Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.7-n-4234abe502,Uid:257afa09293e3aad4231d78871e31e99,Namespace:kube-system,Attempt:0,} returns sandbox id \"9609250ad0822d33ba8abb6c9a9efcddcdcec9783c478d6910db441813df2cab\"" May 17 00:48:52.615035 env[1480]: time="2025-05-17T00:48:52.614988273Z" level=info msg="CreateContainer within sandbox \"9609250ad0822d33ba8abb6c9a9efcddcdcec9783c478d6910db441813df2cab\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" May 17 00:48:52.623787 env[1480]: time="2025-05-17T00:48:52.623737499Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.7-n-4234abe502,Uid:d12526a423431f3356a478e42143892c,Namespace:kube-system,Attempt:0,} returns sandbox id \"189e26cccef8ba176544bdde6cfec825ceb706338e0efbdca693c1597a945644\"" May 17 00:48:52.724588 env[1480]: time="2025-05-17T00:48:52.724539592Z" level=info msg="CreateContainer within sandbox \"189e26cccef8ba176544bdde6cfec825ceb706338e0efbdca693c1597a945644\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" May 17 00:48:53.022635 env[1480]: time="2025-05-17T00:48:53.022580676Z" level=info msg="CreateContainer within sandbox \"a490091855618627e0ddc3f85d490452208289413c7ef3ab5318188434f66b3e\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"b6902441eae0d160f4220a0b0bd78655de50d5af784b115b6e360d285b1d6194\"" May 17 00:48:53.023496 env[1480]: time="2025-05-17T00:48:53.023469546Z" level=info msg="StartContainer for \"b6902441eae0d160f4220a0b0bd78655de50d5af784b115b6e360d285b1d6194\"" May 17 00:48:53.040052 systemd[1]: Started cri-containerd-b6902441eae0d160f4220a0b0bd78655de50d5af784b115b6e360d285b1d6194.scope. May 17 00:48:53.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.054000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.054000 audit: BPF prog-id=68 op=LOAD May 17 00:48:53.054000 audit[2341]: AVC avc: denied { bpf } for pid=2341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.054000 audit[2341]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2209 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:53.054000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236393032343431656165306431363066343232306130623062643738 May 17 00:48:53.054000 audit[2341]: AVC avc: denied { perfmon } for pid=2341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.054000 audit[2341]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2209 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:53.054000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236393032343431656165306431363066343232306130623062643738 May 17 00:48:53.054000 audit[2341]: AVC avc: denied { bpf } for pid=2341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.054000 audit[2341]: AVC avc: denied { bpf } for pid=2341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.054000 audit[2341]: AVC avc: denied { bpf } for pid=2341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.054000 audit[2341]: AVC avc: denied { perfmon } for pid=2341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.054000 audit[2341]: AVC avc: denied { perfmon } for pid=2341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.054000 audit[2341]: AVC avc: denied { perfmon } for pid=2341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.054000 audit[2341]: AVC avc: denied { perfmon } for pid=2341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.054000 audit[2341]: AVC avc: denied { perfmon } for pid=2341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.054000 audit[2341]: AVC avc: denied { bpf } for pid=2341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.054000 audit[2341]: AVC avc: denied { bpf } for pid=2341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.054000 audit: BPF prog-id=69 op=LOAD May 17 00:48:53.054000 audit[2341]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2209 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:53.054000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236393032343431656165306431363066343232306130623062643738 May 17 00:48:53.054000 audit[2341]: AVC avc: denied { bpf } for pid=2341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.054000 audit[2341]: AVC avc: denied { bpf } for pid=2341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.054000 audit[2341]: AVC avc: denied { perfmon } for pid=2341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.054000 audit[2341]: AVC avc: denied { perfmon } for pid=2341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.054000 audit[2341]: AVC avc: denied { perfmon } for pid=2341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.054000 audit[2341]: AVC avc: denied { perfmon } for pid=2341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.054000 audit[2341]: AVC avc: denied { perfmon } for pid=2341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.054000 audit[2341]: AVC avc: denied { bpf } for pid=2341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.054000 audit[2341]: AVC avc: denied { bpf } for pid=2341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.054000 audit: BPF prog-id=70 op=LOAD May 17 00:48:53.054000 audit[2341]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2209 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:53.054000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236393032343431656165306431363066343232306130623062643738 May 17 00:48:53.054000 audit: BPF prog-id=70 op=UNLOAD May 17 00:48:53.054000 audit: BPF prog-id=69 op=UNLOAD May 17 00:48:53.054000 audit[2341]: AVC avc: denied { bpf } for pid=2341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.054000 audit[2341]: AVC avc: denied { bpf } for pid=2341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.054000 audit[2341]: AVC avc: denied { bpf } for pid=2341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.054000 audit[2341]: AVC avc: denied { perfmon } for pid=2341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.054000 audit[2341]: AVC avc: denied { perfmon } for pid=2341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.054000 audit[2341]: AVC avc: denied { perfmon } for pid=2341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.054000 audit[2341]: AVC avc: denied { perfmon } for pid=2341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.054000 audit[2341]: AVC avc: denied { perfmon } for pid=2341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.054000 audit[2341]: AVC avc: denied { bpf } for pid=2341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.054000 audit[2341]: AVC avc: denied { bpf } for pid=2341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.054000 audit: BPF prog-id=71 op=LOAD May 17 00:48:53.054000 audit[2341]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2209 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:53.054000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236393032343431656165306431363066343232306130623062643738 May 17 00:48:53.116502 kubelet[2165]: E0517 00:48:53.116437 2165 reflector.go:200] "Failed to watch" err="failed to list *v1.Service: Get \"https://10.200.20.34:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.200.20.34:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Service" May 17 00:48:53.122870 env[1480]: time="2025-05-17T00:48:53.122814235Z" level=info msg="StartContainer for \"b6902441eae0d160f4220a0b0bd78655de50d5af784b115b6e360d285b1d6194\" returns successfully" May 17 00:48:53.273253 kubelet[2165]: E0517 00:48:53.273126 2165 reflector.go:200] "Failed to watch" err="failed to list *v1.Node: Get \"https://10.200.20.34:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.7-n-4234abe502&limit=500&resourceVersion=0\": dial tcp 10.200.20.34:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Node" May 17 00:48:53.470119 env[1480]: time="2025-05-17T00:48:53.470055210Z" level=info msg="CreateContainer within sandbox \"9609250ad0822d33ba8abb6c9a9efcddcdcec9783c478d6910db441813df2cab\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"f7eabe543d4369d1c2bb21dbbaf486e94a132ac7ed0e84c2ffb1a24687dd9d3c\"" May 17 00:48:53.470698 env[1480]: time="2025-05-17T00:48:53.470668738Z" level=info msg="StartContainer for \"f7eabe543d4369d1c2bb21dbbaf486e94a132ac7ed0e84c2ffb1a24687dd9d3c\"" May 17 00:48:53.491393 systemd[1]: run-containerd-runc-k8s.io-f7eabe543d4369d1c2bb21dbbaf486e94a132ac7ed0e84c2ffb1a24687dd9d3c-runc.UZhZNL.mount: Deactivated successfully. May 17 00:48:53.500330 systemd[1]: Started cri-containerd-f7eabe543d4369d1c2bb21dbbaf486e94a132ac7ed0e84c2ffb1a24687dd9d3c.scope. May 17 00:48:53.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.513000 audit: BPF prog-id=72 op=LOAD May 17 00:48:53.514000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.514000 audit[2376]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=2251 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:53.514000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637656162653534336434333639643163326262323164626261663438 May 17 00:48:53.514000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.514000 audit[2376]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2251 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:53.514000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637656162653534336434333639643163326262323164626261663438 May 17 00:48:53.514000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.514000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.514000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.514000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.514000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.514000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.514000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.514000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.514000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.514000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.514000 audit: BPF prog-id=73 op=LOAD May 17 00:48:53.514000 audit[2376]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2251 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:53.514000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637656162653534336434333639643163326262323164626261663438 May 17 00:48:53.515000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.515000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.515000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.515000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.515000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.515000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.515000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.515000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.515000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.515000 audit: BPF prog-id=74 op=LOAD May 17 00:48:53.515000 audit[2376]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2251 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:53.515000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637656162653534336434333639643163326262323164626261663438 May 17 00:48:53.515000 audit: BPF prog-id=74 op=UNLOAD May 17 00:48:53.515000 audit: BPF prog-id=73 op=UNLOAD May 17 00:48:53.515000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.515000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.515000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.515000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.515000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.515000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.515000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.515000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.515000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.515000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.515000 audit: BPF prog-id=75 op=LOAD May 17 00:48:53.515000 audit[2376]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2251 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:53.515000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637656162653534336434333639643163326262323164626261663438 May 17 00:48:53.517512 env[1480]: time="2025-05-17T00:48:53.517471017Z" level=info msg="CreateContainer within sandbox \"189e26cccef8ba176544bdde6cfec825ceb706338e0efbdca693c1597a945644\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"ce923e1f42e2a61da113721ef74db7a96b7753f0d49b6eac5b5d28818f2ec9ec\"" May 17 00:48:53.518274 env[1480]: time="2025-05-17T00:48:53.518217515Z" level=info msg="StartContainer for \"ce923e1f42e2a61da113721ef74db7a96b7753f0d49b6eac5b5d28818f2ec9ec\"" May 17 00:48:53.547926 systemd[1]: Started cri-containerd-ce923e1f42e2a61da113721ef74db7a96b7753f0d49b6eac5b5d28818f2ec9ec.scope. May 17 00:48:53.573225 env[1480]: time="2025-05-17T00:48:53.573160154Z" level=info msg="StartContainer for \"f7eabe543d4369d1c2bb21dbbaf486e94a132ac7ed0e84c2ffb1a24687dd9d3c\" returns successfully" May 17 00:48:53.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.585000 audit: BPF prog-id=76 op=LOAD May 17 00:48:53.586000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.586000 audit[2401]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2279 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:53.586000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365393233653166343265326136316461313133373231656637346462 May 17 00:48:53.586000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.586000 audit[2401]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2279 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:53.586000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365393233653166343265326136316461313133373231656637346462 May 17 00:48:53.586000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.586000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.586000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.586000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.586000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.586000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.586000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.586000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.586000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.586000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.586000 audit: BPF prog-id=77 op=LOAD May 17 00:48:53.586000 audit[2401]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2279 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:53.586000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365393233653166343265326136316461313133373231656637346462 May 17 00:48:53.586000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.586000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.586000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.586000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.586000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.586000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.586000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.586000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.586000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.586000 audit: BPF prog-id=78 op=LOAD May 17 00:48:53.586000 audit[2401]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2279 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:53.586000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365393233653166343265326136316461313133373231656637346462 May 17 00:48:53.586000 audit: BPF prog-id=78 op=UNLOAD May 17 00:48:53.586000 audit: BPF prog-id=77 op=UNLOAD May 17 00:48:53.586000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.586000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.586000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.586000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.586000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.586000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.586000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.586000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.586000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.586000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:53.586000 audit: BPF prog-id=79 op=LOAD May 17 00:48:53.586000 audit[2401]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2279 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:53.586000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365393233653166343265326136316461313133373231656637346462 May 17 00:48:53.630989 env[1480]: time="2025-05-17T00:48:53.630939496Z" level=info msg="StartContainer for \"ce923e1f42e2a61da113721ef74db7a96b7753f0d49b6eac5b5d28818f2ec9ec\" returns successfully" May 17 00:48:53.650007 kubelet[2165]: I0517 00:48:53.649596 2165 kubelet_node_status.go:75] "Attempting to register node" node="ci-3510.3.7-n-4234abe502" May 17 00:48:53.650007 kubelet[2165]: E0517 00:48:53.649977 2165 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.200.20.34:6443/api/v1/nodes\": dial tcp 10.200.20.34:6443: connect: connection refused" node="ci-3510.3.7-n-4234abe502" May 17 00:48:53.751915 kubelet[2165]: E0517 00:48:53.751880 2165 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.7-n-4234abe502\" not found" node="ci-3510.3.7-n-4234abe502" May 17 00:48:53.755422 kubelet[2165]: E0517 00:48:53.755386 2165 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.7-n-4234abe502\" not found" node="ci-3510.3.7-n-4234abe502" May 17 00:48:53.760637 kubelet[2165]: E0517 00:48:53.760614 2165 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.7-n-4234abe502\" not found" node="ci-3510.3.7-n-4234abe502" May 17 00:48:54.759908 kubelet[2165]: E0517 00:48:54.759881 2165 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.7-n-4234abe502\" not found" node="ci-3510.3.7-n-4234abe502" May 17 00:48:54.760552 kubelet[2165]: E0517 00:48:54.760533 2165 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.7-n-4234abe502\" not found" node="ci-3510.3.7-n-4234abe502" May 17 00:48:54.760939 kubelet[2165]: E0517 00:48:54.760920 2165 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.7-n-4234abe502\" not found" node="ci-3510.3.7-n-4234abe502" May 17 00:48:54.884000 audit[2352]: AVC avc: denied { watch } for pid=2352 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=522516 scontext=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:48:54.884000 audit[2352]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=40006ce510 a2=fc6 a3=0 items=0 ppid=2209 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 key=(null) May 17 00:48:54.884000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:48:54.884000 audit[2352]: AVC avc: denied { watch } for pid=2352 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=522510 scontext=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:48:54.884000 audit[2352]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=400037c1e0 a2=fc6 a3=0 items=0 ppid=2209 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 key=(null) May 17 00:48:54.884000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:48:55.761557 kubelet[2165]: E0517 00:48:55.761529 2165 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.7-n-4234abe502\" not found" node="ci-3510.3.7-n-4234abe502" May 17 00:48:55.762213 kubelet[2165]: E0517 00:48:55.762193 2165 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.7-n-4234abe502\" not found" node="ci-3510.3.7-n-4234abe502" May 17 00:48:56.102000 audit[2419]: AVC avc: denied { watch } for pid=2419 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=522516 scontext=system_u:system_r:svirt_lxc_net_t:s0:c703,c977 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:48:56.102000 audit[2419]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=40053649c0 a2=fc6 a3=0 items=0 ppid=2279 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c703,c977 key=(null) May 17 00:48:56.102000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3334002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 00:48:56.102000 audit[2419]: AVC avc: denied { watch } for pid=2419 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=522510 scontext=system_u:system_r:svirt_lxc_net_t:s0:c703,c977 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:48:56.102000 audit[2419]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=400946cb60 a2=fc6 a3=0 items=0 ppid=2279 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c703,c977 key=(null) May 17 00:48:56.102000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3334002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 00:48:56.103000 audit[2419]: AVC avc: denied { watch } for pid=2419 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=522512 scontext=system_u:system_r:svirt_lxc_net_t:s0:c703,c977 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:48:56.103000 audit[2419]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=4005364ae0 a2=fc6 a3=0 items=0 ppid=2279 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c703,c977 key=(null) May 17 00:48:56.103000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3334002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 00:48:56.105000 audit[2419]: AVC avc: denied { watch } for pid=2419 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=522518 scontext=system_u:system_r:svirt_lxc_net_t:s0:c703,c977 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:48:56.105000 audit[2419]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=49 a1=4006790a80 a2=fc6 a3=0 items=0 ppid=2279 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c703,c977 key=(null) May 17 00:48:56.105000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3334002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 00:48:56.107000 audit[2419]: AVC avc: denied { watch } for pid=2419 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=522510 scontext=system_u:system_r:svirt_lxc_net_t:s0:c703,c977 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:48:56.107000 audit[2419]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4c a1=4003695220 a2=fc6 a3=0 items=0 ppid=2279 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c703,c977 key=(null) May 17 00:48:56.107000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3334002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 00:48:56.108000 audit[2419]: AVC avc: denied { watch } for pid=2419 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=522516 scontext=system_u:system_r:svirt_lxc_net_t:s0:c703,c977 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:48:56.108000 audit[2419]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4c a1=4006790fc0 a2=fc6 a3=0 items=0 ppid=2279 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c703,c977 key=(null) May 17 00:48:56.108000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3334002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 00:48:56.301827 kubelet[2165]: E0517 00:48:56.301793 2165 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510.3.7-n-4234abe502\" not found" node="ci-3510.3.7-n-4234abe502" May 17 00:48:56.318223 kubelet[2165]: E0517 00:48:56.318110 2165 event.go:359] "Server rejected event (will not retry!)" err="namespaces \"default\" not found" event="&Event{ObjectMeta:{ci-3510.3.7-n-4234abe502.18402a14977b8b6d default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510.3.7-n-4234abe502,UID:ci-3510.3.7-n-4234abe502,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510.3.7-n-4234abe502,},FirstTimestamp:2025-05-17 00:48:43.348921197 +0000 UTC m=+0.569759278,LastTimestamp:2025-05-17 00:48:43.348921197 +0000 UTC m=+0.569759278,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510.3.7-n-4234abe502,}" May 17 00:48:56.682462 kubelet[2165]: E0517 00:48:56.682419 2165 csi_plugin.go:397] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "ci-3510.3.7-n-4234abe502" not found May 17 00:48:57.051121 kubelet[2165]: E0517 00:48:57.051010 2165 csi_plugin.go:397] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "ci-3510.3.7-n-4234abe502" not found May 17 00:48:57.338942 kubelet[2165]: E0517 00:48:57.338822 2165 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.7-n-4234abe502\" not found" May 17 00:48:57.505897 kubelet[2165]: E0517 00:48:57.505865 2165 csi_plugin.go:397] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "ci-3510.3.7-n-4234abe502" not found May 17 00:48:57.560115 kubelet[2165]: E0517 00:48:57.560082 2165 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.7-n-4234abe502\" not found" node="ci-3510.3.7-n-4234abe502" May 17 00:48:58.441486 kubelet[2165]: E0517 00:48:58.441456 2165 csi_plugin.go:397] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "ci-3510.3.7-n-4234abe502" not found May 17 00:48:58.453183 kubelet[2165]: E0517 00:48:58.453157 2165 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.7-n-4234abe502\" not found" node="ci-3510.3.7-n-4234abe502" May 17 00:49:00.051826 kubelet[2165]: I0517 00:49:00.051799 2165 kubelet_node_status.go:75] "Attempting to register node" node="ci-3510.3.7-n-4234abe502" May 17 00:49:00.058909 kubelet[2165]: I0517 00:49:00.058874 2165 kubelet_node_status.go:78] "Successfully registered node" node="ci-3510.3.7-n-4234abe502" May 17 00:49:00.061158 kubelet[2165]: I0517 00:49:00.061125 2165 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-ci-3510.3.7-n-4234abe502" May 17 00:49:00.074844 kubelet[2165]: I0517 00:49:00.074790 2165 warnings.go:110] "Warning: metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots]" May 17 00:49:00.075788 kubelet[2165]: I0517 00:49:00.075755 2165 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-ci-3510.3.7-n-4234abe502" May 17 00:49:00.084547 kubelet[2165]: I0517 00:49:00.084495 2165 warnings.go:110] "Warning: metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots]" May 17 00:49:00.084839 kubelet[2165]: I0517 00:49:00.084822 2165 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-ci-3510.3.7-n-4234abe502" May 17 00:49:00.093450 kubelet[2165]: I0517 00:49:00.093420 2165 warnings.go:110] "Warning: metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots]" May 17 00:49:00.195000 audit[2352]: AVC avc: denied { watch } for pid=2352 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=522543 scontext=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 17 00:49:00.201574 kernel: kauditd_printk_skb: 356 callbacks suppressed May 17 00:49:00.201712 kernel: audit: type=1400 audit(1747442940.195:479): avc: denied { watch } for pid=2352 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=522543 scontext=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 17 00:49:00.195000 audit[2352]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000598f80 a2=fc6 a3=0 items=0 ppid=2209 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 key=(null) May 17 00:49:00.257406 kernel: audit: type=1300 audit(1747442940.195:479): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000598f80 a2=fc6 a3=0 items=0 ppid=2209 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 key=(null) May 17 00:49:00.195000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:49:00.284209 kernel: audit: type=1327 audit(1747442940.195:479): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:49:00.348836 kubelet[2165]: I0517 00:49:00.348736 2165 apiserver.go:52] "Watching apiserver" May 17 00:49:00.365534 kubelet[2165]: I0517 00:49:00.365505 2165 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" May 17 00:49:00.467412 systemd[1]: Reloading. May 17 00:49:00.550424 /usr/lib/systemd/system-generators/torcx-generator[2474]: time="2025-05-17T00:49:00Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:49:00.550460 /usr/lib/systemd/system-generators/torcx-generator[2474]: time="2025-05-17T00:49:00Z" level=info msg="torcx already run" May 17 00:49:00.621213 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:49:00.621479 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:49:00.637268 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:49:00.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.761832 kernel: audit: type=1400 audit(1747442940.724:480): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.761956 kernel: audit: type=1400 audit(1747442940.724:481): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.781018 kernel: audit: type=1400 audit(1747442940.724:482): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.799489 kernel: audit: type=1400 audit(1747442940.724:483): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.806103 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 17 00:49:00.806211 kernel: audit: type=1400 audit(1747442940.724:484): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.826223 kernel: audit: audit_lost=104 audit_rate_limit=0 audit_backlog_limit=64 May 17 00:49:00.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.744000 audit: BPF prog-id=80 op=LOAD May 17 00:49:00.744000 audit: BPF prog-id=41 op=UNLOAD May 17 00:49:00.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.760000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.760000 audit: BPF prog-id=81 op=LOAD May 17 00:49:00.760000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.760000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.760000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.760000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.760000 audit: BPF prog-id=82 op=LOAD May 17 00:49:00.760000 audit: BPF prog-id=42 op=UNLOAD May 17 00:49:00.760000 audit: BPF prog-id=43 op=UNLOAD May 17 00:49:00.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.762000 audit: BPF prog-id=83 op=LOAD May 17 00:49:00.762000 audit: BPF prog-id=64 op=UNLOAD May 17 00:49:00.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.779000 audit: BPF prog-id=84 op=LOAD May 17 00:49:00.780000 audit: BPF prog-id=44 op=UNLOAD May 17 00:49:00.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.799000 audit: BPF prog-id=85 op=LOAD May 17 00:49:00.830000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.830000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.830000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.830000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.831000 audit: BPF prog-id=86 op=LOAD May 17 00:49:00.831000 audit: BPF prog-id=68 op=UNLOAD May 17 00:49:00.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.831000 audit: BPF prog-id=87 op=LOAD May 17 00:49:00.831000 audit: BPF prog-id=46 op=UNLOAD May 17 00:49:00.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.832000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.832000 audit: BPF prog-id=88 op=LOAD May 17 00:49:00.832000 audit: BPF prog-id=76 op=UNLOAD May 17 00:49:00.832000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.832000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.832000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.832000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.832000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.832000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.832000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.832000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.832000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.832000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.832000 audit: BPF prog-id=89 op=LOAD May 17 00:49:00.832000 audit: BPF prog-id=47 op=UNLOAD May 17 00:49:00.832000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.832000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.832000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.832000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.832000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.832000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.832000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.832000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.832000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.832000 audit: BPF prog-id=90 op=LOAD May 17 00:49:00.832000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.832000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.832000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.832000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.832000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.832000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.832000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.832000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.832000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.832000 audit: BPF prog-id=91 op=LOAD May 17 00:49:00.832000 audit: BPF prog-id=48 op=UNLOAD May 17 00:49:00.832000 audit: BPF prog-id=49 op=UNLOAD May 17 00:49:00.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.833000 audit: BPF prog-id=92 op=LOAD May 17 00:49:00.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.833000 audit: BPF prog-id=93 op=LOAD May 17 00:49:00.833000 audit: BPF prog-id=50 op=UNLOAD May 17 00:49:00.833000 audit: BPF prog-id=51 op=UNLOAD May 17 00:49:00.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.834000 audit: BPF prog-id=94 op=LOAD May 17 00:49:00.834000 audit: BPF prog-id=56 op=UNLOAD May 17 00:49:00.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.834000 audit: BPF prog-id=95 op=LOAD May 17 00:49:00.834000 audit: BPF prog-id=60 op=UNLOAD May 17 00:49:00.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.836000 audit: BPF prog-id=96 op=LOAD May 17 00:49:00.836000 audit: BPF prog-id=52 op=UNLOAD May 17 00:49:00.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.836000 audit: BPF prog-id=97 op=LOAD May 17 00:49:00.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.836000 audit: BPF prog-id=98 op=LOAD May 17 00:49:00.836000 audit: BPF prog-id=53 op=UNLOAD May 17 00:49:00.836000 audit: BPF prog-id=54 op=UNLOAD May 17 00:49:00.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.837000 audit: BPF prog-id=99 op=LOAD May 17 00:49:00.837000 audit: BPF prog-id=55 op=UNLOAD May 17 00:49:00.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:00.837000 audit: BPF prog-id=100 op=LOAD May 17 00:49:00.837000 audit: BPF prog-id=72 op=UNLOAD May 17 00:49:00.861810 systemd[1]: Stopping kubelet.service... May 17 00:49:00.891688 systemd[1]: kubelet.service: Deactivated successfully. May 17 00:49:00.892029 systemd[1]: Stopped kubelet.service. May 17 00:49:00.890000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:00.894996 systemd[1]: Starting kubelet.service... May 17 00:49:00.998756 systemd[1]: Started kubelet.service. May 17 00:49:00.999000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:01.053678 kubelet[2537]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:49:01.054041 kubelet[2537]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. May 17 00:49:01.054091 kubelet[2537]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:49:01.054217 kubelet[2537]: I0517 00:49:01.054191 2537 server.go:212] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 17 00:49:01.060409 kubelet[2537]: I0517 00:49:01.060371 2537 server.go:530] "Kubelet version" kubeletVersion="v1.33.0" May 17 00:49:01.060409 kubelet[2537]: I0517 00:49:01.060402 2537 server.go:532] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 17 00:49:01.060670 kubelet[2537]: I0517 00:49:01.060649 2537 server.go:956] "Client rotation is on, will bootstrap in background" May 17 00:49:01.061903 kubelet[2537]: I0517 00:49:01.061880 2537 certificate_store.go:147] "Loading cert/key pair from a file" filePath="/var/lib/kubelet/pki/kubelet-client-current.pem" May 17 00:49:01.064379 kubelet[2537]: I0517 00:49:01.064347 2537 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 17 00:49:01.081634 kubelet[2537]: E0517 00:49:01.081601 2537 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 17 00:49:01.081807 kubelet[2537]: I0517 00:49:01.081794 2537 server.go:1423] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 17 00:49:01.085191 kubelet[2537]: I0517 00:49:01.085168 2537 server.go:782] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 17 00:49:01.085603 kubelet[2537]: I0517 00:49:01.085575 2537 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 17 00:49:01.085897 kubelet[2537]: I0517 00:49:01.085697 2537 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510.3.7-n-4234abe502","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"MemoryManagerPolicy":"None","MemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 17 00:49:01.086066 kubelet[2537]: I0517 00:49:01.086053 2537 topology_manager.go:138] "Creating topology manager with none policy" May 17 00:49:01.086158 kubelet[2537]: I0517 00:49:01.086149 2537 container_manager_linux.go:303] "Creating device plugin manager" May 17 00:49:01.086315 kubelet[2537]: I0517 00:49:01.086304 2537 state_mem.go:36] "Initialized new in-memory state store" May 17 00:49:01.086590 kubelet[2537]: I0517 00:49:01.086563 2537 kubelet.go:480] "Attempting to sync node with API server" May 17 00:49:01.087132 kubelet[2537]: I0517 00:49:01.087117 2537 kubelet.go:375] "Adding static pod path" path="/etc/kubernetes/manifests" May 17 00:49:01.087284 kubelet[2537]: I0517 00:49:01.087272 2537 kubelet.go:386] "Adding apiserver pod source" May 17 00:49:01.087364 kubelet[2537]: I0517 00:49:01.087354 2537 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 17 00:49:01.100164 kubelet[2537]: I0517 00:49:01.100136 2537 kuberuntime_manager.go:279] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 17 00:49:01.100932 kubelet[2537]: I0517 00:49:01.100914 2537 kubelet.go:935] "Not starting ClusterTrustBundle informer because we are in static kubelet mode or the ClusterTrustBundleProjection featuregate is disabled" May 17 00:49:01.103370 kubelet[2537]: I0517 00:49:01.103350 2537 watchdog_linux.go:99] "Systemd watchdog is not enabled" May 17 00:49:01.103496 kubelet[2537]: I0517 00:49:01.103485 2537 server.go:1289] "Started kubelet" May 17 00:49:01.103000 audit[2537]: AVC avc: denied { mac_admin } for pid=2537 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.103000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:49:01.103000 audit[2537]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000951290 a1=400091de60 a2=4000951260 a3=25 items=0 ppid=1 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:01.103000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:49:01.105580 kubelet[2537]: I0517 00:49:01.105556 2537 kubelet.go:1552] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" May 17 00:49:01.104000 audit[2537]: AVC avc: denied { mac_admin } for pid=2537 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.104000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:49:01.104000 audit[2537]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000571a80 a1=400091de78 a2=4000951320 a3=25 items=0 ppid=1 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:01.104000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:49:01.105848 kubelet[2537]: I0517 00:49:01.105833 2537 kubelet.go:1556] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" May 17 00:49:01.105933 kubelet[2537]: I0517 00:49:01.105924 2537 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 17 00:49:01.118346 kubelet[2537]: I0517 00:49:01.118305 2537 server.go:180] "Starting to listen" address="0.0.0.0" port=10250 May 17 00:49:01.119292 kubelet[2537]: I0517 00:49:01.119258 2537 server.go:317] "Adding debug handlers to kubelet server" May 17 00:49:01.127848 kubelet[2537]: I0517 00:49:01.127788 2537 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 17 00:49:01.128164 kubelet[2537]: I0517 00:49:01.128150 2537 server.go:255] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 17 00:49:01.128477 kubelet[2537]: I0517 00:49:01.128460 2537 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 17 00:49:01.129912 kubelet[2537]: I0517 00:49:01.129892 2537 volume_manager.go:297] "Starting Kubelet Volume Manager" May 17 00:49:01.131089 kubelet[2537]: E0517 00:49:01.130258 2537 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-4234abe502\" not found" May 17 00:49:01.134954 kubelet[2537]: I0517 00:49:01.134927 2537 desired_state_of_world_populator.go:150] "Desired state populator starts to run" May 17 00:49:01.136990 kubelet[2537]: I0517 00:49:01.134995 2537 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv4" May 17 00:49:01.137204 kubelet[2537]: I0517 00:49:01.135648 2537 reconciler.go:26] "Reconciler: start to sync state" May 17 00:49:01.141080 kubelet[2537]: I0517 00:49:01.141049 2537 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv6" May 17 00:49:01.141385 kubelet[2537]: I0517 00:49:01.141373 2537 status_manager.go:230] "Starting to sync pod status with apiserver" May 17 00:49:01.141567 kubelet[2537]: I0517 00:49:01.141556 2537 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." May 17 00:49:01.141650 kubelet[2537]: I0517 00:49:01.141641 2537 kubelet.go:2436] "Starting kubelet main sync loop" May 17 00:49:01.142827 kubelet[2537]: E0517 00:49:01.141730 2537 kubelet.go:2460] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 17 00:49:01.147063 kubelet[2537]: I0517 00:49:01.147029 2537 factory.go:223] Registration of the systemd container factory successfully May 17 00:49:01.147570 kubelet[2537]: I0517 00:49:01.147532 2537 factory.go:221] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 17 00:49:01.152746 kubelet[2537]: E0517 00:49:01.152717 2537 kubelet.go:1600] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 17 00:49:01.160766 kubelet[2537]: I0517 00:49:01.160735 2537 factory.go:223] Registration of the containerd container factory successfully May 17 00:49:01.211873 kubelet[2537]: I0517 00:49:01.211842 2537 cpu_manager.go:221] "Starting CPU manager" policy="none" May 17 00:49:01.211873 kubelet[2537]: I0517 00:49:01.211863 2537 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" May 17 00:49:01.212042 kubelet[2537]: I0517 00:49:01.211887 2537 state_mem.go:36] "Initialized new in-memory state store" May 17 00:49:01.212042 kubelet[2537]: I0517 00:49:01.212023 2537 state_mem.go:88] "Updated default CPUSet" cpuSet="" May 17 00:49:01.212042 kubelet[2537]: I0517 00:49:01.212031 2537 state_mem.go:96] "Updated CPUSet assignments" assignments={} May 17 00:49:01.212109 kubelet[2537]: I0517 00:49:01.212048 2537 policy_none.go:49] "None policy: Start" May 17 00:49:01.212109 kubelet[2537]: I0517 00:49:01.212057 2537 memory_manager.go:186] "Starting memorymanager" policy="None" May 17 00:49:01.212109 kubelet[2537]: I0517 00:49:01.212066 2537 state_mem.go:35] "Initializing new in-memory state store" May 17 00:49:01.212169 kubelet[2537]: I0517 00:49:01.212142 2537 state_mem.go:75] "Updated machine memory state" May 17 00:49:01.215630 kubelet[2537]: E0517 00:49:01.215596 2537 manager.go:517] "Failed to read data from checkpoint" err="checkpoint is not found" checkpoint="kubelet_internal_checkpoint" May 17 00:49:01.214000 audit[2537]: AVC avc: denied { mac_admin } for pid=2537 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.214000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:49:01.214000 audit[2537]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=400070ffb0 a1=4000f61f98 a2=400070ff80 a3=25 items=0 ppid=1 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:01.214000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:49:01.215934 kubelet[2537]: E0517 00:49:01.215680 2537 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" path="/var/lib/kubelet/device-plugins/" May 17 00:49:01.215934 kubelet[2537]: I0517 00:49:01.215832 2537 eviction_manager.go:189] "Eviction manager: starting control loop" May 17 00:49:01.215934 kubelet[2537]: I0517 00:49:01.215842 2537 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 17 00:49:01.216815 kubelet[2537]: I0517 00:49:01.216761 2537 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 17 00:49:01.219193 kubelet[2537]: E0517 00:49:01.218525 2537 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" May 17 00:49:01.243840 kubelet[2537]: I0517 00:49:01.243797 2537 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-ci-3510.3.7-n-4234abe502" May 17 00:49:01.244141 kubelet[2537]: I0517 00:49:01.244113 2537 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-ci-3510.3.7-n-4234abe502" May 17 00:49:01.244666 kubelet[2537]: I0517 00:49:01.244650 2537 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-ci-3510.3.7-n-4234abe502" May 17 00:49:01.260852 kubelet[2537]: I0517 00:49:01.260815 2537 warnings.go:110] "Warning: metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots]" May 17 00:49:01.260852 kubelet[2537]: I0517 00:49:01.260826 2537 warnings.go:110] "Warning: metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots]" May 17 00:49:01.261034 kubelet[2537]: E0517 00:49:01.260884 2537 kubelet.go:3311] "Failed creating a mirror pod" err="pods \"kube-scheduler-ci-3510.3.7-n-4234abe502\" already exists" pod="kube-system/kube-scheduler-ci-3510.3.7-n-4234abe502" May 17 00:49:01.261034 kubelet[2537]: E0517 00:49:01.260954 2537 kubelet.go:3311] "Failed creating a mirror pod" err="pods \"kube-controller-manager-ci-3510.3.7-n-4234abe502\" already exists" pod="kube-system/kube-controller-manager-ci-3510.3.7-n-4234abe502" May 17 00:49:01.261121 kubelet[2537]: I0517 00:49:01.261107 2537 warnings.go:110] "Warning: metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots]" May 17 00:49:01.261223 kubelet[2537]: E0517 00:49:01.261211 2537 kubelet.go:3311] "Failed creating a mirror pod" err="pods \"kube-apiserver-ci-3510.3.7-n-4234abe502\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.7-n-4234abe502" May 17 00:49:01.318041 kubelet[2537]: I0517 00:49:01.318016 2537 kubelet_node_status.go:75] "Attempting to register node" node="ci-3510.3.7-n-4234abe502" May 17 00:49:01.331030 kubelet[2537]: I0517 00:49:01.330990 2537 kubelet_node_status.go:124] "Node was previously registered" node="ci-3510.3.7-n-4234abe502" May 17 00:49:01.331299 kubelet[2537]: I0517 00:49:01.331288 2537 kubelet_node_status.go:78] "Successfully registered node" node="ci-3510.3.7-n-4234abe502" May 17 00:49:01.341483 kubelet[2537]: I0517 00:49:01.341446 2537 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/bf1e1439cd69155246433fe5749634d7-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.7-n-4234abe502\" (UID: \"bf1e1439cd69155246433fe5749634d7\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-4234abe502" May 17 00:49:01.341679 kubelet[2537]: I0517 00:49:01.341662 2537 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/bf1e1439cd69155246433fe5749634d7-ca-certs\") pod \"kube-controller-manager-ci-3510.3.7-n-4234abe502\" (UID: \"bf1e1439cd69155246433fe5749634d7\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-4234abe502" May 17 00:49:01.341763 kubelet[2537]: I0517 00:49:01.341751 2537 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/bf1e1439cd69155246433fe5749634d7-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.7-n-4234abe502\" (UID: \"bf1e1439cd69155246433fe5749634d7\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-4234abe502" May 17 00:49:01.341831 kubelet[2537]: I0517 00:49:01.341820 2537 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/bf1e1439cd69155246433fe5749634d7-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.7-n-4234abe502\" (UID: \"bf1e1439cd69155246433fe5749634d7\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-4234abe502" May 17 00:49:01.341894 kubelet[2537]: I0517 00:49:01.341883 2537 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/bf1e1439cd69155246433fe5749634d7-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.7-n-4234abe502\" (UID: \"bf1e1439cd69155246433fe5749634d7\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-4234abe502" May 17 00:49:01.443145 kubelet[2537]: I0517 00:49:01.443105 2537 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/d12526a423431f3356a478e42143892c-ca-certs\") pod \"kube-apiserver-ci-3510.3.7-n-4234abe502\" (UID: \"d12526a423431f3356a478e42143892c\") " pod="kube-system/kube-apiserver-ci-3510.3.7-n-4234abe502" May 17 00:49:01.443401 kubelet[2537]: I0517 00:49:01.443384 2537 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/d12526a423431f3356a478e42143892c-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.7-n-4234abe502\" (UID: \"d12526a423431f3356a478e42143892c\") " pod="kube-system/kube-apiserver-ci-3510.3.7-n-4234abe502" May 17 00:49:01.443511 kubelet[2537]: I0517 00:49:01.443497 2537 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/257afa09293e3aad4231d78871e31e99-kubeconfig\") pod \"kube-scheduler-ci-3510.3.7-n-4234abe502\" (UID: \"257afa09293e3aad4231d78871e31e99\") " pod="kube-system/kube-scheduler-ci-3510.3.7-n-4234abe502" May 17 00:49:01.443611 kubelet[2537]: I0517 00:49:01.443594 2537 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/d12526a423431f3356a478e42143892c-k8s-certs\") pod \"kube-apiserver-ci-3510.3.7-n-4234abe502\" (UID: \"d12526a423431f3356a478e42143892c\") " pod="kube-system/kube-apiserver-ci-3510.3.7-n-4234abe502" May 17 00:49:02.087890 kubelet[2537]: I0517 00:49:02.087858 2537 apiserver.go:52] "Watching apiserver" May 17 00:49:02.096000 audit[2352]: AVC avc: denied { watch } for pid=2352 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=522510 scontext=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:49:02.096000 audit[2352]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000c729c0 a2=fc6 a3=0 items=0 ppid=2209 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 key=(null) May 17 00:49:02.096000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:49:02.097000 audit[2352]: AVC avc: denied { watch } for pid=2352 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=522510 scontext=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:49:02.097000 audit[2352]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000c72ba0 a2=fc6 a3=0 items=0 ppid=2209 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 key=(null) May 17 00:49:02.097000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:49:02.098000 audit[2352]: AVC avc: denied { watch } for pid=2352 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=522510 scontext=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:49:02.098000 audit[2352]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000c731e0 a2=fc6 a3=0 items=0 ppid=2209 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 key=(null) May 17 00:49:02.098000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:49:02.099000 audit[2352]: AVC avc: denied { watch } for pid=2352 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=522510 scontext=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:49:02.099000 audit[2352]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000d4aa40 a2=fc6 a3=0 items=0 ppid=2209 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 key=(null) May 17 00:49:02.099000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:49:02.137099 kubelet[2537]: I0517 00:49:02.137066 2537 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" May 17 00:49:02.195963 kubelet[2537]: I0517 00:49:02.195936 2537 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-ci-3510.3.7-n-4234abe502" May 17 00:49:02.205861 kubelet[2537]: I0517 00:49:02.205835 2537 warnings.go:110] "Warning: metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots]" May 17 00:49:02.206079 kubelet[2537]: E0517 00:49:02.206062 2537 kubelet.go:3311] "Failed creating a mirror pod" err="pods \"kube-controller-manager-ci-3510.3.7-n-4234abe502\" already exists" pod="kube-system/kube-controller-manager-ci-3510.3.7-n-4234abe502" May 17 00:49:02.218387 kubelet[2537]: I0517 00:49:02.218333 2537 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510.3.7-n-4234abe502" podStartSLOduration=2.218305972 podStartE2EDuration="2.218305972s" podCreationTimestamp="2025-05-17 00:49:00 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:49:02.21779622 +0000 UTC m=+1.209793175" watchObservedRunningTime="2025-05-17 00:49:02.218305972 +0000 UTC m=+1.210302927" May 17 00:49:02.229609 kubelet[2537]: I0517 00:49:02.229547 2537 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510.3.7-n-4234abe502" podStartSLOduration=2.229530555 podStartE2EDuration="2.229530555s" podCreationTimestamp="2025-05-17 00:49:00 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:49:02.229338743 +0000 UTC m=+1.221335698" watchObservedRunningTime="2025-05-17 00:49:02.229530555 +0000 UTC m=+1.221527510" May 17 00:49:02.989680 kubelet[2537]: I0517 00:49:02.989641 2537 kuberuntime_manager.go:1746] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" May 17 00:49:02.990293 env[1480]: time="2025-05-17T00:49:02.990177859Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 17 00:49:02.990761 kubelet[2537]: I0517 00:49:02.990744 2537 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" May 17 00:49:03.115428 kubelet[2537]: I0517 00:49:03.115354 2537 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510.3.7-n-4234abe502" podStartSLOduration=3.115334282 podStartE2EDuration="3.115334282s" podCreationTimestamp="2025-05-17 00:49:00 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:49:02.244073385 +0000 UTC m=+1.236070340" watchObservedRunningTime="2025-05-17 00:49:03.115334282 +0000 UTC m=+2.107331237" May 17 00:49:03.793217 systemd[1]: Created slice kubepods-besteffort-pod74d65111_66ce_460c_a99c_72620d941f86.slice. May 17 00:49:03.859302 kubelet[2537]: I0517 00:49:03.859257 2537 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-n4csh\" (UniqueName: \"kubernetes.io/projected/74d65111-66ce-460c-a99c-72620d941f86-kube-api-access-n4csh\") pod \"kube-proxy-tgb6m\" (UID: \"74d65111-66ce-460c-a99c-72620d941f86\") " pod="kube-system/kube-proxy-tgb6m" May 17 00:49:03.859302 kubelet[2537]: I0517 00:49:03.859308 2537 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/74d65111-66ce-460c-a99c-72620d941f86-kube-proxy\") pod \"kube-proxy-tgb6m\" (UID: \"74d65111-66ce-460c-a99c-72620d941f86\") " pod="kube-system/kube-proxy-tgb6m" May 17 00:49:03.859500 kubelet[2537]: I0517 00:49:03.859327 2537 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/74d65111-66ce-460c-a99c-72620d941f86-xtables-lock\") pod \"kube-proxy-tgb6m\" (UID: \"74d65111-66ce-460c-a99c-72620d941f86\") " pod="kube-system/kube-proxy-tgb6m" May 17 00:49:03.859500 kubelet[2537]: I0517 00:49:03.859343 2537 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/74d65111-66ce-460c-a99c-72620d941f86-lib-modules\") pod \"kube-proxy-tgb6m\" (UID: \"74d65111-66ce-460c-a99c-72620d941f86\") " pod="kube-system/kube-proxy-tgb6m" May 17 00:49:03.974646 kubelet[2537]: E0517 00:49:03.974616 2537 projected.go:289] Couldn't get configMap kube-system/kube-root-ca.crt: configmap "kube-root-ca.crt" not found May 17 00:49:03.974892 kubelet[2537]: E0517 00:49:03.974878 2537 projected.go:194] Error preparing data for projected volume kube-api-access-n4csh for pod kube-system/kube-proxy-tgb6m: configmap "kube-root-ca.crt" not found May 17 00:49:03.975057 kubelet[2537]: E0517 00:49:03.975045 2537 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/74d65111-66ce-460c-a99c-72620d941f86-kube-api-access-n4csh podName:74d65111-66ce-460c-a99c-72620d941f86 nodeName:}" failed. No retries permitted until 2025-05-17 00:49:04.475008327 +0000 UTC m=+3.467005282 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-n4csh" (UniqueName: "kubernetes.io/projected/74d65111-66ce-460c-a99c-72620d941f86-kube-api-access-n4csh") pod "kube-proxy-tgb6m" (UID: "74d65111-66ce-460c-a99c-72620d941f86") : configmap "kube-root-ca.crt" not found May 17 00:49:04.216590 systemd[1]: Created slice kubepods-besteffort-podbacb1c5d_db1a_44b6_97f0_ed672fed9160.slice. May 17 00:49:04.262429 kubelet[2537]: I0517 00:49:04.262383 2537 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-scm6c\" (UniqueName: \"kubernetes.io/projected/bacb1c5d-db1a-44b6-97f0-ed672fed9160-kube-api-access-scm6c\") pod \"tigera-operator-844669ff44-pdpjk\" (UID: \"bacb1c5d-db1a-44b6-97f0-ed672fed9160\") " pod="tigera-operator/tigera-operator-844669ff44-pdpjk" May 17 00:49:04.262767 kubelet[2537]: I0517 00:49:04.262448 2537 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/bacb1c5d-db1a-44b6-97f0-ed672fed9160-var-lib-calico\") pod \"tigera-operator-844669ff44-pdpjk\" (UID: \"bacb1c5d-db1a-44b6-97f0-ed672fed9160\") " pod="tigera-operator/tigera-operator-844669ff44-pdpjk" May 17 00:49:04.370728 kubelet[2537]: I0517 00:49:04.370688 2537 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" May 17 00:49:04.521030 env[1480]: time="2025-05-17T00:49:04.520733229Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-844669ff44-pdpjk,Uid:bacb1c5d-db1a-44b6-97f0-ed672fed9160,Namespace:tigera-operator,Attempt:0,}" May 17 00:49:04.572395 env[1480]: time="2025-05-17T00:49:04.572016888Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:49:04.572395 env[1480]: time="2025-05-17T00:49:04.572051810Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:49:04.572395 env[1480]: time="2025-05-17T00:49:04.572061530Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:49:04.572395 env[1480]: time="2025-05-17T00:49:04.572213539Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b6bb6a6279462d850e7bd60599c9d51e8f30276ed6d4ca81be8c6622f01d780f pid=2592 runtime=io.containerd.runc.v2 May 17 00:49:04.597323 systemd[1]: Started cri-containerd-b6bb6a6279462d850e7bd60599c9d51e8f30276ed6d4ca81be8c6622f01d780f.scope. May 17 00:49:04.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.610000 audit: BPF prog-id=101 op=LOAD May 17 00:49:04.611000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.611000 audit[2603]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=2592 pid=2603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:04.611000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236626236613632373934363264383530653762643630353939633964 May 17 00:49:04.611000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.611000 audit[2603]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=2592 pid=2603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:04.611000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236626236613632373934363264383530653762643630353939633964 May 17 00:49:04.612000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.612000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.612000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.612000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.612000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.612000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.612000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.612000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.612000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.612000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.612000 audit: BPF prog-id=102 op=LOAD May 17 00:49:04.612000 audit[2603]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=2592 pid=2603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:04.612000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236626236613632373934363264383530653762643630353939633964 May 17 00:49:04.612000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.612000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.612000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.612000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.612000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.612000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.612000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.612000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.612000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.612000 audit: BPF prog-id=103 op=LOAD May 17 00:49:04.612000 audit[2603]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=2592 pid=2603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:04.612000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236626236613632373934363264383530653762643630353939633964 May 17 00:49:04.613000 audit: BPF prog-id=103 op=UNLOAD May 17 00:49:04.613000 audit: BPF prog-id=102 op=UNLOAD May 17 00:49:04.613000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.613000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.613000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.613000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.613000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.613000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.613000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.613000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.613000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.613000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.613000 audit: BPF prog-id=104 op=LOAD May 17 00:49:04.613000 audit[2603]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=2592 pid=2603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:04.613000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236626236613632373934363264383530653762643630353939633964 May 17 00:49:04.632729 env[1480]: time="2025-05-17T00:49:04.632662664Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-844669ff44-pdpjk,Uid:bacb1c5d-db1a-44b6-97f0-ed672fed9160,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"b6bb6a6279462d850e7bd60599c9d51e8f30276ed6d4ca81be8c6622f01d780f\"" May 17 00:49:04.635110 env[1480]: time="2025-05-17T00:49:04.634223197Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.0\"" May 17 00:49:04.702463 env[1480]: time="2025-05-17T00:49:04.702418704Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-tgb6m,Uid:74d65111-66ce-460c-a99c-72620d941f86,Namespace:kube-system,Attempt:0,}" May 17 00:49:04.756037 env[1480]: time="2025-05-17T00:49:04.755960057Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:49:04.756276 env[1480]: time="2025-05-17T00:49:04.756007140Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:49:04.756276 env[1480]: time="2025-05-17T00:49:04.756017460Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:49:04.756374 env[1480]: time="2025-05-17T00:49:04.756282396Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5fa09663e309815ae4551ead0127de18da276ee8877bca822e6a8615c215b269 pid=2632 runtime=io.containerd.runc.v2 May 17 00:49:04.765834 systemd[1]: Started cri-containerd-5fa09663e309815ae4551ead0127de18da276ee8877bca822e6a8615c215b269.scope. May 17 00:49:04.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.779000 audit: BPF prog-id=105 op=LOAD May 17 00:49:04.781000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.781000 audit[2642]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=2632 pid=2642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:04.781000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566613039363633653330393831356165343535316561643031323764 May 17 00:49:04.781000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.781000 audit[2642]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2632 pid=2642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:04.781000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566613039363633653330393831356165343535316561643031323764 May 17 00:49:04.781000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.781000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.781000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.781000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.781000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.781000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.781000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.781000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.781000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.781000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.781000 audit: BPF prog-id=106 op=LOAD May 17 00:49:04.781000 audit[2642]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2632 pid=2642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:04.781000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566613039363633653330393831356165343535316561643031323764 May 17 00:49:04.782000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.782000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.782000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.782000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.782000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.782000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.782000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.782000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.782000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.782000 audit: BPF prog-id=107 op=LOAD May 17 00:49:04.782000 audit[2642]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2632 pid=2642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:04.782000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566613039363633653330393831356165343535316561643031323764 May 17 00:49:04.782000 audit: BPF prog-id=107 op=UNLOAD May 17 00:49:04.782000 audit: BPF prog-id=106 op=UNLOAD May 17 00:49:04.782000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.782000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.782000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.782000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.782000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.782000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.782000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.782000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.782000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.782000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.782000 audit: BPF prog-id=108 op=LOAD May 17 00:49:04.782000 audit[2642]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2632 pid=2642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:04.782000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566613039363633653330393831356165343535316561643031323764 May 17 00:49:04.796558 env[1480]: time="2025-05-17T00:49:04.796512715Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-tgb6m,Uid:74d65111-66ce-460c-a99c-72620d941f86,Namespace:kube-system,Attempt:0,} returns sandbox id \"5fa09663e309815ae4551ead0127de18da276ee8877bca822e6a8615c215b269\"" May 17 00:49:04.807005 env[1480]: time="2025-05-17T00:49:04.806958178Z" level=info msg="CreateContainer within sandbox \"5fa09663e309815ae4551ead0127de18da276ee8877bca822e6a8615c215b269\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 17 00:49:04.864479 env[1480]: time="2025-05-17T00:49:04.864421165Z" level=info msg="CreateContainer within sandbox \"5fa09663e309815ae4551ead0127de18da276ee8877bca822e6a8615c215b269\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"458f9c7f664ad392f759d3fb00804092d15d2074460fc6218b699fca5acd6ed1\"" May 17 00:49:04.866377 env[1480]: time="2025-05-17T00:49:04.865010880Z" level=info msg="StartContainer for \"458f9c7f664ad392f759d3fb00804092d15d2074460fc6218b699fca5acd6ed1\"" May 17 00:49:04.881759 systemd[1]: Started cri-containerd-458f9c7f664ad392f759d3fb00804092d15d2074460fc6218b699fca5acd6ed1.scope. May 17 00:49:04.899000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.899000 audit[2675]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2632 pid=2675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:04.899000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435386639633766363634616433393266373539643366623030383034 May 17 00:49:04.899000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.899000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.899000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.899000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.899000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.899000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.899000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.899000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.899000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.899000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.899000 audit: BPF prog-id=109 op=LOAD May 17 00:49:04.899000 audit[2675]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2632 pid=2675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:04.899000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435386639633766363634616433393266373539643366623030383034 May 17 00:49:04.900000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.900000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.900000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.900000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.900000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.900000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.900000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.900000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.900000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.900000 audit: BPF prog-id=110 op=LOAD May 17 00:49:04.900000 audit[2675]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2632 pid=2675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:04.900000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435386639633766363634616433393266373539643366623030383034 May 17 00:49:04.900000 audit: BPF prog-id=110 op=UNLOAD May 17 00:49:04.901000 audit: BPF prog-id=109 op=UNLOAD May 17 00:49:04.901000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.901000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.901000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.901000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.901000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.901000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.901000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.901000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.901000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.901000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:04.901000 audit: BPF prog-id=111 op=LOAD May 17 00:49:04.901000 audit[2675]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2632 pid=2675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:04.901000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435386639633766363634616433393266373539643366623030383034 May 17 00:49:04.931141 env[1480]: time="2025-05-17T00:49:04.931084740Z" level=info msg="StartContainer for \"458f9c7f664ad392f759d3fb00804092d15d2074460fc6218b699fca5acd6ed1\" returns successfully" May 17 00:49:05.049000 audit[2736]: NETFILTER_CFG table=mangle:41 family=2 entries=1 op=nft_register_chain pid=2736 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:49:05.049000 audit[2736]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd8e838d0 a2=0 a3=1 items=0 ppid=2686 pid=2736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:05.049000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 17 00:49:05.051000 audit[2738]: NETFILTER_CFG table=mangle:42 family=10 entries=1 op=nft_register_chain pid=2738 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:49:05.051000 audit[2738]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd0b7cb90 a2=0 a3=1 items=0 ppid=2686 pid=2738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:05.051000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 17 00:49:05.053000 audit[2740]: NETFILTER_CFG table=nat:43 family=2 entries=1 op=nft_register_chain pid=2740 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:49:05.053000 audit[2740]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffca594620 a2=0 a3=1 items=0 ppid=2686 pid=2740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:05.053000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 17 00:49:05.053000 audit[2741]: NETFILTER_CFG table=nat:44 family=10 entries=1 op=nft_register_chain pid=2741 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:49:05.053000 audit[2741]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffefc25420 a2=0 a3=1 items=0 ppid=2686 pid=2741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:05.053000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 17 00:49:05.055000 audit[2742]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_chain pid=2742 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:49:05.055000 audit[2742]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd48ced80 a2=0 a3=1 items=0 ppid=2686 pid=2742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:05.055000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 17 00:49:05.058000 audit[2744]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=2744 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:49:05.058000 audit[2744]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd372aaf0 a2=0 a3=1 items=0 ppid=2686 pid=2744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:05.058000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 17 00:49:05.156000 audit[2745]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2745 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:49:05.156000 audit[2745]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=fffff064ea90 a2=0 a3=1 items=0 ppid=2686 pid=2745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:05.156000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 17 00:49:05.159000 audit[2747]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2747 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:49:05.159000 audit[2747]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffe8909040 a2=0 a3=1 items=0 ppid=2686 pid=2747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:05.159000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 17 00:49:05.163000 audit[2750]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_rule pid=2750 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:49:05.163000 audit[2750]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffdbb6b780 a2=0 a3=1 items=0 ppid=2686 pid=2750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:05.163000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 17 00:49:05.164000 audit[2751]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_chain pid=2751 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:49:05.164000 audit[2751]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd0d575a0 a2=0 a3=1 items=0 ppid=2686 pid=2751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:05.164000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 17 00:49:05.167000 audit[2753]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2753 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:49:05.167000 audit[2753]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffffeef9230 a2=0 a3=1 items=0 ppid=2686 pid=2753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:05.167000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 17 00:49:05.168000 audit[2754]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2754 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:49:05.168000 audit[2754]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffc0b7ae0 a2=0 a3=1 items=0 ppid=2686 pid=2754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:05.168000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 17 00:49:05.170000 audit[2756]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2756 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:49:05.170000 audit[2756]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffffc1e1480 a2=0 a3=1 items=0 ppid=2686 pid=2756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:05.170000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 17 00:49:05.173000 audit[2759]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_rule pid=2759 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:49:05.173000 audit[2759]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffc9ed9470 a2=0 a3=1 items=0 ppid=2686 pid=2759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:05.173000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 17 00:49:05.175000 audit[2760]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_chain pid=2760 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:49:05.175000 audit[2760]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffc3fe070 a2=0 a3=1 items=0 ppid=2686 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:05.175000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 17 00:49:05.177000 audit[2762]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2762 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:49:05.177000 audit[2762]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc8422950 a2=0 a3=1 items=0 ppid=2686 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:05.177000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 17 00:49:05.178000 audit[2763]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_chain pid=2763 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:49:05.178000 audit[2763]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffd407500 a2=0 a3=1 items=0 ppid=2686 pid=2763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:05.178000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 17 00:49:05.180000 audit[2765]: NETFILTER_CFG table=filter:58 family=2 entries=1 op=nft_register_rule pid=2765 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:49:05.180000 audit[2765]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd0c75760 a2=0 a3=1 items=0 ppid=2686 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:05.180000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 00:49:05.183000 audit[2768]: NETFILTER_CFG table=filter:59 family=2 entries=1 op=nft_register_rule pid=2768 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:49:05.183000 audit[2768]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffeb8967b0 a2=0 a3=1 items=0 ppid=2686 pid=2768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:05.183000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 00:49:05.187000 audit[2771]: NETFILTER_CFG table=filter:60 family=2 entries=1 op=nft_register_rule pid=2771 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:49:05.187000 audit[2771]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffdc563170 a2=0 a3=1 items=0 ppid=2686 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:05.187000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 17 00:49:05.188000 audit[2772]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2772 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:49:05.188000 audit[2772]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffcf9e8290 a2=0 a3=1 items=0 ppid=2686 pid=2772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:05.188000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 17 00:49:05.191000 audit[2774]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2774 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:49:05.191000 audit[2774]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=524 a0=3 a1=fffff5ca39d0 a2=0 a3=1 items=0 ppid=2686 pid=2774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:05.191000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:49:05.194000 audit[2777]: NETFILTER_CFG table=nat:63 family=2 entries=1 op=nft_register_rule pid=2777 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:49:05.194000 audit[2777]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffdd825ea0 a2=0 a3=1 items=0 ppid=2686 pid=2777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:05.194000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:49:05.195000 audit[2778]: NETFILTER_CFG table=nat:64 family=2 entries=1 op=nft_register_chain pid=2778 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:49:05.195000 audit[2778]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff5620e30 a2=0 a3=1 items=0 ppid=2686 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:05.195000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 17 00:49:05.197000 audit[2780]: NETFILTER_CFG table=nat:65 family=2 entries=1 op=nft_register_rule pid=2780 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:49:05.204445 kernel: kauditd_printk_skb: 494 callbacks suppressed May 17 00:49:05.204536 kernel: audit: type=1325 audit(1747442945.197:798): table=nat:65 family=2 entries=1 op=nft_register_rule pid=2780 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:49:05.197000 audit[2780]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=532 a0=3 a1=ffffe58c2510 a2=0 a3=1 items=0 ppid=2686 pid=2780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:05.247887 kernel: audit: type=1300 audit(1747442945.197:798): arch=c00000b7 syscall=211 success=yes exit=532 a0=3 a1=ffffe58c2510 a2=0 a3=1 items=0 ppid=2686 pid=2780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:05.197000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 17 00:49:05.272851 kernel: audit: type=1327 audit(1747442945.197:798): proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 17 00:49:05.355000 audit[2786]: NETFILTER_CFG table=filter:66 family=2 entries=8 op=nft_register_rule pid=2786 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:49:05.355000 audit[2786]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5248 a0=3 a1=fffff28eb160 a2=0 a3=1 items=0 ppid=2686 pid=2786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:05.377473 systemd[1]: run-containerd-runc-k8s.io-b6bb6a6279462d850e7bd60599c9d51e8f30276ed6d4ca81be8c6622f01d780f-runc.YJ6Fyd.mount: Deactivated successfully. May 17 00:49:05.400786 kernel: audit: type=1325 audit(1747442945.355:799): table=filter:66 family=2 entries=8 op=nft_register_rule pid=2786 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:49:05.400933 kernel: audit: type=1300 audit(1747442945.355:799): arch=c00000b7 syscall=211 success=yes exit=5248 a0=3 a1=fffff28eb160 a2=0 a3=1 items=0 ppid=2686 pid=2786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:05.355000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:49:05.414884 kernel: audit: type=1327 audit(1747442945.355:799): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:49:05.445000 audit[2786]: NETFILTER_CFG table=nat:67 family=2 entries=14 op=nft_register_chain pid=2786 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:49:05.445000 audit[2786]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5508 a0=3 a1=fffff28eb160 a2=0 a3=1 items=0 ppid=2686 pid=2786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:05.488984 kernel: audit: type=1325 audit(1747442945.445:800): table=nat:67 family=2 entries=14 op=nft_register_chain pid=2786 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:49:05.489136 kernel: audit: type=1300 audit(1747442945.445:800): arch=c00000b7 syscall=211 success=yes exit=5508 a0=3 a1=fffff28eb160 a2=0 a3=1 items=0 ppid=2686 pid=2786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:05.445000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:49:05.503643 kernel: audit: type=1327 audit(1747442945.445:800): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:49:05.461000 audit[2791]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2791 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:49:05.461000 audit[2791]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffd8aa3ea0 a2=0 a3=1 items=0 ppid=2686 pid=2791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:05.461000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 17 00:49:05.503000 audit[2793]: NETFILTER_CFG table=filter:69 family=10 entries=2 op=nft_register_chain pid=2793 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:49:05.520324 kernel: audit: type=1325 audit(1747442945.461:801): table=filter:68 family=10 entries=1 op=nft_register_chain pid=2791 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:49:05.503000 audit[2793]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffefe50480 a2=0 a3=1 items=0 ppid=2686 pid=2793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:05.503000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 17 00:49:05.525000 audit[2796]: NETFILTER_CFG table=filter:70 family=10 entries=2 op=nft_register_chain pid=2796 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:49:05.525000 audit[2796]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffe44aac70 a2=0 a3=1 items=0 ppid=2686 pid=2796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:05.525000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 17 00:49:05.527000 audit[2797]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_chain pid=2797 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:49:05.527000 audit[2797]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd42ebde0 a2=0 a3=1 items=0 ppid=2686 pid=2797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:05.527000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 17 00:49:05.532000 audit[2799]: NETFILTER_CFG table=filter:72 family=10 entries=1 op=nft_register_rule pid=2799 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:49:05.532000 audit[2799]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffed739850 a2=0 a3=1 items=0 ppid=2686 pid=2799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:05.532000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 17 00:49:05.533000 audit[2800]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2800 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:49:05.533000 audit[2800]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcb2c9780 a2=0 a3=1 items=0 ppid=2686 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:05.533000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 17 00:49:05.535000 audit[2802]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2802 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:49:05.535000 audit[2802]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffcf263800 a2=0 a3=1 items=0 ppid=2686 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:05.535000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 17 00:49:05.539000 audit[2805]: NETFILTER_CFG table=filter:75 family=10 entries=2 op=nft_register_chain pid=2805 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:49:05.539000 audit[2805]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffd9245ec0 a2=0 a3=1 items=0 ppid=2686 pid=2805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:05.539000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 17 00:49:05.540000 audit[2806]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_chain pid=2806 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:49:05.540000 audit[2806]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe4041670 a2=0 a3=1 items=0 ppid=2686 pid=2806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:05.540000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 17 00:49:05.543000 audit[2808]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2808 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:49:05.543000 audit[2808]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe2f21ab0 a2=0 a3=1 items=0 ppid=2686 pid=2808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:05.543000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 17 00:49:05.544000 audit[2809]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_chain pid=2809 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:49:05.544000 audit[2809]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff4aed870 a2=0 a3=1 items=0 ppid=2686 pid=2809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:05.544000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 17 00:49:05.547000 audit[2811]: NETFILTER_CFG table=filter:79 family=10 entries=1 op=nft_register_rule pid=2811 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:49:05.547000 audit[2811]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffffc1bfbc0 a2=0 a3=1 items=0 ppid=2686 pid=2811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:05.547000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 00:49:05.552000 audit[2814]: NETFILTER_CFG table=filter:80 family=10 entries=1 op=nft_register_rule pid=2814 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:49:05.552000 audit[2814]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc027dab0 a2=0 a3=1 items=0 ppid=2686 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:05.552000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 17 00:49:05.555000 audit[2817]: NETFILTER_CFG table=filter:81 family=10 entries=1 op=nft_register_rule pid=2817 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:49:05.555000 audit[2817]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffee3d7b50 a2=0 a3=1 items=0 ppid=2686 pid=2817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:05.555000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 17 00:49:05.557000 audit[2818]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2818 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:49:05.557000 audit[2818]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffcec70c80 a2=0 a3=1 items=0 ppid=2686 pid=2818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:05.557000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 17 00:49:05.559000 audit[2820]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2820 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:49:05.559000 audit[2820]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffe858d930 a2=0 a3=1 items=0 ppid=2686 pid=2820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:05.559000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:49:05.562000 audit[2823]: NETFILTER_CFG table=nat:84 family=10 entries=2 op=nft_register_chain pid=2823 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:49:05.562000 audit[2823]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffd6bbba70 a2=0 a3=1 items=0 ppid=2686 pid=2823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:05.562000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:49:05.563000 audit[2824]: NETFILTER_CFG table=nat:85 family=10 entries=1 op=nft_register_chain pid=2824 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:49:05.563000 audit[2824]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd2aa4370 a2=0 a3=1 items=0 ppid=2686 pid=2824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:05.563000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 17 00:49:05.565000 audit[2826]: NETFILTER_CFG table=nat:86 family=10 entries=2 op=nft_register_chain pid=2826 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:49:05.565000 audit[2826]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffd61129b0 a2=0 a3=1 items=0 ppid=2686 pid=2826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:05.565000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 17 00:49:05.567000 audit[2827]: NETFILTER_CFG table=filter:87 family=10 entries=1 op=nft_register_chain pid=2827 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:49:05.567000 audit[2827]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd2d0a820 a2=0 a3=1 items=0 ppid=2686 pid=2827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:05.567000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 17 00:49:05.569000 audit[2829]: NETFILTER_CFG table=filter:88 family=10 entries=1 op=nft_register_rule pid=2829 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:49:05.569000 audit[2829]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffedecf6a0 a2=0 a3=1 items=0 ppid=2686 pid=2829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:05.569000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:49:05.576000 audit[2832]: NETFILTER_CFG table=filter:89 family=10 entries=1 op=nft_register_rule pid=2832 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:49:05.576000 audit[2832]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffff772ea10 a2=0 a3=1 items=0 ppid=2686 pid=2832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:05.576000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:49:05.579000 audit[2834]: NETFILTER_CFG table=filter:90 family=10 entries=3 op=nft_register_rule pid=2834 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 17 00:49:05.579000 audit[2834]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2088 a0=3 a1=ffffc81aad70 a2=0 a3=1 items=0 ppid=2686 pid=2834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:05.579000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:49:05.580000 audit[2834]: NETFILTER_CFG table=nat:91 family=10 entries=7 op=nft_register_chain pid=2834 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 17 00:49:05.580000 audit[2834]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=ffffc81aad70 a2=0 a3=1 items=0 ppid=2686 pid=2834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:05.580000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:49:06.082475 kubelet[2537]: I0517 00:49:06.082420 2537 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-tgb6m" podStartSLOduration=3.082401593 podStartE2EDuration="3.082401593s" podCreationTimestamp="2025-05-17 00:49:03 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:49:05.290522165 +0000 UTC m=+4.282519120" watchObservedRunningTime="2025-05-17 00:49:06.082401593 +0000 UTC m=+5.074398548" May 17 00:49:08.100909 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1820310519.mount: Deactivated successfully. May 17 00:49:09.287878 env[1480]: time="2025-05-17T00:49:09.287836935Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.38.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:49:09.299775 env[1480]: time="2025-05-17T00:49:09.299731565Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:171854d50ba608218142ad5d32c7dd12ce55d536f02872e56e7c04c1f0a96a6b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:49:09.304866 env[1480]: time="2025-05-17T00:49:09.304826315Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.38.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:49:09.311429 env[1480]: time="2025-05-17T00:49:09.311375742Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:e0a34b265aebce1a2db906d8dad99190706e8bf3910cae626b9c2eb6bbb21775,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:49:09.311860 env[1480]: time="2025-05-17T00:49:09.311832526Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.0\" returns image reference \"sha256:171854d50ba608218142ad5d32c7dd12ce55d536f02872e56e7c04c1f0a96a6b\"" May 17 00:49:09.321861 env[1480]: time="2025-05-17T00:49:09.321813055Z" level=info msg="CreateContainer within sandbox \"b6bb6a6279462d850e7bd60599c9d51e8f30276ed6d4ca81be8c6622f01d780f\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" May 17 00:49:09.354040 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4024034602.mount: Deactivated successfully. May 17 00:49:09.369473 env[1480]: time="2025-05-17T00:49:09.369417176Z" level=info msg="CreateContainer within sandbox \"b6bb6a6279462d850e7bd60599c9d51e8f30276ed6d4ca81be8c6622f01d780f\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"a47f770bea083a35feac40073efd739bfc83edb244c01b3a74627f9e403eb760\"" May 17 00:49:09.370483 env[1480]: time="2025-05-17T00:49:09.370446271Z" level=info msg="StartContainer for \"a47f770bea083a35feac40073efd739bfc83edb244c01b3a74627f9e403eb760\"" May 17 00:49:09.390716 systemd[1]: Started cri-containerd-a47f770bea083a35feac40073efd739bfc83edb244c01b3a74627f9e403eb760.scope. May 17 00:49:09.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:09.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:09.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:09.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:09.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:09.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:09.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:09.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:09.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:09.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:09.401000 audit: BPF prog-id=112 op=LOAD May 17 00:49:09.401000 audit[2843]: AVC avc: denied { bpf } for pid=2843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:09.401000 audit[2843]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=2592 pid=2843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:09.401000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134376637373062656130383361333566656163343030373365666437 May 17 00:49:09.402000 audit[2843]: AVC avc: denied { perfmon } for pid=2843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:09.402000 audit[2843]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2592 pid=2843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:09.402000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134376637373062656130383361333566656163343030373365666437 May 17 00:49:09.402000 audit[2843]: AVC avc: denied { bpf } for pid=2843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:09.402000 audit[2843]: AVC avc: denied { bpf } for pid=2843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:09.402000 audit[2843]: AVC avc: denied { bpf } for pid=2843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:09.402000 audit[2843]: AVC avc: denied { perfmon } for pid=2843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:09.402000 audit[2843]: AVC avc: denied { perfmon } for pid=2843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:09.402000 audit[2843]: AVC avc: denied { perfmon } for pid=2843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:09.402000 audit[2843]: AVC avc: denied { perfmon } for pid=2843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:09.402000 audit[2843]: AVC avc: denied { perfmon } for pid=2843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:09.402000 audit[2843]: AVC avc: denied { bpf } for pid=2843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:09.402000 audit[2843]: AVC avc: denied { bpf } for pid=2843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:09.402000 audit: BPF prog-id=113 op=LOAD May 17 00:49:09.402000 audit[2843]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2592 pid=2843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:09.402000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134376637373062656130383361333566656163343030373365666437 May 17 00:49:09.402000 audit[2843]: AVC avc: denied { bpf } for pid=2843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:09.402000 audit[2843]: AVC avc: denied { bpf } for pid=2843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:09.402000 audit[2843]: AVC avc: denied { perfmon } for pid=2843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:09.402000 audit[2843]: AVC avc: denied { perfmon } for pid=2843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:09.402000 audit[2843]: AVC avc: denied { perfmon } for pid=2843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:09.402000 audit[2843]: AVC avc: denied { perfmon } for pid=2843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:09.402000 audit[2843]: AVC avc: denied { perfmon } for pid=2843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:09.402000 audit[2843]: AVC avc: denied { bpf } for pid=2843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:09.402000 audit[2843]: AVC avc: denied { bpf } for pid=2843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:09.402000 audit: BPF prog-id=114 op=LOAD May 17 00:49:09.402000 audit[2843]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2592 pid=2843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:09.402000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134376637373062656130383361333566656163343030373365666437 May 17 00:49:09.402000 audit: BPF prog-id=114 op=UNLOAD May 17 00:49:09.402000 audit: BPF prog-id=113 op=UNLOAD May 17 00:49:09.402000 audit[2843]: AVC avc: denied { bpf } for pid=2843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:09.402000 audit[2843]: AVC avc: denied { bpf } for pid=2843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:09.402000 audit[2843]: AVC avc: denied { bpf } for pid=2843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:09.402000 audit[2843]: AVC avc: denied { perfmon } for pid=2843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:09.402000 audit[2843]: AVC avc: denied { perfmon } for pid=2843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:09.402000 audit[2843]: AVC avc: denied { perfmon } for pid=2843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:09.402000 audit[2843]: AVC avc: denied { perfmon } for pid=2843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:09.402000 audit[2843]: AVC avc: denied { perfmon } for pid=2843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:09.402000 audit[2843]: AVC avc: denied { bpf } for pid=2843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:09.402000 audit[2843]: AVC avc: denied { bpf } for pid=2843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:09.402000 audit: BPF prog-id=115 op=LOAD May 17 00:49:09.402000 audit[2843]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2592 pid=2843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:09.402000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134376637373062656130383361333566656163343030373365666437 May 17 00:49:09.426439 env[1480]: time="2025-05-17T00:49:09.426389434Z" level=info msg="StartContainer for \"a47f770bea083a35feac40073efd739bfc83edb244c01b3a74627f9e403eb760\" returns successfully" May 17 00:49:15.556000 audit[1876]: USER_END pid=1876 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:49:15.557419 sudo[1876]: pam_unix(sudo:session): session closed for user root May 17 00:49:15.562577 kernel: kauditd_printk_skb: 128 callbacks suppressed May 17 00:49:15.562657 kernel: audit: type=1106 audit(1747442955.556:843): pid=1876 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:49:15.556000 audit[1876]: CRED_DISP pid=1876 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:49:15.619776 kernel: audit: type=1104 audit(1747442955.556:844): pid=1876 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:49:15.660066 sshd[1873]: pam_unix(sshd:session): session closed for user core May 17 00:49:15.659000 audit[1873]: USER_END pid=1873 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:49:15.689074 systemd[1]: sshd@6-10.200.20.34:22-10.200.16.10:59086.service: Deactivated successfully. May 17 00:49:15.689890 systemd[1]: session-9.scope: Deactivated successfully. May 17 00:49:15.690056 systemd[1]: session-9.scope: Consumed 6.542s CPU time. May 17 00:49:15.659000 audit[1873]: CRED_DISP pid=1873 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:49:15.691042 systemd-logind[1466]: Session 9 logged out. Waiting for processes to exit. May 17 00:49:15.712595 kernel: audit: type=1106 audit(1747442955.659:845): pid=1873 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:49:15.712740 kernel: audit: type=1104 audit(1747442955.659:846): pid=1873 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:49:15.715885 systemd-logind[1466]: Removed session 9. May 17 00:49:15.688000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.34:22-10.200.16.10:59086 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:15.741026 kernel: audit: type=1131 audit(1747442955.688:847): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.34:22-10.200.16.10:59086 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:18.234000 audit[2916]: NETFILTER_CFG table=filter:92 family=2 entries=15 op=nft_register_rule pid=2916 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:49:18.234000 audit[2916]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=ffffd5352990 a2=0 a3=1 items=0 ppid=2686 pid=2916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:18.284558 kernel: audit: type=1325 audit(1747442958.234:848): table=filter:92 family=2 entries=15 op=nft_register_rule pid=2916 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:49:18.284720 kernel: audit: type=1300 audit(1747442958.234:848): arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=ffffd5352990 a2=0 a3=1 items=0 ppid=2686 pid=2916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:18.234000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:49:18.301498 kernel: audit: type=1327 audit(1747442958.234:848): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:49:18.252000 audit[2916]: NETFILTER_CFG table=nat:93 family=2 entries=12 op=nft_register_rule pid=2916 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:49:18.317532 kernel: audit: type=1325 audit(1747442958.252:849): table=nat:93 family=2 entries=12 op=nft_register_rule pid=2916 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:49:18.252000 audit[2916]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffd5352990 a2=0 a3=1 items=0 ppid=2686 pid=2916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:18.351806 kernel: audit: type=1300 audit(1747442958.252:849): arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffd5352990 a2=0 a3=1 items=0 ppid=2686 pid=2916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:18.252000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:49:18.373000 audit[2918]: NETFILTER_CFG table=filter:94 family=2 entries=16 op=nft_register_rule pid=2918 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:49:18.373000 audit[2918]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=fffff8aa2160 a2=0 a3=1 items=0 ppid=2686 pid=2918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:18.373000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:49:18.378000 audit[2918]: NETFILTER_CFG table=nat:95 family=2 entries=12 op=nft_register_rule pid=2918 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:49:18.378000 audit[2918]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=fffff8aa2160 a2=0 a3=1 items=0 ppid=2686 pid=2918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:18.378000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:49:22.513000 audit[2923]: NETFILTER_CFG table=filter:96 family=2 entries=17 op=nft_register_rule pid=2923 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:49:22.520142 kernel: kauditd_printk_skb: 7 callbacks suppressed May 17 00:49:22.520281 kernel: audit: type=1325 audit(1747442962.513:852): table=filter:96 family=2 entries=17 op=nft_register_rule pid=2923 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:49:22.513000 audit[2923]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6736 a0=3 a1=ffffd4da5e80 a2=0 a3=1 items=0 ppid=2686 pid=2923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:22.574189 kernel: audit: type=1300 audit(1747442962.513:852): arch=c00000b7 syscall=211 success=yes exit=6736 a0=3 a1=ffffd4da5e80 a2=0 a3=1 items=0 ppid=2686 pid=2923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:22.513000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:49:22.592042 kernel: audit: type=1327 audit(1747442962.513:852): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:49:22.536000 audit[2923]: NETFILTER_CFG table=nat:97 family=2 entries=12 op=nft_register_rule pid=2923 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:49:22.612041 kernel: audit: type=1325 audit(1747442962.536:853): table=nat:97 family=2 entries=12 op=nft_register_rule pid=2923 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:49:22.536000 audit[2923]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffd4da5e80 a2=0 a3=1 items=0 ppid=2686 pid=2923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:22.644228 kernel: audit: type=1300 audit(1747442962.536:853): arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffd4da5e80 a2=0 a3=1 items=0 ppid=2686 pid=2923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:22.536000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:49:22.662429 kernel: audit: type=1327 audit(1747442962.536:853): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:49:22.644000 audit[2926]: NETFILTER_CFG table=filter:98 family=2 entries=18 op=nft_register_rule pid=2926 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:49:22.678645 kernel: audit: type=1325 audit(1747442962.644:854): table=filter:98 family=2 entries=18 op=nft_register_rule pid=2926 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:49:22.644000 audit[2926]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6736 a0=3 a1=ffffd7fcb040 a2=0 a3=1 items=0 ppid=2686 pid=2926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:22.705907 kernel: audit: type=1300 audit(1747442962.644:854): arch=c00000b7 syscall=211 success=yes exit=6736 a0=3 a1=ffffd7fcb040 a2=0 a3=1 items=0 ppid=2686 pid=2926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:22.644000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:49:22.725749 kernel: audit: type=1327 audit(1747442962.644:854): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:49:22.651000 audit[2926]: NETFILTER_CFG table=nat:99 family=2 entries=12 op=nft_register_rule pid=2926 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:49:22.743008 kernel: audit: type=1325 audit(1747442962.651:855): table=nat:99 family=2 entries=12 op=nft_register_rule pid=2926 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:49:22.651000 audit[2926]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffd7fcb040 a2=0 a3=1 items=0 ppid=2686 pid=2926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:22.651000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:49:22.862316 kubelet[2537]: I0517 00:49:22.862136 2537 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-844669ff44-pdpjk" podStartSLOduration=14.182893687 podStartE2EDuration="18.862118584s" podCreationTimestamp="2025-05-17 00:49:04 +0000 UTC" firstStartedPulling="2025-05-17 00:49:04.633959781 +0000 UTC m=+3.625956696" lastFinishedPulling="2025-05-17 00:49:09.313184638 +0000 UTC m=+8.305181593" observedRunningTime="2025-05-17 00:49:10.308171652 +0000 UTC m=+9.300168567" watchObservedRunningTime="2025-05-17 00:49:22.862118584 +0000 UTC m=+21.854115539" May 17 00:49:22.872649 systemd[1]: Created slice kubepods-besteffort-pod580263cb_fabd_45d1_a510_8e03ce518c24.slice. May 17 00:49:22.895502 kubelet[2537]: I0517 00:49:22.895446 2537 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-72xzq\" (UniqueName: \"kubernetes.io/projected/580263cb-fabd-45d1-a510-8e03ce518c24-kube-api-access-72xzq\") pod \"calico-typha-5979bc79b5-m6wnm\" (UID: \"580263cb-fabd-45d1-a510-8e03ce518c24\") " pod="calico-system/calico-typha-5979bc79b5-m6wnm" May 17 00:49:22.895502 kubelet[2537]: I0517 00:49:22.895505 2537 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/580263cb-fabd-45d1-a510-8e03ce518c24-tigera-ca-bundle\") pod \"calico-typha-5979bc79b5-m6wnm\" (UID: \"580263cb-fabd-45d1-a510-8e03ce518c24\") " pod="calico-system/calico-typha-5979bc79b5-m6wnm" May 17 00:49:22.895696 kubelet[2537]: I0517 00:49:22.895526 2537 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/580263cb-fabd-45d1-a510-8e03ce518c24-typha-certs\") pod \"calico-typha-5979bc79b5-m6wnm\" (UID: \"580263cb-fabd-45d1-a510-8e03ce518c24\") " pod="calico-system/calico-typha-5979bc79b5-m6wnm" May 17 00:49:23.006561 systemd[1]: Created slice kubepods-besteffort-podc770ca07_f3f6_4b83_9d14_546719a62a34.slice. May 17 00:49:23.097053 kubelet[2537]: I0517 00:49:23.097014 2537 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/c770ca07-f3f6-4b83-9d14-546719a62a34-lib-modules\") pod \"calico-node-6v7c4\" (UID: \"c770ca07-f3f6-4b83-9d14-546719a62a34\") " pod="calico-system/calico-node-6v7c4" May 17 00:49:23.097310 kubelet[2537]: I0517 00:49:23.097294 2537 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/c770ca07-f3f6-4b83-9d14-546719a62a34-node-certs\") pod \"calico-node-6v7c4\" (UID: \"c770ca07-f3f6-4b83-9d14-546719a62a34\") " pod="calico-system/calico-node-6v7c4" May 17 00:49:23.097441 kubelet[2537]: I0517 00:49:23.097427 2537 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/c770ca07-f3f6-4b83-9d14-546719a62a34-var-run-calico\") pod \"calico-node-6v7c4\" (UID: \"c770ca07-f3f6-4b83-9d14-546719a62a34\") " pod="calico-system/calico-node-6v7c4" May 17 00:49:23.097539 kubelet[2537]: I0517 00:49:23.097523 2537 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/c770ca07-f3f6-4b83-9d14-546719a62a34-flexvol-driver-host\") pod \"calico-node-6v7c4\" (UID: \"c770ca07-f3f6-4b83-9d14-546719a62a34\") " pod="calico-system/calico-node-6v7c4" May 17 00:49:23.097648 kubelet[2537]: I0517 00:49:23.097626 2537 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/c770ca07-f3f6-4b83-9d14-546719a62a34-var-lib-calico\") pod \"calico-node-6v7c4\" (UID: \"c770ca07-f3f6-4b83-9d14-546719a62a34\") " pod="calico-system/calico-node-6v7c4" May 17 00:49:23.097752 kubelet[2537]: I0517 00:49:23.097739 2537 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/c770ca07-f3f6-4b83-9d14-546719a62a34-xtables-lock\") pod \"calico-node-6v7c4\" (UID: \"c770ca07-f3f6-4b83-9d14-546719a62a34\") " pod="calico-system/calico-node-6v7c4" May 17 00:49:23.097849 kubelet[2537]: I0517 00:49:23.097836 2537 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/c770ca07-f3f6-4b83-9d14-546719a62a34-policysync\") pod \"calico-node-6v7c4\" (UID: \"c770ca07-f3f6-4b83-9d14-546719a62a34\") " pod="calico-system/calico-node-6v7c4" May 17 00:49:23.098382 kubelet[2537]: I0517 00:49:23.097934 2537 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/c770ca07-f3f6-4b83-9d14-546719a62a34-cni-log-dir\") pod \"calico-node-6v7c4\" (UID: \"c770ca07-f3f6-4b83-9d14-546719a62a34\") " pod="calico-system/calico-node-6v7c4" May 17 00:49:23.098533 kubelet[2537]: I0517 00:49:23.098516 2537 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/c770ca07-f3f6-4b83-9d14-546719a62a34-cni-bin-dir\") pod \"calico-node-6v7c4\" (UID: \"c770ca07-f3f6-4b83-9d14-546719a62a34\") " pod="calico-system/calico-node-6v7c4" May 17 00:49:23.098644 kubelet[2537]: I0517 00:49:23.098630 2537 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/c770ca07-f3f6-4b83-9d14-546719a62a34-tigera-ca-bundle\") pod \"calico-node-6v7c4\" (UID: \"c770ca07-f3f6-4b83-9d14-546719a62a34\") " pod="calico-system/calico-node-6v7c4" May 17 00:49:23.098750 kubelet[2537]: I0517 00:49:23.098738 2537 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/c770ca07-f3f6-4b83-9d14-546719a62a34-cni-net-dir\") pod \"calico-node-6v7c4\" (UID: \"c770ca07-f3f6-4b83-9d14-546719a62a34\") " pod="calico-system/calico-node-6v7c4" May 17 00:49:23.098850 kubelet[2537]: I0517 00:49:23.098837 2537 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-sr297\" (UniqueName: \"kubernetes.io/projected/c770ca07-f3f6-4b83-9d14-546719a62a34-kube-api-access-sr297\") pod \"calico-node-6v7c4\" (UID: \"c770ca07-f3f6-4b83-9d14-546719a62a34\") " pod="calico-system/calico-node-6v7c4" May 17 00:49:23.177375 env[1480]: time="2025-05-17T00:49:23.176965999Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5979bc79b5-m6wnm,Uid:580263cb-fabd-45d1-a510-8e03ce518c24,Namespace:calico-system,Attempt:0,}" May 17 00:49:23.183941 kubelet[2537]: E0517 00:49:23.183899 2537 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-52bcs" podUID="463fd6d8-2e06-42b8-ade3-8bda47d821b9" May 17 00:49:23.202005 kubelet[2537]: E0517 00:49:23.201977 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:23.202159 kubelet[2537]: W0517 00:49:23.202141 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:23.202274 kubelet[2537]: E0517 00:49:23.202259 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:23.202515 kubelet[2537]: E0517 00:49:23.202502 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:23.202614 kubelet[2537]: W0517 00:49:23.202601 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:23.202686 kubelet[2537]: E0517 00:49:23.202675 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:23.210986 kubelet[2537]: E0517 00:49:23.210955 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:23.211150 kubelet[2537]: W0517 00:49:23.211132 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:23.211224 kubelet[2537]: E0517 00:49:23.211210 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:23.211841 kubelet[2537]: E0517 00:49:23.211826 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:23.211942 kubelet[2537]: W0517 00:49:23.211928 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:23.212015 kubelet[2537]: E0517 00:49:23.212004 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:23.212298 kubelet[2537]: E0517 00:49:23.212286 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:23.212377 kubelet[2537]: W0517 00:49:23.212365 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:23.212436 kubelet[2537]: E0517 00:49:23.212426 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:23.214300 kubelet[2537]: E0517 00:49:23.214272 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:23.214458 kubelet[2537]: W0517 00:49:23.214443 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:23.214532 kubelet[2537]: E0517 00:49:23.214519 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:23.217349 kubelet[2537]: E0517 00:49:23.217321 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:23.217484 kubelet[2537]: W0517 00:49:23.217468 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:23.217565 kubelet[2537]: E0517 00:49:23.217553 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:23.219398 kubelet[2537]: E0517 00:49:23.219379 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:23.219514 kubelet[2537]: W0517 00:49:23.219499 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:23.219586 kubelet[2537]: E0517 00:49:23.219574 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:23.223268 kubelet[2537]: E0517 00:49:23.221163 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:23.223268 kubelet[2537]: W0517 00:49:23.221182 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:23.223268 kubelet[2537]: E0517 00:49:23.221202 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:23.234248 kubelet[2537]: E0517 00:49:23.233951 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:23.234248 kubelet[2537]: W0517 00:49:23.233974 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:23.234248 kubelet[2537]: E0517 00:49:23.233995 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:23.279363 kubelet[2537]: E0517 00:49:23.279333 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:23.279564 kubelet[2537]: W0517 00:49:23.279544 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:23.279674 kubelet[2537]: E0517 00:49:23.279660 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:23.280019 kubelet[2537]: E0517 00:49:23.280004 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:23.280143 kubelet[2537]: W0517 00:49:23.280101 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:23.280222 kubelet[2537]: E0517 00:49:23.280210 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:23.281097 kubelet[2537]: E0517 00:49:23.281084 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:23.281211 kubelet[2537]: W0517 00:49:23.281196 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:23.281318 kubelet[2537]: E0517 00:49:23.281306 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:23.281657 kubelet[2537]: E0517 00:49:23.281641 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:23.281746 kubelet[2537]: W0517 00:49:23.281734 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:23.281811 kubelet[2537]: E0517 00:49:23.281792 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:23.283354 kubelet[2537]: E0517 00:49:23.283324 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:23.283480 kubelet[2537]: W0517 00:49:23.283465 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:23.283560 kubelet[2537]: E0517 00:49:23.283546 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:23.283836 kubelet[2537]: E0517 00:49:23.283815 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:23.283928 kubelet[2537]: W0517 00:49:23.283916 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:23.284004 kubelet[2537]: E0517 00:49:23.283993 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:23.284302 kubelet[2537]: E0517 00:49:23.284288 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:23.284393 kubelet[2537]: W0517 00:49:23.284381 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:23.284463 kubelet[2537]: E0517 00:49:23.284442 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:23.284700 kubelet[2537]: E0517 00:49:23.284688 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:23.284784 kubelet[2537]: W0517 00:49:23.284772 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:23.284859 kubelet[2537]: E0517 00:49:23.284848 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:23.285112 kubelet[2537]: E0517 00:49:23.285100 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:23.285194 kubelet[2537]: W0517 00:49:23.285183 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:23.285268 kubelet[2537]: E0517 00:49:23.285257 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:23.285529 kubelet[2537]: E0517 00:49:23.285516 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:23.285618 kubelet[2537]: W0517 00:49:23.285606 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:23.285690 kubelet[2537]: E0517 00:49:23.285680 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:23.285962 kubelet[2537]: E0517 00:49:23.285949 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:23.286059 kubelet[2537]: W0517 00:49:23.286046 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:23.286131 kubelet[2537]: E0517 00:49:23.286121 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:23.286378 kubelet[2537]: E0517 00:49:23.286366 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:23.286483 kubelet[2537]: W0517 00:49:23.286470 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:23.286544 kubelet[2537]: E0517 00:49:23.286534 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:23.287325 kubelet[2537]: E0517 00:49:23.287309 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:23.287424 kubelet[2537]: W0517 00:49:23.287411 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:23.287500 kubelet[2537]: E0517 00:49:23.287474 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:23.287761 kubelet[2537]: E0517 00:49:23.287748 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:23.287839 kubelet[2537]: W0517 00:49:23.287828 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:23.287891 kubelet[2537]: E0517 00:49:23.287882 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:23.288380 kubelet[2537]: E0517 00:49:23.288365 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:23.288465 kubelet[2537]: W0517 00:49:23.288452 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:23.288518 kubelet[2537]: E0517 00:49:23.288509 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:23.289322 kubelet[2537]: E0517 00:49:23.289305 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:23.289413 kubelet[2537]: W0517 00:49:23.289399 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:23.289486 kubelet[2537]: E0517 00:49:23.289474 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:23.289794 kubelet[2537]: E0517 00:49:23.289779 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:23.289882 kubelet[2537]: W0517 00:49:23.289869 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:23.289946 kubelet[2537]: E0517 00:49:23.289934 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:23.290205 kubelet[2537]: E0517 00:49:23.290192 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:23.290303 kubelet[2537]: W0517 00:49:23.290288 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:23.290375 kubelet[2537]: E0517 00:49:23.290363 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:23.291022 kubelet[2537]: E0517 00:49:23.290996 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:23.291115 kubelet[2537]: W0517 00:49:23.291101 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:23.291181 kubelet[2537]: E0517 00:49:23.291170 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:23.291498 kubelet[2537]: E0517 00:49:23.291484 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:23.291575 kubelet[2537]: W0517 00:49:23.291562 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:23.291646 kubelet[2537]: E0517 00:49:23.291634 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:23.300854 kubelet[2537]: E0517 00:49:23.300819 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:23.300854 kubelet[2537]: W0517 00:49:23.300843 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:23.300854 kubelet[2537]: E0517 00:49:23.300863 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:23.301129 kubelet[2537]: I0517 00:49:23.300891 2537 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/463fd6d8-2e06-42b8-ade3-8bda47d821b9-socket-dir\") pod \"csi-node-driver-52bcs\" (UID: \"463fd6d8-2e06-42b8-ade3-8bda47d821b9\") " pod="calico-system/csi-node-driver-52bcs" May 17 00:49:23.303383 kubelet[2537]: E0517 00:49:23.303343 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:23.303383 kubelet[2537]: W0517 00:49:23.303374 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:23.303572 kubelet[2537]: E0517 00:49:23.303397 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:23.303572 kubelet[2537]: I0517 00:49:23.303432 2537 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/463fd6d8-2e06-42b8-ade3-8bda47d821b9-registration-dir\") pod \"csi-node-driver-52bcs\" (UID: \"463fd6d8-2e06-42b8-ade3-8bda47d821b9\") " pod="calico-system/csi-node-driver-52bcs" May 17 00:49:23.303709 kubelet[2537]: E0517 00:49:23.303691 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:23.303709 kubelet[2537]: W0517 00:49:23.303704 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:23.303789 kubelet[2537]: E0517 00:49:23.303715 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:23.303839 kubelet[2537]: I0517 00:49:23.303820 2537 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/463fd6d8-2e06-42b8-ade3-8bda47d821b9-varrun\") pod \"csi-node-driver-52bcs\" (UID: \"463fd6d8-2e06-42b8-ade3-8bda47d821b9\") " pod="calico-system/csi-node-driver-52bcs" May 17 00:49:23.304028 kubelet[2537]: E0517 00:49:23.304000 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:23.304028 kubelet[2537]: W0517 00:49:23.304014 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:23.304028 kubelet[2537]: E0517 00:49:23.304026 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:23.304215 kubelet[2537]: E0517 00:49:23.304199 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:23.304215 kubelet[2537]: W0517 00:49:23.304215 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:23.304308 kubelet[2537]: E0517 00:49:23.304224 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:23.304484 kubelet[2537]: E0517 00:49:23.304465 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:23.304484 kubelet[2537]: W0517 00:49:23.304479 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:23.304579 kubelet[2537]: E0517 00:49:23.304489 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:23.304579 kubelet[2537]: I0517 00:49:23.304515 2537 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5bwfr\" (UniqueName: \"kubernetes.io/projected/463fd6d8-2e06-42b8-ade3-8bda47d821b9-kube-api-access-5bwfr\") pod \"csi-node-driver-52bcs\" (UID: \"463fd6d8-2e06-42b8-ade3-8bda47d821b9\") " pod="calico-system/csi-node-driver-52bcs" May 17 00:49:23.304707 kubelet[2537]: E0517 00:49:23.304692 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:23.304707 kubelet[2537]: W0517 00:49:23.304704 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:23.304783 kubelet[2537]: E0517 00:49:23.304713 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:23.304939 kubelet[2537]: E0517 00:49:23.304922 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:23.304939 kubelet[2537]: W0517 00:49:23.304934 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:23.305042 kubelet[2537]: E0517 00:49:23.304943 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:23.305154 kubelet[2537]: E0517 00:49:23.305139 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:23.305154 kubelet[2537]: W0517 00:49:23.305151 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:23.305154 kubelet[2537]: E0517 00:49:23.305161 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:23.307450 kubelet[2537]: E0517 00:49:23.307420 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:23.307450 kubelet[2537]: W0517 00:49:23.307443 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:23.307615 kubelet[2537]: E0517 00:49:23.307463 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:23.307750 kubelet[2537]: E0517 00:49:23.307732 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:23.307750 kubelet[2537]: W0517 00:49:23.307748 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:23.307828 kubelet[2537]: E0517 00:49:23.307758 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:23.307828 kubelet[2537]: I0517 00:49:23.307785 2537 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/463fd6d8-2e06-42b8-ade3-8bda47d821b9-kubelet-dir\") pod \"csi-node-driver-52bcs\" (UID: \"463fd6d8-2e06-42b8-ade3-8bda47d821b9\") " pod="calico-system/csi-node-driver-52bcs" May 17 00:49:23.308024 kubelet[2537]: E0517 00:49:23.308004 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:23.308024 kubelet[2537]: W0517 00:49:23.308020 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:23.308112 kubelet[2537]: E0517 00:49:23.308030 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:23.308296 kubelet[2537]: E0517 00:49:23.308277 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:23.308296 kubelet[2537]: W0517 00:49:23.308291 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:23.308384 kubelet[2537]: E0517 00:49:23.308301 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:23.308549 kubelet[2537]: E0517 00:49:23.308531 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:23.308549 kubelet[2537]: W0517 00:49:23.308544 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:23.308646 kubelet[2537]: E0517 00:49:23.308564 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:23.308752 kubelet[2537]: E0517 00:49:23.308736 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:23.308752 kubelet[2537]: W0517 00:49:23.308749 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:23.308822 kubelet[2537]: E0517 00:49:23.308764 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:23.313929 env[1480]: time="2025-05-17T00:49:23.313631819Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-6v7c4,Uid:c770ca07-f3f6-4b83-9d14-546719a62a34,Namespace:calico-system,Attempt:0,}" May 17 00:49:23.408732 kubelet[2537]: E0517 00:49:23.408702 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:23.408886 kubelet[2537]: W0517 00:49:23.408870 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:23.408950 kubelet[2537]: E0517 00:49:23.408939 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:23.409260 kubelet[2537]: E0517 00:49:23.409246 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:23.409360 kubelet[2537]: W0517 00:49:23.409345 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:23.409443 kubelet[2537]: E0517 00:49:23.409432 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:23.409774 kubelet[2537]: E0517 00:49:23.409741 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:23.409774 kubelet[2537]: W0517 00:49:23.409760 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:23.409774 kubelet[2537]: E0517 00:49:23.409774 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:23.409970 kubelet[2537]: E0517 00:49:23.409946 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:23.409970 kubelet[2537]: W0517 00:49:23.409962 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:23.410043 kubelet[2537]: E0517 00:49:23.409975 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:23.410222 kubelet[2537]: E0517 00:49:23.410201 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:23.410222 kubelet[2537]: W0517 00:49:23.410219 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:23.410314 kubelet[2537]: E0517 00:49:23.410253 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:23.410545 kubelet[2537]: E0517 00:49:23.410523 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:23.410545 kubelet[2537]: W0517 00:49:23.410539 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:23.410639 kubelet[2537]: E0517 00:49:23.410551 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:23.410772 kubelet[2537]: E0517 00:49:23.410746 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:23.410772 kubelet[2537]: W0517 00:49:23.410762 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:23.410772 kubelet[2537]: E0517 00:49:23.410771 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:23.411011 kubelet[2537]: E0517 00:49:23.410987 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:23.411011 kubelet[2537]: W0517 00:49:23.411006 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:23.411089 kubelet[2537]: E0517 00:49:23.411016 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:23.411197 kubelet[2537]: E0517 00:49:23.411182 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:23.411197 kubelet[2537]: W0517 00:49:23.411195 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:23.411295 kubelet[2537]: E0517 00:49:23.411205 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:23.411520 kubelet[2537]: E0517 00:49:23.411457 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:23.411520 kubelet[2537]: W0517 00:49:23.411474 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:23.411520 kubelet[2537]: E0517 00:49:23.411487 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:23.411695 kubelet[2537]: E0517 00:49:23.411672 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:23.411695 kubelet[2537]: W0517 00:49:23.411689 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:23.411767 kubelet[2537]: E0517 00:49:23.411700 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:23.412562 kubelet[2537]: E0517 00:49:23.412544 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:23.412562 kubelet[2537]: W0517 00:49:23.412561 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:23.412672 kubelet[2537]: E0517 00:49:23.412575 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:23.412820 kubelet[2537]: E0517 00:49:23.412799 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:23.412820 kubelet[2537]: W0517 00:49:23.412815 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:23.412892 kubelet[2537]: E0517 00:49:23.412827 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:23.413380 kubelet[2537]: E0517 00:49:23.413350 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:23.413380 kubelet[2537]: W0517 00:49:23.413370 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:23.413499 kubelet[2537]: E0517 00:49:23.413386 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:23.413663 kubelet[2537]: E0517 00:49:23.413640 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:23.413663 kubelet[2537]: W0517 00:49:23.413658 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:23.413733 kubelet[2537]: E0517 00:49:23.413670 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:23.413896 kubelet[2537]: E0517 00:49:23.413879 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:23.413943 kubelet[2537]: W0517 00:49:23.413894 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:23.413943 kubelet[2537]: E0517 00:49:23.413908 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:23.414096 kubelet[2537]: E0517 00:49:23.414082 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:23.414096 kubelet[2537]: W0517 00:49:23.414095 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:23.414155 kubelet[2537]: E0517 00:49:23.414105 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:23.414424 kubelet[2537]: E0517 00:49:23.414402 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:23.414424 kubelet[2537]: W0517 00:49:23.414421 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:23.414516 kubelet[2537]: E0517 00:49:23.414432 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:23.414600 kubelet[2537]: E0517 00:49:23.414585 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:23.414600 kubelet[2537]: W0517 00:49:23.414598 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:23.414653 kubelet[2537]: E0517 00:49:23.414607 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:23.414953 kubelet[2537]: E0517 00:49:23.414935 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:23.414953 kubelet[2537]: W0517 00:49:23.414952 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:23.415037 kubelet[2537]: E0517 00:49:23.414964 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:23.415128 kubelet[2537]: E0517 00:49:23.415104 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:23.415128 kubelet[2537]: W0517 00:49:23.415118 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:23.415128 kubelet[2537]: E0517 00:49:23.415127 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:23.417951 kubelet[2537]: E0517 00:49:23.417920 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:23.417951 kubelet[2537]: W0517 00:49:23.417943 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:23.418206 kubelet[2537]: E0517 00:49:23.417964 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:23.418289 kubelet[2537]: E0517 00:49:23.418269 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:23.418289 kubelet[2537]: W0517 00:49:23.418285 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:23.418376 kubelet[2537]: E0517 00:49:23.418296 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:23.418543 kubelet[2537]: E0517 00:49:23.418524 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:23.418543 kubelet[2537]: W0517 00:49:23.418538 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:23.418636 kubelet[2537]: E0517 00:49:23.418552 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:23.418899 kubelet[2537]: E0517 00:49:23.418743 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:23.418899 kubelet[2537]: W0517 00:49:23.418754 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:23.418899 kubelet[2537]: E0517 00:49:23.418763 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:23.436523 kubelet[2537]: E0517 00:49:23.436417 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:23.436696 kubelet[2537]: W0517 00:49:23.436677 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:23.436768 kubelet[2537]: E0517 00:49:23.436755 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:23.576579 env[1480]: time="2025-05-17T00:49:23.576499011Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:49:23.576790 env[1480]: time="2025-05-17T00:49:23.576767022Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:49:23.576884 env[1480]: time="2025-05-17T00:49:23.576863105Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:49:23.578302 env[1480]: time="2025-05-17T00:49:23.577214319Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bbfa7f23016354eac5a2742487e1d3b1213725ae6a61c05274619dd656b9ce21 pid=3013 runtime=io.containerd.runc.v2 May 17 00:49:23.600786 systemd[1]: Started cri-containerd-bbfa7f23016354eac5a2742487e1d3b1213725ae6a61c05274619dd656b9ce21.scope. May 17 00:49:23.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.611000 audit: BPF prog-id=116 op=LOAD May 17 00:49:23.612000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.612000 audit[3023]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3013 pid=3023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:23.612000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262666137663233303136333534656163356132373432343837653164 May 17 00:49:23.612000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.612000 audit[3023]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3013 pid=3023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:23.612000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262666137663233303136333534656163356132373432343837653164 May 17 00:49:23.612000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.612000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.612000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.612000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.612000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.612000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.612000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.612000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.612000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.612000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.612000 audit: BPF prog-id=117 op=LOAD May 17 00:49:23.612000 audit[3023]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3013 pid=3023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:23.612000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262666137663233303136333534656163356132373432343837653164 May 17 00:49:23.613000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.613000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.613000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.613000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.613000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.613000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.613000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.613000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.613000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.613000 audit: BPF prog-id=118 op=LOAD May 17 00:49:23.613000 audit[3023]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3013 pid=3023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:23.613000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262666137663233303136333534656163356132373432343837653164 May 17 00:49:23.614000 audit: BPF prog-id=118 op=UNLOAD May 17 00:49:23.614000 audit: BPF prog-id=117 op=UNLOAD May 17 00:49:23.614000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.614000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.614000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.614000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.614000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.614000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.614000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.614000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.614000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.614000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.614000 audit: BPF prog-id=119 op=LOAD May 17 00:49:23.614000 audit[3023]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3013 pid=3023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:23.614000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262666137663233303136333534656163356132373432343837653164 May 17 00:49:23.637885 env[1480]: time="2025-05-17T00:49:23.637845968Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5979bc79b5-m6wnm,Uid:580263cb-fabd-45d1-a510-8e03ce518c24,Namespace:calico-system,Attempt:0,} returns sandbox id \"bbfa7f23016354eac5a2742487e1d3b1213725ae6a61c05274619dd656b9ce21\"" May 17 00:49:23.642199 env[1480]: time="2025-05-17T00:49:23.641513552Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.0\"" May 17 00:49:23.711000 audit[3047]: NETFILTER_CFG table=filter:100 family=2 entries=20 op=nft_register_rule pid=3047 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:49:23.711000 audit[3047]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8224 a0=3 a1=ffffecc9de40 a2=0 a3=1 items=0 ppid=2686 pid=3047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:23.711000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:49:23.716000 audit[3047]: NETFILTER_CFG table=nat:101 family=2 entries=12 op=nft_register_rule pid=3047 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:49:23.716000 audit[3047]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffecc9de40 a2=0 a3=1 items=0 ppid=2686 pid=3047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:23.716000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:49:23.781379 env[1480]: time="2025-05-17T00:49:23.781283453Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:49:23.781379 env[1480]: time="2025-05-17T00:49:23.781327415Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:49:23.781379 env[1480]: time="2025-05-17T00:49:23.781337856Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:49:23.781805 env[1480]: time="2025-05-17T00:49:23.781754112Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9be2faa66ac60bc3e012e2b21e0c3b7e7e6e91cdef14e41c5603494b0f124c40 pid=3055 runtime=io.containerd.runc.v2 May 17 00:49:23.794461 systemd[1]: Started cri-containerd-9be2faa66ac60bc3e012e2b21e0c3b7e7e6e91cdef14e41c5603494b0f124c40.scope. May 17 00:49:23.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.805000 audit: BPF prog-id=120 op=LOAD May 17 00:49:23.806000 audit[3064]: AVC avc: denied { bpf } for pid=3064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.806000 audit[3064]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3055 pid=3064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:23.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962653266616136366163363062633365303132653262323165306333 May 17 00:49:23.806000 audit[3064]: AVC avc: denied { perfmon } for pid=3064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.806000 audit[3064]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3055 pid=3064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:23.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962653266616136366163363062633365303132653262323165306333 May 17 00:49:23.806000 audit[3064]: AVC avc: denied { bpf } for pid=3064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.806000 audit[3064]: AVC avc: denied { bpf } for pid=3064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.806000 audit[3064]: AVC avc: denied { bpf } for pid=3064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.806000 audit[3064]: AVC avc: denied { perfmon } for pid=3064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.806000 audit[3064]: AVC avc: denied { perfmon } for pid=3064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.806000 audit[3064]: AVC avc: denied { perfmon } for pid=3064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.806000 audit[3064]: AVC avc: denied { perfmon } for pid=3064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.806000 audit[3064]: AVC avc: denied { perfmon } for pid=3064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.806000 audit[3064]: AVC avc: denied { bpf } for pid=3064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.806000 audit[3064]: AVC avc: denied { bpf } for pid=3064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.806000 audit: BPF prog-id=121 op=LOAD May 17 00:49:23.806000 audit[3064]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3055 pid=3064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:23.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962653266616136366163363062633365303132653262323165306333 May 17 00:49:23.806000 audit[3064]: AVC avc: denied { bpf } for pid=3064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.806000 audit[3064]: AVC avc: denied { bpf } for pid=3064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.806000 audit[3064]: AVC avc: denied { perfmon } for pid=3064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.806000 audit[3064]: AVC avc: denied { perfmon } for pid=3064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.806000 audit[3064]: AVC avc: denied { perfmon } for pid=3064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.806000 audit[3064]: AVC avc: denied { perfmon } for pid=3064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.806000 audit[3064]: AVC avc: denied { perfmon } for pid=3064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.806000 audit[3064]: AVC avc: denied { bpf } for pid=3064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.806000 audit[3064]: AVC avc: denied { bpf } for pid=3064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.806000 audit: BPF prog-id=122 op=LOAD May 17 00:49:23.806000 audit[3064]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3055 pid=3064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:23.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962653266616136366163363062633365303132653262323165306333 May 17 00:49:23.806000 audit: BPF prog-id=122 op=UNLOAD May 17 00:49:23.806000 audit: BPF prog-id=121 op=UNLOAD May 17 00:49:23.806000 audit[3064]: AVC avc: denied { bpf } for pid=3064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.806000 audit[3064]: AVC avc: denied { bpf } for pid=3064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.806000 audit[3064]: AVC avc: denied { bpf } for pid=3064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.806000 audit[3064]: AVC avc: denied { perfmon } for pid=3064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.806000 audit[3064]: AVC avc: denied { perfmon } for pid=3064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.806000 audit[3064]: AVC avc: denied { perfmon } for pid=3064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.806000 audit[3064]: AVC avc: denied { perfmon } for pid=3064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.806000 audit[3064]: AVC avc: denied { perfmon } for pid=3064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.806000 audit[3064]: AVC avc: denied { bpf } for pid=3064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.806000 audit[3064]: AVC avc: denied { bpf } for pid=3064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:23.806000 audit: BPF prog-id=123 op=LOAD May 17 00:49:23.806000 audit[3064]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3055 pid=3064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:23.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962653266616136366163363062633365303132653262323165306333 May 17 00:49:23.824552 env[1480]: time="2025-05-17T00:49:23.824503022Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-6v7c4,Uid:c770ca07-f3f6-4b83-9d14-546719a62a34,Namespace:calico-system,Attempt:0,} returns sandbox id \"9be2faa66ac60bc3e012e2b21e0c3b7e7e6e91cdef14e41c5603494b0f124c40\"" May 17 00:49:25.142194 kubelet[2537]: E0517 00:49:25.142093 2537 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-52bcs" podUID="463fd6d8-2e06-42b8-ade3-8bda47d821b9" May 17 00:49:27.062535 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1392682302.mount: Deactivated successfully. May 17 00:49:27.214168 kubelet[2537]: E0517 00:49:27.142559 2537 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-52bcs" podUID="463fd6d8-2e06-42b8-ade3-8bda47d821b9" May 17 00:49:29.142528 kubelet[2537]: E0517 00:49:29.142468 2537 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-52bcs" podUID="463fd6d8-2e06-42b8-ade3-8bda47d821b9" May 17 00:49:31.143369 kubelet[2537]: E0517 00:49:31.142409 2537 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-52bcs" podUID="463fd6d8-2e06-42b8-ade3-8bda47d821b9" May 17 00:49:31.668313 env[1480]: time="2025-05-17T00:49:31.668259434Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:49:31.714931 env[1480]: time="2025-05-17T00:49:31.714875556Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:05ca98cdd7b8267a0dc5550048c0a195c8d42f85d92f090a669493485d8a6beb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:49:31.720724 env[1480]: time="2025-05-17T00:49:31.720671871Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:49:31.781173 env[1480]: time="2025-05-17T00:49:31.781122136Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:d282f6c773c4631b9dc8379eb093c54ca34c7728d55d6509cb45da5e1f5baf8f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:49:31.782059 env[1480]: time="2025-05-17T00:49:31.782028846Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.0\" returns image reference \"sha256:05ca98cdd7b8267a0dc5550048c0a195c8d42f85d92f090a669493485d8a6beb\"" May 17 00:49:31.784044 env[1480]: time="2025-05-17T00:49:31.783649461Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0\"" May 17 00:49:31.829491 env[1480]: time="2025-05-17T00:49:31.829450315Z" level=info msg="CreateContainer within sandbox \"bbfa7f23016354eac5a2742487e1d3b1213725ae6a61c05274619dd656b9ce21\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" May 17 00:49:31.976138 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3607375984.mount: Deactivated successfully. May 17 00:49:32.113689 env[1480]: time="2025-05-17T00:49:32.113634210Z" level=info msg="CreateContainer within sandbox \"bbfa7f23016354eac5a2742487e1d3b1213725ae6a61c05274619dd656b9ce21\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"f9b8dc7fb3faa672338bac78d0ef168eb0cbaf0985ec0c24818bf7d90ce8741b\"" May 17 00:49:32.114230 env[1480]: time="2025-05-17T00:49:32.114196749Z" level=info msg="StartContainer for \"f9b8dc7fb3faa672338bac78d0ef168eb0cbaf0985ec0c24818bf7d90ce8741b\"" May 17 00:49:32.135623 systemd[1]: Started cri-containerd-f9b8dc7fb3faa672338bac78d0ef168eb0cbaf0985ec0c24818bf7d90ce8741b.scope. May 17 00:49:32.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:32.157610 kernel: kauditd_printk_skb: 122 callbacks suppressed May 17 00:49:32.157737 kernel: audit: type=1400 audit(1747442972.150:894): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:32.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:32.194364 kernel: audit: type=1400 audit(1747442972.150:895): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:32.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:32.213006 kernel: audit: type=1400 audit(1747442972.150:896): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:32.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:32.237459 kernel: audit: type=1400 audit(1747442972.150:897): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:32.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:32.257738 kernel: audit: type=1400 audit(1747442972.150:898): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:32.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:32.277264 kernel: audit: type=1400 audit(1747442972.150:899): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:32.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:32.295390 kernel: audit: type=1400 audit(1747442972.150:900): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:32.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:32.312993 kernel: audit: type=1400 audit(1747442972.150:901): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:32.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:32.332683 kernel: audit: type=1400 audit(1747442972.150:902): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:32.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:32.350262 kernel: audit: type=1400 audit(1747442972.150:903): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:32.150000 audit: BPF prog-id=124 op=LOAD May 17 00:49:32.151000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:32.151000 audit[3099]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3013 pid=3099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:32.151000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639623864633766623366616136373233333862616337386430656631 May 17 00:49:32.151000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:32.151000 audit[3099]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3013 pid=3099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:32.151000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639623864633766623366616136373233333862616337386430656631 May 17 00:49:32.151000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:32.151000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:32.151000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:32.151000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:32.151000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:32.151000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:32.151000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:32.151000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:32.151000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:32.151000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:32.151000 audit: BPF prog-id=125 op=LOAD May 17 00:49:32.151000 audit[3099]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3013 pid=3099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:32.151000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639623864633766623366616136373233333862616337386430656631 May 17 00:49:32.156000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:32.156000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:32.156000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:32.156000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:32.156000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:32.156000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:32.156000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:32.156000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:32.156000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:32.156000 audit: BPF prog-id=126 op=LOAD May 17 00:49:32.156000 audit[3099]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3013 pid=3099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:32.156000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639623864633766623366616136373233333862616337386430656631 May 17 00:49:32.174000 audit: BPF prog-id=126 op=UNLOAD May 17 00:49:32.174000 audit: BPF prog-id=125 op=UNLOAD May 17 00:49:32.174000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:32.174000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:32.174000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:32.174000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:32.174000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:32.174000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:32.174000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:32.174000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:32.174000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:32.174000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:32.174000 audit: BPF prog-id=127 op=LOAD May 17 00:49:32.174000 audit[3099]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3013 pid=3099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:32.174000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639623864633766623366616136373233333862616337386430656631 May 17 00:49:32.475929 env[1480]: time="2025-05-17T00:49:32.475859489Z" level=info msg="StartContainer for \"f9b8dc7fb3faa672338bac78d0ef168eb0cbaf0985ec0c24818bf7d90ce8741b\" returns successfully" May 17 00:49:33.142997 kubelet[2537]: E0517 00:49:33.142632 2537 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-52bcs" podUID="463fd6d8-2e06-42b8-ade3-8bda47d821b9" May 17 00:49:33.557434 kubelet[2537]: E0517 00:49:33.557286 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:33.557434 kubelet[2537]: W0517 00:49:33.557312 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:33.557434 kubelet[2537]: E0517 00:49:33.557345 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:33.557896 kubelet[2537]: E0517 00:49:33.557727 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:33.557896 kubelet[2537]: W0517 00:49:33.557739 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:33.557896 kubelet[2537]: E0517 00:49:33.557804 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:33.558202 kubelet[2537]: E0517 00:49:33.558081 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:33.558202 kubelet[2537]: W0517 00:49:33.558092 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:33.558202 kubelet[2537]: E0517 00:49:33.558102 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:33.558528 kubelet[2537]: E0517 00:49:33.558395 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:33.558528 kubelet[2537]: W0517 00:49:33.558407 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:33.558528 kubelet[2537]: E0517 00:49:33.558417 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:33.558812 kubelet[2537]: E0517 00:49:33.558706 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:33.558812 kubelet[2537]: W0517 00:49:33.558718 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:33.558812 kubelet[2537]: E0517 00:49:33.558727 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:33.559087 kubelet[2537]: E0517 00:49:33.558983 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:33.559087 kubelet[2537]: W0517 00:49:33.558993 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:33.559087 kubelet[2537]: E0517 00:49:33.559003 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:33.559397 kubelet[2537]: E0517 00:49:33.559277 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:33.559397 kubelet[2537]: W0517 00:49:33.559288 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:33.559397 kubelet[2537]: E0517 00:49:33.559308 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:33.559709 kubelet[2537]: E0517 00:49:33.559577 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:33.559709 kubelet[2537]: W0517 00:49:33.559588 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:33.559709 kubelet[2537]: E0517 00:49:33.559598 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:33.559984 kubelet[2537]: E0517 00:49:33.559877 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:33.559984 kubelet[2537]: W0517 00:49:33.559887 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:33.559984 kubelet[2537]: E0517 00:49:33.559897 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:33.560326 kubelet[2537]: E0517 00:49:33.560165 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:33.560326 kubelet[2537]: W0517 00:49:33.560175 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:33.560326 kubelet[2537]: E0517 00:49:33.560188 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:33.560559 kubelet[2537]: E0517 00:49:33.560534 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:33.560707 kubelet[2537]: W0517 00:49:33.560545 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:33.560707 kubelet[2537]: E0517 00:49:33.560628 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:33.560876 kubelet[2537]: E0517 00:49:33.560863 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:33.560950 kubelet[2537]: W0517 00:49:33.560938 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:33.561010 kubelet[2537]: E0517 00:49:33.560999 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:33.561473 kubelet[2537]: E0517 00:49:33.561456 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:33.561570 kubelet[2537]: W0517 00:49:33.561556 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:33.561635 kubelet[2537]: E0517 00:49:33.561624 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:33.562019 kubelet[2537]: E0517 00:49:33.561995 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:33.562131 kubelet[2537]: W0517 00:49:33.562100 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:33.562196 kubelet[2537]: E0517 00:49:33.562185 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:33.562451 kubelet[2537]: E0517 00:49:33.562440 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:33.562542 kubelet[2537]: W0517 00:49:33.562527 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:33.562604 kubelet[2537]: E0517 00:49:33.562593 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:33.586146 kubelet[2537]: E0517 00:49:33.586115 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:33.586146 kubelet[2537]: W0517 00:49:33.586141 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:33.586344 kubelet[2537]: E0517 00:49:33.586161 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:33.586395 kubelet[2537]: E0517 00:49:33.586375 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:33.586395 kubelet[2537]: W0517 00:49:33.586390 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:33.586452 kubelet[2537]: E0517 00:49:33.586402 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:33.586609 kubelet[2537]: E0517 00:49:33.586591 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:33.586609 kubelet[2537]: W0517 00:49:33.586606 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:33.586679 kubelet[2537]: E0517 00:49:33.586616 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:33.586819 kubelet[2537]: E0517 00:49:33.586800 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:33.586819 kubelet[2537]: W0517 00:49:33.586816 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:33.586887 kubelet[2537]: E0517 00:49:33.586825 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:33.586967 kubelet[2537]: E0517 00:49:33.586951 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:33.586967 kubelet[2537]: W0517 00:49:33.586964 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:33.587026 kubelet[2537]: E0517 00:49:33.586972 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:33.587098 kubelet[2537]: E0517 00:49:33.587085 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:33.587098 kubelet[2537]: W0517 00:49:33.587096 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:33.587155 kubelet[2537]: E0517 00:49:33.587104 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:33.587277 kubelet[2537]: E0517 00:49:33.587261 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:33.587277 kubelet[2537]: W0517 00:49:33.587274 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:33.587346 kubelet[2537]: E0517 00:49:33.587283 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:33.587902 kubelet[2537]: E0517 00:49:33.587883 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:33.587902 kubelet[2537]: W0517 00:49:33.587898 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:33.587984 kubelet[2537]: E0517 00:49:33.587909 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:33.588086 kubelet[2537]: E0517 00:49:33.588063 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:33.588086 kubelet[2537]: W0517 00:49:33.588081 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:33.588174 kubelet[2537]: E0517 00:49:33.588093 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:33.588341 kubelet[2537]: E0517 00:49:33.588326 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:33.588341 kubelet[2537]: W0517 00:49:33.588339 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:33.588425 kubelet[2537]: E0517 00:49:33.588348 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:33.588616 kubelet[2537]: E0517 00:49:33.588599 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:33.588616 kubelet[2537]: W0517 00:49:33.588615 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:33.588694 kubelet[2537]: E0517 00:49:33.588634 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:33.588845 kubelet[2537]: E0517 00:49:33.588826 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:33.588845 kubelet[2537]: W0517 00:49:33.588842 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:33.588914 kubelet[2537]: E0517 00:49:33.588853 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:33.589027 kubelet[2537]: E0517 00:49:33.589012 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:33.589027 kubelet[2537]: W0517 00:49:33.589025 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:33.589081 kubelet[2537]: E0517 00:49:33.589035 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:33.589413 kubelet[2537]: E0517 00:49:33.589394 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:33.589413 kubelet[2537]: W0517 00:49:33.589410 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:33.589516 kubelet[2537]: E0517 00:49:33.589420 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:33.589587 kubelet[2537]: E0517 00:49:33.589559 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:33.589587 kubelet[2537]: W0517 00:49:33.589573 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:33.589587 kubelet[2537]: E0517 00:49:33.589581 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:33.589730 kubelet[2537]: E0517 00:49:33.589716 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:33.589730 kubelet[2537]: W0517 00:49:33.589728 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:33.589798 kubelet[2537]: E0517 00:49:33.589736 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:33.589894 kubelet[2537]: E0517 00:49:33.589882 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:33.589894 kubelet[2537]: W0517 00:49:33.589893 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:33.589951 kubelet[2537]: E0517 00:49:33.589901 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:33.590201 kubelet[2537]: E0517 00:49:33.590187 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:33.590201 kubelet[2537]: W0517 00:49:33.590199 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:33.590300 kubelet[2537]: E0517 00:49:33.590208 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:34.320498 env[1480]: time="2025-05-17T00:49:34.320451276Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:49:34.369257 env[1480]: time="2025-05-17T00:49:34.369189104Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:080eaf4c238c85534b61055c31b109c96ce3d20075391e58988541a442c7c701,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:49:34.417901 env[1480]: time="2025-05-17T00:49:34.417857610Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:49:34.465821 env[1480]: time="2025-05-17T00:49:34.465758411Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:ce76dd87f11d3fd0054c35ad2e0e9f833748d007f77a9bfe859d0ddcb66fcb2c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:49:34.466688 env[1480]: time="2025-05-17T00:49:34.466653399Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0\" returns image reference \"sha256:080eaf4c238c85534b61055c31b109c96ce3d20075391e58988541a442c7c701\"" May 17 00:49:34.477515 env[1480]: time="2025-05-17T00:49:34.477475543Z" level=info msg="CreateContainer within sandbox \"9be2faa66ac60bc3e012e2b21e0c3b7e7e6e91cdef14e41c5603494b0f124c40\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 17 00:49:34.481447 kubelet[2537]: I0517 00:49:34.481412 2537 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:49:34.567864 kubelet[2537]: E0517 00:49:34.567829 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:34.567864 kubelet[2537]: W0517 00:49:34.567855 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:34.568061 kubelet[2537]: E0517 00:49:34.567876 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:34.568061 kubelet[2537]: E0517 00:49:34.568023 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:34.568117 kubelet[2537]: W0517 00:49:34.568030 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:34.568117 kubelet[2537]: E0517 00:49:34.568080 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:34.568216 kubelet[2537]: E0517 00:49:34.568202 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:34.568216 kubelet[2537]: W0517 00:49:34.568215 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:34.568322 kubelet[2537]: E0517 00:49:34.568223 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:34.568403 kubelet[2537]: E0517 00:49:34.568391 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:34.568403 kubelet[2537]: W0517 00:49:34.568402 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:34.568484 kubelet[2537]: E0517 00:49:34.568412 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:34.568565 kubelet[2537]: E0517 00:49:34.568553 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:34.568565 kubelet[2537]: W0517 00:49:34.568564 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:34.568641 kubelet[2537]: E0517 00:49:34.568573 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:34.568699 kubelet[2537]: E0517 00:49:34.568683 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:34.568699 kubelet[2537]: W0517 00:49:34.568697 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:34.568774 kubelet[2537]: E0517 00:49:34.568704 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:34.568825 kubelet[2537]: E0517 00:49:34.568809 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:34.568825 kubelet[2537]: W0517 00:49:34.568821 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:34.568900 kubelet[2537]: E0517 00:49:34.568829 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:34.568951 kubelet[2537]: E0517 00:49:34.568935 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:34.568951 kubelet[2537]: W0517 00:49:34.568947 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:34.569027 kubelet[2537]: E0517 00:49:34.568954 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:34.569092 kubelet[2537]: E0517 00:49:34.569079 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:34.569092 kubelet[2537]: W0517 00:49:34.569090 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:34.569165 kubelet[2537]: E0517 00:49:34.569098 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:34.569224 kubelet[2537]: E0517 00:49:34.569212 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:34.569224 kubelet[2537]: W0517 00:49:34.569223 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:34.569321 kubelet[2537]: E0517 00:49:34.569230 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:34.569377 kubelet[2537]: E0517 00:49:34.569360 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:34.569377 kubelet[2537]: W0517 00:49:34.569373 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:34.569447 kubelet[2537]: E0517 00:49:34.569381 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:34.569506 kubelet[2537]: E0517 00:49:34.569493 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:34.569506 kubelet[2537]: W0517 00:49:34.569504 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:34.569576 kubelet[2537]: E0517 00:49:34.569511 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:34.569655 kubelet[2537]: E0517 00:49:34.569642 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:34.569655 kubelet[2537]: W0517 00:49:34.569653 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:34.569730 kubelet[2537]: E0517 00:49:34.569661 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:34.569791 kubelet[2537]: E0517 00:49:34.569775 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:34.569791 kubelet[2537]: W0517 00:49:34.569786 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:34.569867 kubelet[2537]: E0517 00:49:34.569793 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:34.569930 kubelet[2537]: E0517 00:49:34.569917 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:34.569930 kubelet[2537]: W0517 00:49:34.569928 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:34.570000 kubelet[2537]: E0517 00:49:34.569936 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:34.593672 kubelet[2537]: E0517 00:49:34.593575 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:34.593827 kubelet[2537]: W0517 00:49:34.593809 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:34.593926 kubelet[2537]: E0517 00:49:34.593912 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:34.594253 kubelet[2537]: E0517 00:49:34.594220 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:34.594352 kubelet[2537]: W0517 00:49:34.594338 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:34.594427 kubelet[2537]: E0517 00:49:34.594415 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:34.594662 kubelet[2537]: E0517 00:49:34.594651 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:34.594748 kubelet[2537]: W0517 00:49:34.594735 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:34.594825 kubelet[2537]: E0517 00:49:34.594814 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:34.595107 kubelet[2537]: E0517 00:49:34.595094 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:34.595193 kubelet[2537]: W0517 00:49:34.595182 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:34.595281 kubelet[2537]: E0517 00:49:34.595270 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:34.595521 kubelet[2537]: E0517 00:49:34.595511 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:34.595608 kubelet[2537]: W0517 00:49:34.595596 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:34.595685 kubelet[2537]: E0517 00:49:34.595673 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:34.595979 kubelet[2537]: E0517 00:49:34.595967 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:34.596084 kubelet[2537]: W0517 00:49:34.596071 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:34.596539 kubelet[2537]: E0517 00:49:34.596514 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:34.597177 kubelet[2537]: E0517 00:49:34.597146 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:34.597365 kubelet[2537]: W0517 00:49:34.597348 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:34.597488 kubelet[2537]: E0517 00:49:34.597463 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:34.597780 kubelet[2537]: E0517 00:49:34.597764 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:34.597869 kubelet[2537]: W0517 00:49:34.597856 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:34.597942 kubelet[2537]: E0517 00:49:34.597929 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:34.598172 kubelet[2537]: E0517 00:49:34.598160 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:34.598304 kubelet[2537]: W0517 00:49:34.598290 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:34.598459 kubelet[2537]: E0517 00:49:34.598446 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:34.598703 kubelet[2537]: E0517 00:49:34.598690 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:34.598790 kubelet[2537]: W0517 00:49:34.598777 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:34.598862 kubelet[2537]: E0517 00:49:34.598851 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:34.599090 kubelet[2537]: E0517 00:49:34.599078 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:34.599172 kubelet[2537]: W0517 00:49:34.599161 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:34.599258 kubelet[2537]: E0517 00:49:34.599246 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:34.599569 kubelet[2537]: E0517 00:49:34.599555 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:34.599657 kubelet[2537]: W0517 00:49:34.599645 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:34.599719 kubelet[2537]: E0517 00:49:34.599702 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:34.600031 kubelet[2537]: E0517 00:49:34.600012 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:34.600031 kubelet[2537]: W0517 00:49:34.600029 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:34.600191 kubelet[2537]: E0517 00:49:34.600041 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:34.600604 kubelet[2537]: E0517 00:49:34.600582 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:34.600604 kubelet[2537]: W0517 00:49:34.600602 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:34.600708 kubelet[2537]: E0517 00:49:34.600618 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:34.600787 kubelet[2537]: E0517 00:49:34.600766 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:34.600787 kubelet[2537]: W0517 00:49:34.600783 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:34.600873 kubelet[2537]: E0517 00:49:34.600792 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:34.600963 kubelet[2537]: E0517 00:49:34.600950 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:34.600963 kubelet[2537]: W0517 00:49:34.600961 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:34.601039 kubelet[2537]: E0517 00:49:34.600970 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:34.601156 kubelet[2537]: E0517 00:49:34.601139 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:34.601156 kubelet[2537]: W0517 00:49:34.601150 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:34.601218 kubelet[2537]: E0517 00:49:34.601159 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:34.601499 kubelet[2537]: E0517 00:49:34.601484 2537 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:49:34.601499 kubelet[2537]: W0517 00:49:34.601497 2537 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:49:34.601657 kubelet[2537]: E0517 00:49:34.601506 2537 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:49:34.635714 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1046090710.mount: Deactivated successfully. May 17 00:49:35.142504 kubelet[2537]: E0517 00:49:35.142460 2537 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-52bcs" podUID="463fd6d8-2e06-42b8-ade3-8bda47d821b9" May 17 00:49:37.143580 kubelet[2537]: E0517 00:49:37.143529 2537 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-52bcs" podUID="463fd6d8-2e06-42b8-ade3-8bda47d821b9" May 17 00:49:37.274629 env[1480]: time="2025-05-17T00:49:37.274561831Z" level=info msg="CreateContainer within sandbox \"9be2faa66ac60bc3e012e2b21e0c3b7e7e6e91cdef14e41c5603494b0f124c40\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"d8218f7ac6c4803e2496f73d483ac52f99d7149b5fa428edb3e12377fbc28edf\"" May 17 00:49:37.277017 env[1480]: time="2025-05-17T00:49:37.275274692Z" level=info msg="StartContainer for \"d8218f7ac6c4803e2496f73d483ac52f99d7149b5fa428edb3e12377fbc28edf\"" May 17 00:49:37.295399 systemd[1]: Started cri-containerd-d8218f7ac6c4803e2496f73d483ac52f99d7149b5fa428edb3e12377fbc28edf.scope. May 17 00:49:37.315000 audit[3210]: AVC avc: denied { perfmon } for pid=3210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:37.320873 kernel: kauditd_printk_skb: 47 callbacks suppressed May 17 00:49:37.320985 kernel: audit: type=1400 audit(1747442977.315:912): avc: denied { perfmon } for pid=3210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:37.315000 audit[3210]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=3055 pid=3210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:37.368543 kernel: audit: type=1300 audit(1747442977.315:912): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=3055 pid=3210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:37.368927 kernel: audit: type=1327 audit(1747442977.315:912): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438323138663761633663343830336532343936663733643438336163 May 17 00:49:37.315000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438323138663761633663343830336532343936663733643438336163 May 17 00:49:37.315000 audit[3210]: AVC avc: denied { bpf } for pid=3210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:37.415870 kernel: audit: type=1400 audit(1747442977.315:913): avc: denied { bpf } for pid=3210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:37.315000 audit[3210]: AVC avc: denied { bpf } for pid=3210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:37.434968 kernel: audit: type=1400 audit(1747442977.315:913): avc: denied { bpf } for pid=3210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:37.436565 kernel: audit: type=1400 audit(1747442977.315:913): avc: denied { bpf } for pid=3210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:37.315000 audit[3210]: AVC avc: denied { bpf } for pid=3210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:37.315000 audit[3210]: AVC avc: denied { perfmon } for pid=3210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:37.474556 kernel: audit: type=1400 audit(1747442977.315:913): avc: denied { perfmon } for pid=3210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:37.315000 audit[3210]: AVC avc: denied { perfmon } for pid=3210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:37.493881 kernel: audit: type=1400 audit(1747442977.315:913): avc: denied { perfmon } for pid=3210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:37.315000 audit[3210]: AVC avc: denied { perfmon } for pid=3210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:37.513796 kernel: audit: type=1400 audit(1747442977.315:913): avc: denied { perfmon } for pid=3210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:37.315000 audit[3210]: AVC avc: denied { perfmon } for pid=3210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:37.535794 kernel: audit: type=1400 audit(1747442977.315:913): avc: denied { perfmon } for pid=3210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:37.514481 systemd[1]: cri-containerd-d8218f7ac6c4803e2496f73d483ac52f99d7149b5fa428edb3e12377fbc28edf.scope: Deactivated successfully. May 17 00:49:37.315000 audit[3210]: AVC avc: denied { perfmon } for pid=3210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:37.315000 audit[3210]: AVC avc: denied { bpf } for pid=3210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:37.315000 audit[3210]: AVC avc: denied { bpf } for pid=3210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:37.315000 audit: BPF prog-id=128 op=LOAD May 17 00:49:37.315000 audit[3210]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=3055 pid=3210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:37.315000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438323138663761633663343830336532343936663733643438336163 May 17 00:49:37.320000 audit[3210]: AVC avc: denied { bpf } for pid=3210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:37.320000 audit[3210]: AVC avc: denied { bpf } for pid=3210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:37.320000 audit[3210]: AVC avc: denied { perfmon } for pid=3210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:37.320000 audit[3210]: AVC avc: denied { perfmon } for pid=3210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:37.320000 audit[3210]: AVC avc: denied { perfmon } for pid=3210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:37.320000 audit[3210]: AVC avc: denied { perfmon } for pid=3210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:37.320000 audit[3210]: AVC avc: denied { perfmon } for pid=3210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:37.320000 audit[3210]: AVC avc: denied { bpf } for pid=3210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:37.320000 audit[3210]: AVC avc: denied { bpf } for pid=3210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:37.320000 audit: BPF prog-id=129 op=LOAD May 17 00:49:37.320000 audit[3210]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=3055 pid=3210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:37.320000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438323138663761633663343830336532343936663733643438336163 May 17 00:49:37.339000 audit: BPF prog-id=129 op=UNLOAD May 17 00:49:37.339000 audit: BPF prog-id=128 op=UNLOAD May 17 00:49:37.339000 audit[3210]: AVC avc: denied { bpf } for pid=3210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:37.339000 audit[3210]: AVC avc: denied { bpf } for pid=3210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:37.339000 audit[3210]: AVC avc: denied { bpf } for pid=3210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:37.339000 audit[3210]: AVC avc: denied { perfmon } for pid=3210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:37.339000 audit[3210]: AVC avc: denied { perfmon } for pid=3210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:37.339000 audit[3210]: AVC avc: denied { perfmon } for pid=3210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:37.339000 audit[3210]: AVC avc: denied { perfmon } for pid=3210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:37.339000 audit[3210]: AVC avc: denied { perfmon } for pid=3210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:37.339000 audit[3210]: AVC avc: denied { bpf } for pid=3210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:37.339000 audit[3210]: AVC avc: denied { bpf } for pid=3210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:37.339000 audit: BPF prog-id=130 op=LOAD May 17 00:49:37.339000 audit[3210]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=3055 pid=3210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:37.339000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438323138663761633663343830336532343936663733643438336163 May 17 00:49:37.536000 audit: BPF prog-id=130 op=UNLOAD May 17 00:49:37.537515 env[1480]: time="2025-05-17T00:49:37.537472722Z" level=info msg="StartContainer for \"d8218f7ac6c4803e2496f73d483ac52f99d7149b5fa428edb3e12377fbc28edf\" returns successfully" May 17 00:49:37.560714 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-d8218f7ac6c4803e2496f73d483ac52f99d7149b5fa428edb3e12377fbc28edf-rootfs.mount: Deactivated successfully. May 17 00:49:38.510541 kubelet[2537]: I0517 00:49:38.510483 2537 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-5979bc79b5-m6wnm" podStartSLOduration=8.367281749 podStartE2EDuration="16.51046814s" podCreationTimestamp="2025-05-17 00:49:22 +0000 UTC" firstStartedPulling="2025-05-17 00:49:23.640306425 +0000 UTC m=+22.632303340" lastFinishedPulling="2025-05-17 00:49:31.783492776 +0000 UTC m=+30.775489731" observedRunningTime="2025-05-17 00:49:33.495821243 +0000 UTC m=+32.487818158" watchObservedRunningTime="2025-05-17 00:49:38.51046814 +0000 UTC m=+37.502465055" May 17 00:49:39.143508 kubelet[2537]: E0517 00:49:39.143453 2537 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-52bcs" podUID="463fd6d8-2e06-42b8-ade3-8bda47d821b9" May 17 00:49:41.143042 kubelet[2537]: E0517 00:49:41.142980 2537 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-52bcs" podUID="463fd6d8-2e06-42b8-ade3-8bda47d821b9" May 17 00:49:41.388995 env[1480]: time="2025-05-17T00:49:41.388865845Z" level=info msg="shim disconnected" id=d8218f7ac6c4803e2496f73d483ac52f99d7149b5fa428edb3e12377fbc28edf May 17 00:49:41.388995 env[1480]: time="2025-05-17T00:49:41.388916727Z" level=warning msg="cleaning up after shim disconnected" id=d8218f7ac6c4803e2496f73d483ac52f99d7149b5fa428edb3e12377fbc28edf namespace=k8s.io May 17 00:49:41.388995 env[1480]: time="2025-05-17T00:49:41.388940367Z" level=info msg="cleaning up dead shim" May 17 00:49:41.396374 env[1480]: time="2025-05-17T00:49:41.396247134Z" level=warning msg="cleanup warnings time=\"2025-05-17T00:49:41Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3253 runtime=io.containerd.runc.v2\n" May 17 00:49:41.500099 env[1480]: time="2025-05-17T00:49:41.500015067Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.0\"" May 17 00:49:43.144742 kubelet[2537]: E0517 00:49:43.144687 2537 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-52bcs" podUID="463fd6d8-2e06-42b8-ade3-8bda47d821b9" May 17 00:49:44.267739 env[1480]: time="2025-05-17T00:49:44.267691784Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:49:44.279345 env[1480]: time="2025-05-17T00:49:44.279303217Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0a1b3d5412de2974bc057a3463a132f935c307bc06d5b990ad54031e1f5a351d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:49:44.285912 env[1480]: time="2025-05-17T00:49:44.285012611Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:49:44.289983 env[1480]: time="2025-05-17T00:49:44.289947105Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:3dd06656abdc03fbd51782d5f6fe4d70e6825a1c0c5bce2a165bbd2ff9e0f7df,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:49:44.290807 env[1480]: time="2025-05-17T00:49:44.290777207Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.0\" returns image reference \"sha256:0a1b3d5412de2974bc057a3463a132f935c307bc06d5b990ad54031e1f5a351d\"" May 17 00:49:44.298780 env[1480]: time="2025-05-17T00:49:44.298728502Z" level=info msg="CreateContainer within sandbox \"9be2faa66ac60bc3e012e2b21e0c3b7e7e6e91cdef14e41c5603494b0f124c40\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 17 00:49:44.348500 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2124092116.mount: Deactivated successfully. May 17 00:49:44.383299 env[1480]: time="2025-05-17T00:49:44.383223743Z" level=info msg="CreateContainer within sandbox \"9be2faa66ac60bc3e012e2b21e0c3b7e7e6e91cdef14e41c5603494b0f124c40\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"e8a91f68a078de3ca5c2bf914e1fdffe51e03d0fc0ff1ec18080370aaf19b038\"" May 17 00:49:44.383920 env[1480]: time="2025-05-17T00:49:44.383807678Z" level=info msg="StartContainer for \"e8a91f68a078de3ca5c2bf914e1fdffe51e03d0fc0ff1ec18080370aaf19b038\"" May 17 00:49:44.413370 systemd[1]: Started cri-containerd-e8a91f68a078de3ca5c2bf914e1fdffe51e03d0fc0ff1ec18080370aaf19b038.scope. May 17 00:49:44.432000 audit[3273]: AVC avc: denied { perfmon } for pid=3273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:44.439141 kernel: kauditd_printk_skb: 34 callbacks suppressed May 17 00:49:44.439229 kernel: audit: type=1400 audit(1747442984.432:919): avc: denied { perfmon } for pid=3273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:44.432000 audit[3273]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=3055 pid=3273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:44.485066 kernel: audit: type=1300 audit(1747442984.432:919): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=3055 pid=3273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:44.432000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538613931663638613037386465336361356332626639313465316664 May 17 00:49:44.510391 kernel: audit: type=1327 audit(1747442984.432:919): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538613931663638613037386465336361356332626639313465316664 May 17 00:49:44.432000 audit[3273]: AVC avc: denied { bpf } for pid=3273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:44.530115 kernel: audit: type=1400 audit(1747442984.432:920): avc: denied { bpf } for pid=3273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:44.432000 audit[3273]: AVC avc: denied { bpf } for pid=3273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:44.549533 kernel: audit: type=1400 audit(1747442984.432:920): avc: denied { bpf } for pid=3273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:44.432000 audit[3273]: AVC avc: denied { bpf } for pid=3273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:44.568660 kernel: audit: type=1400 audit(1747442984.432:920): avc: denied { bpf } for pid=3273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:44.432000 audit[3273]: AVC avc: denied { perfmon } for pid=3273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:44.587768 kernel: audit: type=1400 audit(1747442984.432:920): avc: denied { perfmon } for pid=3273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:44.432000 audit[3273]: AVC avc: denied { perfmon } for pid=3273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:44.605622 kernel: audit: type=1400 audit(1747442984.432:920): avc: denied { perfmon } for pid=3273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:44.605692 env[1480]: time="2025-05-17T00:49:44.588031991Z" level=info msg="StartContainer for \"e8a91f68a078de3ca5c2bf914e1fdffe51e03d0fc0ff1ec18080370aaf19b038\" returns successfully" May 17 00:49:44.432000 audit[3273]: AVC avc: denied { perfmon } for pid=3273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:44.624310 kernel: audit: type=1400 audit(1747442984.432:920): avc: denied { perfmon } for pid=3273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:44.432000 audit[3273]: AVC avc: denied { perfmon } for pid=3273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:44.643155 kernel: audit: type=1400 audit(1747442984.432:920): avc: denied { perfmon } for pid=3273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:44.432000 audit[3273]: AVC avc: denied { perfmon } for pid=3273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:44.432000 audit[3273]: AVC avc: denied { bpf } for pid=3273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:44.432000 audit[3273]: AVC avc: denied { bpf } for pid=3273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:44.432000 audit: BPF prog-id=131 op=LOAD May 17 00:49:44.432000 audit[3273]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001478e0 a2=78 a3=0 items=0 ppid=3055 pid=3273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:44.432000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538613931663638613037386465336361356332626639313465316664 May 17 00:49:44.432000 audit[3273]: AVC avc: denied { bpf } for pid=3273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:44.432000 audit[3273]: AVC avc: denied { bpf } for pid=3273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:44.432000 audit[3273]: AVC avc: denied { perfmon } for pid=3273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:44.432000 audit[3273]: AVC avc: denied { perfmon } for pid=3273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:44.432000 audit[3273]: AVC avc: denied { perfmon } for pid=3273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:44.432000 audit[3273]: AVC avc: denied { perfmon } for pid=3273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:44.432000 audit[3273]: AVC avc: denied { perfmon } for pid=3273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:44.432000 audit[3273]: AVC avc: denied { bpf } for pid=3273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:44.432000 audit[3273]: AVC avc: denied { bpf } for pid=3273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:44.432000 audit: BPF prog-id=132 op=LOAD May 17 00:49:44.432000 audit[3273]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000147670 a2=78 a3=0 items=0 ppid=3055 pid=3273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:44.432000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538613931663638613037386465336361356332626639313465316664 May 17 00:49:44.432000 audit: BPF prog-id=132 op=UNLOAD May 17 00:49:44.432000 audit: BPF prog-id=131 op=UNLOAD May 17 00:49:44.432000 audit[3273]: AVC avc: denied { bpf } for pid=3273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:44.432000 audit[3273]: AVC avc: denied { bpf } for pid=3273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:44.432000 audit[3273]: AVC avc: denied { bpf } for pid=3273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:44.432000 audit[3273]: AVC avc: denied { perfmon } for pid=3273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:44.432000 audit[3273]: AVC avc: denied { perfmon } for pid=3273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:44.432000 audit[3273]: AVC avc: denied { perfmon } for pid=3273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:44.432000 audit[3273]: AVC avc: denied { perfmon } for pid=3273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:44.432000 audit[3273]: AVC avc: denied { perfmon } for pid=3273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:44.432000 audit[3273]: AVC avc: denied { bpf } for pid=3273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:44.432000 audit[3273]: AVC avc: denied { bpf } for pid=3273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:44.432000 audit: BPF prog-id=133 op=LOAD May 17 00:49:44.432000 audit[3273]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000147b40 a2=78 a3=0 items=0 ppid=3055 pid=3273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:44.432000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538613931663638613037386465336361356332626639313465316664 May 17 00:49:44.739597 kubelet[2537]: I0517 00:49:44.739157 2537 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:49:44.782000 audit[3301]: NETFILTER_CFG table=filter:102 family=2 entries=21 op=nft_register_rule pid=3301 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:49:44.782000 audit[3301]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=7480 a0=3 a1=ffffc7292460 a2=0 a3=1 items=0 ppid=2686 pid=3301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:44.782000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:49:44.786000 audit[3301]: NETFILTER_CFG table=nat:103 family=2 entries=19 op=nft_register_chain pid=3301 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:49:44.786000 audit[3301]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6276 a0=3 a1=ffffc7292460 a2=0 a3=1 items=0 ppid=2686 pid=3301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:44.786000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:49:45.143960 kubelet[2537]: E0517 00:49:45.143834 2537 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-52bcs" podUID="463fd6d8-2e06-42b8-ade3-8bda47d821b9" May 17 00:49:45.344868 systemd[1]: run-containerd-runc-k8s.io-e8a91f68a078de3ca5c2bf914e1fdffe51e03d0fc0ff1ec18080370aaf19b038-runc.vEKxyc.mount: Deactivated successfully. May 17 00:49:45.824166 env[1480]: time="2025-05-17T00:49:45.824107110Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 17 00:49:45.827380 systemd[1]: cri-containerd-e8a91f68a078de3ca5c2bf914e1fdffe51e03d0fc0ff1ec18080370aaf19b038.scope: Deactivated successfully. May 17 00:49:45.830000 audit: BPF prog-id=133 op=UNLOAD May 17 00:49:45.848117 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-e8a91f68a078de3ca5c2bf914e1fdffe51e03d0fc0ff1ec18080370aaf19b038-rootfs.mount: Deactivated successfully. May 17 00:49:45.903412 kubelet[2537]: I0517 00:49:45.903380 2537 kubelet_node_status.go:501] "Fast updating node status as it just became ready" May 17 00:49:46.681585 systemd[1]: Created slice kubepods-burstable-podc807ebf0_49df_4644_b8ed_52a104f87f64.slice. May 17 00:49:46.690436 systemd[1]: Created slice kubepods-burstable-pod91388974_d4b7_418c_97fd_7623f7fc5ad5.slice. May 17 00:49:46.698595 systemd[1]: Created slice kubepods-besteffort-pod463fd6d8_2e06_42b8_ade3_8bda47d821b9.slice. May 17 00:49:46.701884 env[1480]: time="2025-05-17T00:49:46.701652299Z" level=info msg="shim disconnected" id=e8a91f68a078de3ca5c2bf914e1fdffe51e03d0fc0ff1ec18080370aaf19b038 May 17 00:49:46.701884 env[1480]: time="2025-05-17T00:49:46.701700900Z" level=warning msg="cleaning up after shim disconnected" id=e8a91f68a078de3ca5c2bf914e1fdffe51e03d0fc0ff1ec18080370aaf19b038 namespace=k8s.io May 17 00:49:46.701884 env[1480]: time="2025-05-17T00:49:46.701710420Z" level=info msg="cleaning up dead shim" May 17 00:49:46.708776 env[1480]: time="2025-05-17T00:49:46.708369635Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-52bcs,Uid:463fd6d8-2e06-42b8-ade3-8bda47d821b9,Namespace:calico-system,Attempt:0,}" May 17 00:49:46.715908 systemd[1]: Created slice kubepods-besteffort-pod072e45c7_a564_4ff1_8f56_8086de5cb47f.slice. May 17 00:49:46.722328 systemd[1]: Created slice kubepods-besteffort-podcfe725ea_fbe7_42b1_b5de_fc1e1a86ac51.slice. May 17 00:49:46.723205 env[1480]: time="2025-05-17T00:49:46.723166503Z" level=warning msg="cleanup warnings time=\"2025-05-17T00:49:46Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3314 runtime=io.containerd.runc.v2\n" May 17 00:49:46.755207 systemd[1]: Created slice kubepods-besteffort-pod0379ba0d_b0c4_497d_af1d_507d240f1f57.slice. May 17 00:49:46.772830 systemd[1]: Created slice kubepods-besteffort-pod85f144ac_4d39_496d_b3d5_66149a1574d7.slice. May 17 00:49:46.787713 systemd[1]: Created slice kubepods-besteffort-podda20061a_c164_4dad_aec7_b54414ff9706.slice. May 17 00:49:46.825402 kubelet[2537]: I0517 00:49:46.825355 2537 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-nftgm\" (UniqueName: \"kubernetes.io/projected/cfe725ea-fbe7-42b1-b5de-fc1e1a86ac51-kube-api-access-nftgm\") pod \"calico-kube-controllers-647fb858cc-jtf2c\" (UID: \"cfe725ea-fbe7-42b1-b5de-fc1e1a86ac51\") " pod="calico-system/calico-kube-controllers-647fb858cc-jtf2c" May 17 00:49:46.825640 kubelet[2537]: I0517 00:49:46.825622 2537 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/c807ebf0-49df-4644-b8ed-52a104f87f64-config-volume\") pod \"coredns-674b8bbfcf-cxrsr\" (UID: \"c807ebf0-49df-4644-b8ed-52a104f87f64\") " pod="kube-system/coredns-674b8bbfcf-cxrsr" May 17 00:49:46.825729 kubelet[2537]: I0517 00:49:46.825715 2537 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-25dff\" (UniqueName: \"kubernetes.io/projected/072e45c7-a564-4ff1-8f56-8086de5cb47f-kube-api-access-25dff\") pod \"calico-apiserver-84c64ddb56-27tsz\" (UID: \"072e45c7-a564-4ff1-8f56-8086de5cb47f\") " pod="calico-apiserver/calico-apiserver-84c64ddb56-27tsz" May 17 00:49:46.825814 kubelet[2537]: I0517 00:49:46.825797 2537 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/91388974-d4b7-418c-97fd-7623f7fc5ad5-config-volume\") pod \"coredns-674b8bbfcf-j679t\" (UID: \"91388974-d4b7-418c-97fd-7623f7fc5ad5\") " pod="kube-system/coredns-674b8bbfcf-j679t" May 17 00:49:46.825928 kubelet[2537]: I0517 00:49:46.825914 2537 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-894qm\" (UniqueName: \"kubernetes.io/projected/91388974-d4b7-418c-97fd-7623f7fc5ad5-kube-api-access-894qm\") pod \"coredns-674b8bbfcf-j679t\" (UID: \"91388974-d4b7-418c-97fd-7623f7fc5ad5\") " pod="kube-system/coredns-674b8bbfcf-j679t" May 17 00:49:46.826028 kubelet[2537]: I0517 00:49:46.826014 2537 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/cfe725ea-fbe7-42b1-b5de-fc1e1a86ac51-tigera-ca-bundle\") pod \"calico-kube-controllers-647fb858cc-jtf2c\" (UID: \"cfe725ea-fbe7-42b1-b5de-fc1e1a86ac51\") " pod="calico-system/calico-kube-controllers-647fb858cc-jtf2c" May 17 00:49:46.826112 kubelet[2537]: I0517 00:49:46.826099 2537 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/072e45c7-a564-4ff1-8f56-8086de5cb47f-calico-apiserver-certs\") pod \"calico-apiserver-84c64ddb56-27tsz\" (UID: \"072e45c7-a564-4ff1-8f56-8086de5cb47f\") " pod="calico-apiserver/calico-apiserver-84c64ddb56-27tsz" May 17 00:49:46.826193 kubelet[2537]: I0517 00:49:46.826180 2537 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2m4jb\" (UniqueName: \"kubernetes.io/projected/c807ebf0-49df-4644-b8ed-52a104f87f64-kube-api-access-2m4jb\") pod \"coredns-674b8bbfcf-cxrsr\" (UID: \"c807ebf0-49df-4644-b8ed-52a104f87f64\") " pod="kube-system/coredns-674b8bbfcf-cxrsr" May 17 00:49:46.860419 env[1480]: time="2025-05-17T00:49:46.860343578Z" level=error msg="Failed to destroy network for sandbox \"40f13856fce73837b8380c544d31c04049bd84a3ceeb000c4fce95e608012a25\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:49:46.863149 env[1480]: time="2025-05-17T00:49:46.863088850Z" level=error msg="encountered an error cleaning up failed sandbox \"40f13856fce73837b8380c544d31c04049bd84a3ceeb000c4fce95e608012a25\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:49:46.863400 env[1480]: time="2025-05-17T00:49:46.863359737Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-52bcs,Uid:463fd6d8-2e06-42b8-ade3-8bda47d821b9,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"40f13856fce73837b8380c544d31c04049bd84a3ceeb000c4fce95e608012a25\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:49:46.864581 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-40f13856fce73837b8380c544d31c04049bd84a3ceeb000c4fce95e608012a25-shm.mount: Deactivated successfully. May 17 00:49:46.865368 kubelet[2537]: E0517 00:49:46.865325 2537 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"40f13856fce73837b8380c544d31c04049bd84a3ceeb000c4fce95e608012a25\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:49:46.865451 kubelet[2537]: E0517 00:49:46.865414 2537 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"40f13856fce73837b8380c544d31c04049bd84a3ceeb000c4fce95e608012a25\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-52bcs" May 17 00:49:46.865451 kubelet[2537]: E0517 00:49:46.865435 2537 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"40f13856fce73837b8380c544d31c04049bd84a3ceeb000c4fce95e608012a25\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-52bcs" May 17 00:49:46.865513 kubelet[2537]: E0517 00:49:46.865484 2537 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-52bcs_calico-system(463fd6d8-2e06-42b8-ade3-8bda47d821b9)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-52bcs_calico-system(463fd6d8-2e06-42b8-ade3-8bda47d821b9)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"40f13856fce73837b8380c544d31c04049bd84a3ceeb000c4fce95e608012a25\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-52bcs" podUID="463fd6d8-2e06-42b8-ade3-8bda47d821b9" May 17 00:49:46.928275 kubelet[2537]: I0517 00:49:46.927489 2537 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-key-pair\" (UniqueName: \"kubernetes.io/secret/85f144ac-4d39-496d-b3d5-66149a1574d7-goldmane-key-pair\") pod \"goldmane-78d55f7ddc-pmkbg\" (UID: \"85f144ac-4d39-496d-b3d5-66149a1574d7\") " pod="calico-system/goldmane-78d55f7ddc-pmkbg" May 17 00:49:46.928275 kubelet[2537]: I0517 00:49:46.927536 2537 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/da20061a-c164-4dad-aec7-b54414ff9706-calico-apiserver-certs\") pod \"calico-apiserver-84c64ddb56-5dt2v\" (UID: \"da20061a-c164-4dad-aec7-b54414ff9706\") " pod="calico-apiserver/calico-apiserver-84c64ddb56-5dt2v" May 17 00:49:46.928275 kubelet[2537]: I0517 00:49:46.927570 2537 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config\" (UniqueName: \"kubernetes.io/configmap/85f144ac-4d39-496d-b3d5-66149a1574d7-config\") pod \"goldmane-78d55f7ddc-pmkbg\" (UID: \"85f144ac-4d39-496d-b3d5-66149a1574d7\") " pod="calico-system/goldmane-78d55f7ddc-pmkbg" May 17 00:49:46.928275 kubelet[2537]: I0517 00:49:46.927609 2537 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/85f144ac-4d39-496d-b3d5-66149a1574d7-goldmane-ca-bundle\") pod \"goldmane-78d55f7ddc-pmkbg\" (UID: \"85f144ac-4d39-496d-b3d5-66149a1574d7\") " pod="calico-system/goldmane-78d55f7ddc-pmkbg" May 17 00:49:46.928275 kubelet[2537]: I0517 00:49:46.927625 2537 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vsxmd\" (UniqueName: \"kubernetes.io/projected/0379ba0d-b0c4-497d-af1d-507d240f1f57-kube-api-access-vsxmd\") pod \"whisker-b77f4458b-bwdl4\" (UID: \"0379ba0d-b0c4-497d-af1d-507d240f1f57\") " pod="calico-system/whisker-b77f4458b-bwdl4" May 17 00:49:46.928710 kubelet[2537]: I0517 00:49:46.927655 2537 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vwtwv\" (UniqueName: \"kubernetes.io/projected/85f144ac-4d39-496d-b3d5-66149a1574d7-kube-api-access-vwtwv\") pod \"goldmane-78d55f7ddc-pmkbg\" (UID: \"85f144ac-4d39-496d-b3d5-66149a1574d7\") " pod="calico-system/goldmane-78d55f7ddc-pmkbg" May 17 00:49:46.928710 kubelet[2537]: I0517 00:49:46.927707 2537 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/0379ba0d-b0c4-497d-af1d-507d240f1f57-whisker-backend-key-pair\") pod \"whisker-b77f4458b-bwdl4\" (UID: \"0379ba0d-b0c4-497d-af1d-507d240f1f57\") " pod="calico-system/whisker-b77f4458b-bwdl4" May 17 00:49:46.928710 kubelet[2537]: I0517 00:49:46.927724 2537 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/0379ba0d-b0c4-497d-af1d-507d240f1f57-whisker-ca-bundle\") pod \"whisker-b77f4458b-bwdl4\" (UID: \"0379ba0d-b0c4-497d-af1d-507d240f1f57\") " pod="calico-system/whisker-b77f4458b-bwdl4" May 17 00:49:46.928710 kubelet[2537]: I0517 00:49:46.927742 2537 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qk29z\" (UniqueName: \"kubernetes.io/projected/da20061a-c164-4dad-aec7-b54414ff9706-kube-api-access-qk29z\") pod \"calico-apiserver-84c64ddb56-5dt2v\" (UID: \"da20061a-c164-4dad-aec7-b54414ff9706\") " pod="calico-apiserver/calico-apiserver-84c64ddb56-5dt2v" May 17 00:49:46.987683 env[1480]: time="2025-05-17T00:49:46.986142075Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-cxrsr,Uid:c807ebf0-49df-4644-b8ed-52a104f87f64,Namespace:kube-system,Attempt:0,}" May 17 00:49:47.000326 env[1480]: time="2025-05-17T00:49:47.000269486Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-j679t,Uid:91388974-d4b7-418c-97fd-7623f7fc5ad5,Namespace:kube-system,Attempt:0,}" May 17 00:49:47.021924 env[1480]: time="2025-05-17T00:49:47.021874644Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-84c64ddb56-27tsz,Uid:072e45c7-a564-4ff1-8f56-8086de5cb47f,Namespace:calico-apiserver,Attempt:0,}" May 17 00:49:47.040138 env[1480]: time="2025-05-17T00:49:47.039821348Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-647fb858cc-jtf2c,Uid:cfe725ea-fbe7-42b1-b5de-fc1e1a86ac51,Namespace:calico-system,Attempt:0,}" May 17 00:49:47.077697 env[1480]: time="2025-05-17T00:49:47.077359038Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-b77f4458b-bwdl4,Uid:0379ba0d-b0c4-497d-af1d-507d240f1f57,Namespace:calico-system,Attempt:0,}" May 17 00:49:47.084922 env[1480]: time="2025-05-17T00:49:47.084874152Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-78d55f7ddc-pmkbg,Uid:85f144ac-4d39-496d-b3d5-66149a1574d7,Namespace:calico-system,Attempt:0,}" May 17 00:49:47.092267 env[1480]: time="2025-05-17T00:49:47.092050817Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-84c64ddb56-5dt2v,Uid:da20061a-c164-4dad-aec7-b54414ff9706,Namespace:calico-apiserver,Attempt:0,}" May 17 00:49:47.202755 env[1480]: time="2025-05-17T00:49:47.202687596Z" level=error msg="Failed to destroy network for sandbox \"04ae499c81553f3b0dff696a50f0d2cf978d190d027573199774552478710ce6\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:49:47.203279 env[1480]: time="2025-05-17T00:49:47.203197969Z" level=error msg="encountered an error cleaning up failed sandbox \"04ae499c81553f3b0dff696a50f0d2cf978d190d027573199774552478710ce6\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:49:47.203360 env[1480]: time="2025-05-17T00:49:47.203306452Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-cxrsr,Uid:c807ebf0-49df-4644-b8ed-52a104f87f64,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"04ae499c81553f3b0dff696a50f0d2cf978d190d027573199774552478710ce6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:49:47.204421 kubelet[2537]: E0517 00:49:47.203512 2537 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"04ae499c81553f3b0dff696a50f0d2cf978d190d027573199774552478710ce6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:49:47.204421 kubelet[2537]: E0517 00:49:47.203563 2537 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"04ae499c81553f3b0dff696a50f0d2cf978d190d027573199774552478710ce6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-674b8bbfcf-cxrsr" May 17 00:49:47.204421 kubelet[2537]: E0517 00:49:47.203582 2537 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"04ae499c81553f3b0dff696a50f0d2cf978d190d027573199774552478710ce6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-674b8bbfcf-cxrsr" May 17 00:49:47.204584 kubelet[2537]: E0517 00:49:47.203628 2537 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-674b8bbfcf-cxrsr_kube-system(c807ebf0-49df-4644-b8ed-52a104f87f64)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-674b8bbfcf-cxrsr_kube-system(c807ebf0-49df-4644-b8ed-52a104f87f64)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"04ae499c81553f3b0dff696a50f0d2cf978d190d027573199774552478710ce6\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-674b8bbfcf-cxrsr" podUID="c807ebf0-49df-4644-b8ed-52a104f87f64" May 17 00:49:47.314316 env[1480]: time="2025-05-17T00:49:47.313558980Z" level=error msg="Failed to destroy network for sandbox \"d73a88f26a68cb38ad153b5fa3ee8edcb210df1776ea641e21a02841b7ef2432\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:49:47.314316 env[1480]: time="2025-05-17T00:49:47.314023232Z" level=error msg="encountered an error cleaning up failed sandbox \"d73a88f26a68cb38ad153b5fa3ee8edcb210df1776ea641e21a02841b7ef2432\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:49:47.314316 env[1480]: time="2025-05-17T00:49:47.314076194Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-j679t,Uid:91388974-d4b7-418c-97fd-7623f7fc5ad5,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"d73a88f26a68cb38ad153b5fa3ee8edcb210df1776ea641e21a02841b7ef2432\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:49:47.314677 kubelet[2537]: E0517 00:49:47.314630 2537 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d73a88f26a68cb38ad153b5fa3ee8edcb210df1776ea641e21a02841b7ef2432\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:49:47.314759 kubelet[2537]: E0517 00:49:47.314695 2537 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d73a88f26a68cb38ad153b5fa3ee8edcb210df1776ea641e21a02841b7ef2432\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-674b8bbfcf-j679t" May 17 00:49:47.314759 kubelet[2537]: E0517 00:49:47.314717 2537 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d73a88f26a68cb38ad153b5fa3ee8edcb210df1776ea641e21a02841b7ef2432\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-674b8bbfcf-j679t" May 17 00:49:47.314813 kubelet[2537]: E0517 00:49:47.314766 2537 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-674b8bbfcf-j679t_kube-system(91388974-d4b7-418c-97fd-7623f7fc5ad5)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-674b8bbfcf-j679t_kube-system(91388974-d4b7-418c-97fd-7623f7fc5ad5)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"d73a88f26a68cb38ad153b5fa3ee8edcb210df1776ea641e21a02841b7ef2432\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-674b8bbfcf-j679t" podUID="91388974-d4b7-418c-97fd-7623f7fc5ad5" May 17 00:49:47.319930 env[1480]: time="2025-05-17T00:49:47.319837063Z" level=error msg="Failed to destroy network for sandbox \"7bf04d39c27ca92b349cae2ca88c5f3cc20bf650b9e82aa96d6c732c9127f64b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:49:47.320462 env[1480]: time="2025-05-17T00:49:47.320391037Z" level=error msg="encountered an error cleaning up failed sandbox \"7bf04d39c27ca92b349cae2ca88c5f3cc20bf650b9e82aa96d6c732c9127f64b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:49:47.320548 env[1480]: time="2025-05-17T00:49:47.320475079Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-84c64ddb56-27tsz,Uid:072e45c7-a564-4ff1-8f56-8086de5cb47f,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"7bf04d39c27ca92b349cae2ca88c5f3cc20bf650b9e82aa96d6c732c9127f64b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:49:47.320824 kubelet[2537]: E0517 00:49:47.320779 2537 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7bf04d39c27ca92b349cae2ca88c5f3cc20bf650b9e82aa96d6c732c9127f64b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:49:47.320914 kubelet[2537]: E0517 00:49:47.320840 2537 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7bf04d39c27ca92b349cae2ca88c5f3cc20bf650b9e82aa96d6c732c9127f64b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-84c64ddb56-27tsz" May 17 00:49:47.320914 kubelet[2537]: E0517 00:49:47.320874 2537 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7bf04d39c27ca92b349cae2ca88c5f3cc20bf650b9e82aa96d6c732c9127f64b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-84c64ddb56-27tsz" May 17 00:49:47.320979 kubelet[2537]: E0517 00:49:47.320928 2537 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-84c64ddb56-27tsz_calico-apiserver(072e45c7-a564-4ff1-8f56-8086de5cb47f)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-84c64ddb56-27tsz_calico-apiserver(072e45c7-a564-4ff1-8f56-8086de5cb47f)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"7bf04d39c27ca92b349cae2ca88c5f3cc20bf650b9e82aa96d6c732c9127f64b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-84c64ddb56-27tsz" podUID="072e45c7-a564-4ff1-8f56-8086de5cb47f" May 17 00:49:47.409620 env[1480]: time="2025-05-17T00:49:47.409547380Z" level=error msg="Failed to destroy network for sandbox \"2bf27c97334f783392bef269595031dbf8ae790b9dbf3dac41943a7c9af70091\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:49:47.410118 env[1480]: time="2025-05-17T00:49:47.410077834Z" level=error msg="encountered an error cleaning up failed sandbox \"2bf27c97334f783392bef269595031dbf8ae790b9dbf3dac41943a7c9af70091\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:49:47.410196 env[1480]: time="2025-05-17T00:49:47.410140396Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-647fb858cc-jtf2c,Uid:cfe725ea-fbe7-42b1-b5de-fc1e1a86ac51,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"2bf27c97334f783392bef269595031dbf8ae790b9dbf3dac41943a7c9af70091\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:49:47.410413 kubelet[2537]: E0517 00:49:47.410375 2537 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2bf27c97334f783392bef269595031dbf8ae790b9dbf3dac41943a7c9af70091\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:49:47.410498 kubelet[2537]: E0517 00:49:47.410433 2537 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2bf27c97334f783392bef269595031dbf8ae790b9dbf3dac41943a7c9af70091\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-647fb858cc-jtf2c" May 17 00:49:47.410498 kubelet[2537]: E0517 00:49:47.410455 2537 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2bf27c97334f783392bef269595031dbf8ae790b9dbf3dac41943a7c9af70091\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-647fb858cc-jtf2c" May 17 00:49:47.410559 kubelet[2537]: E0517 00:49:47.410505 2537 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-647fb858cc-jtf2c_calico-system(cfe725ea-fbe7-42b1-b5de-fc1e1a86ac51)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-647fb858cc-jtf2c_calico-system(cfe725ea-fbe7-42b1-b5de-fc1e1a86ac51)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"2bf27c97334f783392bef269595031dbf8ae790b9dbf3dac41943a7c9af70091\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-647fb858cc-jtf2c" podUID="cfe725ea-fbe7-42b1-b5de-fc1e1a86ac51" May 17 00:49:47.438553 env[1480]: time="2025-05-17T00:49:47.438488088Z" level=error msg="Failed to destroy network for sandbox \"b73e68c4e34ef0c667f67b5e6e4b248524b373214b07b74fbf31422ac03f7e1e\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:49:47.438910 env[1480]: time="2025-05-17T00:49:47.438877538Z" level=error msg="encountered an error cleaning up failed sandbox \"b73e68c4e34ef0c667f67b5e6e4b248524b373214b07b74fbf31422ac03f7e1e\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:49:47.438955 env[1480]: time="2025-05-17T00:49:47.438932180Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-b77f4458b-bwdl4,Uid:0379ba0d-b0c4-497d-af1d-507d240f1f57,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"b73e68c4e34ef0c667f67b5e6e4b248524b373214b07b74fbf31422ac03f7e1e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:49:47.440421 kubelet[2537]: E0517 00:49:47.439153 2537 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b73e68c4e34ef0c667f67b5e6e4b248524b373214b07b74fbf31422ac03f7e1e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:49:47.440421 kubelet[2537]: E0517 00:49:47.439227 2537 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b73e68c4e34ef0c667f67b5e6e4b248524b373214b07b74fbf31422ac03f7e1e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-b77f4458b-bwdl4" May 17 00:49:47.440421 kubelet[2537]: E0517 00:49:47.439278 2537 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b73e68c4e34ef0c667f67b5e6e4b248524b373214b07b74fbf31422ac03f7e1e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-b77f4458b-bwdl4" May 17 00:49:47.440606 kubelet[2537]: E0517 00:49:47.439359 2537 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"whisker-b77f4458b-bwdl4_calico-system(0379ba0d-b0c4-497d-af1d-507d240f1f57)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"whisker-b77f4458b-bwdl4_calico-system(0379ba0d-b0c4-497d-af1d-507d240f1f57)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"b73e68c4e34ef0c667f67b5e6e4b248524b373214b07b74fbf31422ac03f7e1e\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-b77f4458b-bwdl4" podUID="0379ba0d-b0c4-497d-af1d-507d240f1f57" May 17 00:49:47.442842 env[1480]: time="2025-05-17T00:49:47.442776479Z" level=error msg="Failed to destroy network for sandbox \"962fa1fd3460a11a02ddcad1b3937654dc37673876dbde36685c6acbc4d58e93\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:49:47.443177 env[1480]: time="2025-05-17T00:49:47.443145488Z" level=error msg="encountered an error cleaning up failed sandbox \"962fa1fd3460a11a02ddcad1b3937654dc37673876dbde36685c6acbc4d58e93\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:49:47.443260 env[1480]: time="2025-05-17T00:49:47.443209770Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-78d55f7ddc-pmkbg,Uid:85f144ac-4d39-496d-b3d5-66149a1574d7,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"962fa1fd3460a11a02ddcad1b3937654dc37673876dbde36685c6acbc4d58e93\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:49:47.443537 kubelet[2537]: E0517 00:49:47.443478 2537 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"962fa1fd3460a11a02ddcad1b3937654dc37673876dbde36685c6acbc4d58e93\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:49:47.443623 kubelet[2537]: E0517 00:49:47.443549 2537 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"962fa1fd3460a11a02ddcad1b3937654dc37673876dbde36685c6acbc4d58e93\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-78d55f7ddc-pmkbg" May 17 00:49:47.443623 kubelet[2537]: E0517 00:49:47.443569 2537 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"962fa1fd3460a11a02ddcad1b3937654dc37673876dbde36685c6acbc4d58e93\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-78d55f7ddc-pmkbg" May 17 00:49:47.443689 kubelet[2537]: E0517 00:49:47.443622 2537 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"goldmane-78d55f7ddc-pmkbg_calico-system(85f144ac-4d39-496d-b3d5-66149a1574d7)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"goldmane-78d55f7ddc-pmkbg_calico-system(85f144ac-4d39-496d-b3d5-66149a1574d7)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"962fa1fd3460a11a02ddcad1b3937654dc37673876dbde36685c6acbc4d58e93\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-78d55f7ddc-pmkbg" podUID="85f144ac-4d39-496d-b3d5-66149a1574d7" May 17 00:49:47.454569 env[1480]: time="2025-05-17T00:49:47.454512022Z" level=error msg="Failed to destroy network for sandbox \"9563538b262083fde51e5f00fccc80cec92003d148de9cd91d24b213d43ef190\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:49:47.455070 env[1480]: time="2025-05-17T00:49:47.455036876Z" level=error msg="encountered an error cleaning up failed sandbox \"9563538b262083fde51e5f00fccc80cec92003d148de9cd91d24b213d43ef190\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:49:47.455193 env[1480]: time="2025-05-17T00:49:47.455168399Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-84c64ddb56-5dt2v,Uid:da20061a-c164-4dad-aec7-b54414ff9706,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"9563538b262083fde51e5f00fccc80cec92003d148de9cd91d24b213d43ef190\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:49:47.455562 kubelet[2537]: E0517 00:49:47.455518 2537 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9563538b262083fde51e5f00fccc80cec92003d148de9cd91d24b213d43ef190\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:49:47.455645 kubelet[2537]: E0517 00:49:47.455576 2537 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9563538b262083fde51e5f00fccc80cec92003d148de9cd91d24b213d43ef190\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-84c64ddb56-5dt2v" May 17 00:49:47.455645 kubelet[2537]: E0517 00:49:47.455611 2537 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9563538b262083fde51e5f00fccc80cec92003d148de9cd91d24b213d43ef190\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-84c64ddb56-5dt2v" May 17 00:49:47.455700 kubelet[2537]: E0517 00:49:47.455671 2537 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-84c64ddb56-5dt2v_calico-apiserver(da20061a-c164-4dad-aec7-b54414ff9706)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-84c64ddb56-5dt2v_calico-apiserver(da20061a-c164-4dad-aec7-b54414ff9706)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"9563538b262083fde51e5f00fccc80cec92003d148de9cd91d24b213d43ef190\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-84c64ddb56-5dt2v" podUID="da20061a-c164-4dad-aec7-b54414ff9706" May 17 00:49:47.513103 kubelet[2537]: I0517 00:49:47.512630 2537 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="962fa1fd3460a11a02ddcad1b3937654dc37673876dbde36685c6acbc4d58e93" May 17 00:49:47.513623 env[1480]: time="2025-05-17T00:49:47.513574908Z" level=info msg="StopPodSandbox for \"962fa1fd3460a11a02ddcad1b3937654dc37673876dbde36685c6acbc4d58e93\"" May 17 00:49:47.519360 kubelet[2537]: I0517 00:49:47.519330 2537 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="d73a88f26a68cb38ad153b5fa3ee8edcb210df1776ea641e21a02841b7ef2432" May 17 00:49:47.522791 env[1480]: time="2025-05-17T00:49:47.518859205Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.0\"" May 17 00:49:47.522791 env[1480]: time="2025-05-17T00:49:47.522488138Z" level=info msg="StopPodSandbox for \"d73a88f26a68cb38ad153b5fa3ee8edcb210df1776ea641e21a02841b7ef2432\"" May 17 00:49:47.534834 kubelet[2537]: I0517 00:49:47.534786 2537 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="7bf04d39c27ca92b349cae2ca88c5f3cc20bf650b9e82aa96d6c732c9127f64b" May 17 00:49:47.536958 env[1480]: time="2025-05-17T00:49:47.536921591Z" level=info msg="StopPodSandbox for \"7bf04d39c27ca92b349cae2ca88c5f3cc20bf650b9e82aa96d6c732c9127f64b\"" May 17 00:49:47.540760 kubelet[2537]: I0517 00:49:47.540723 2537 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="9563538b262083fde51e5f00fccc80cec92003d148de9cd91d24b213d43ef190" May 17 00:49:47.541610 env[1480]: time="2025-05-17T00:49:47.541575311Z" level=info msg="StopPodSandbox for \"9563538b262083fde51e5f00fccc80cec92003d148de9cd91d24b213d43ef190\"" May 17 00:49:47.543897 kubelet[2537]: I0517 00:49:47.543851 2537 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="04ae499c81553f3b0dff696a50f0d2cf978d190d027573199774552478710ce6" May 17 00:49:47.544470 env[1480]: time="2025-05-17T00:49:47.544425945Z" level=info msg="StopPodSandbox for \"04ae499c81553f3b0dff696a50f0d2cf978d190d027573199774552478710ce6\"" May 17 00:49:47.545925 kubelet[2537]: I0517 00:49:47.545896 2537 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="2bf27c97334f783392bef269595031dbf8ae790b9dbf3dac41943a7c9af70091" May 17 00:49:47.546736 env[1480]: time="2025-05-17T00:49:47.546704404Z" level=info msg="StopPodSandbox for \"2bf27c97334f783392bef269595031dbf8ae790b9dbf3dac41943a7c9af70091\"" May 17 00:49:47.547643 kubelet[2537]: I0517 00:49:47.547601 2537 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="b73e68c4e34ef0c667f67b5e6e4b248524b373214b07b74fbf31422ac03f7e1e" May 17 00:49:47.548135 env[1480]: time="2025-05-17T00:49:47.548108120Z" level=info msg="StopPodSandbox for \"b73e68c4e34ef0c667f67b5e6e4b248524b373214b07b74fbf31422ac03f7e1e\"" May 17 00:49:47.549260 kubelet[2537]: I0517 00:49:47.549192 2537 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="40f13856fce73837b8380c544d31c04049bd84a3ceeb000c4fce95e608012a25" May 17 00:49:47.551346 env[1480]: time="2025-05-17T00:49:47.551308243Z" level=info msg="StopPodSandbox for \"40f13856fce73837b8380c544d31c04049bd84a3ceeb000c4fce95e608012a25\"" May 17 00:49:47.582979 env[1480]: time="2025-05-17T00:49:47.582826817Z" level=error msg="StopPodSandbox for \"962fa1fd3460a11a02ddcad1b3937654dc37673876dbde36685c6acbc4d58e93\" failed" error="failed to destroy network for sandbox \"962fa1fd3460a11a02ddcad1b3937654dc37673876dbde36685c6acbc4d58e93\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:49:47.583492 kubelet[2537]: E0517 00:49:47.583285 2537 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"962fa1fd3460a11a02ddcad1b3937654dc37673876dbde36685c6acbc4d58e93\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="962fa1fd3460a11a02ddcad1b3937654dc37673876dbde36685c6acbc4d58e93" May 17 00:49:47.583492 kubelet[2537]: E0517 00:49:47.583350 2537 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"962fa1fd3460a11a02ddcad1b3937654dc37673876dbde36685c6acbc4d58e93"} May 17 00:49:47.583492 kubelet[2537]: E0517 00:49:47.583426 2537 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"85f144ac-4d39-496d-b3d5-66149a1574d7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"962fa1fd3460a11a02ddcad1b3937654dc37673876dbde36685c6acbc4d58e93\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:49:47.583492 kubelet[2537]: E0517 00:49:47.583458 2537 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"85f144ac-4d39-496d-b3d5-66149a1574d7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"962fa1fd3460a11a02ddcad1b3937654dc37673876dbde36685c6acbc4d58e93\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-78d55f7ddc-pmkbg" podUID="85f144ac-4d39-496d-b3d5-66149a1574d7" May 17 00:49:47.618468 env[1480]: time="2025-05-17T00:49:47.618414337Z" level=error msg="StopPodSandbox for \"d73a88f26a68cb38ad153b5fa3ee8edcb210df1776ea641e21a02841b7ef2432\" failed" error="failed to destroy network for sandbox \"d73a88f26a68cb38ad153b5fa3ee8edcb210df1776ea641e21a02841b7ef2432\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:49:47.618993 kubelet[2537]: E0517 00:49:47.618944 2537 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d73a88f26a68cb38ad153b5fa3ee8edcb210df1776ea641e21a02841b7ef2432\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d73a88f26a68cb38ad153b5fa3ee8edcb210df1776ea641e21a02841b7ef2432" May 17 00:49:47.619083 kubelet[2537]: E0517 00:49:47.619008 2537 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"d73a88f26a68cb38ad153b5fa3ee8edcb210df1776ea641e21a02841b7ef2432"} May 17 00:49:47.619083 kubelet[2537]: E0517 00:49:47.619046 2537 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"91388974-d4b7-418c-97fd-7623f7fc5ad5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d73a88f26a68cb38ad153b5fa3ee8edcb210df1776ea641e21a02841b7ef2432\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:49:47.619083 kubelet[2537]: E0517 00:49:47.619069 2537 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"91388974-d4b7-418c-97fd-7623f7fc5ad5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d73a88f26a68cb38ad153b5fa3ee8edcb210df1776ea641e21a02841b7ef2432\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-674b8bbfcf-j679t" podUID="91388974-d4b7-418c-97fd-7623f7fc5ad5" May 17 00:49:47.652225 env[1480]: time="2025-05-17T00:49:47.652158368Z" level=error msg="StopPodSandbox for \"2bf27c97334f783392bef269595031dbf8ae790b9dbf3dac41943a7c9af70091\" failed" error="failed to destroy network for sandbox \"2bf27c97334f783392bef269595031dbf8ae790b9dbf3dac41943a7c9af70091\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:49:47.652613 kubelet[2537]: E0517 00:49:47.652567 2537 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"2bf27c97334f783392bef269595031dbf8ae790b9dbf3dac41943a7c9af70091\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="2bf27c97334f783392bef269595031dbf8ae790b9dbf3dac41943a7c9af70091" May 17 00:49:47.652698 kubelet[2537]: E0517 00:49:47.652622 2537 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"2bf27c97334f783392bef269595031dbf8ae790b9dbf3dac41943a7c9af70091"} May 17 00:49:47.652698 kubelet[2537]: E0517 00:49:47.652654 2537 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"cfe725ea-fbe7-42b1-b5de-fc1e1a86ac51\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2bf27c97334f783392bef269595031dbf8ae790b9dbf3dac41943a7c9af70091\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:49:47.652698 kubelet[2537]: E0517 00:49:47.652676 2537 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"cfe725ea-fbe7-42b1-b5de-fc1e1a86ac51\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2bf27c97334f783392bef269595031dbf8ae790b9dbf3dac41943a7c9af70091\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-647fb858cc-jtf2c" podUID="cfe725ea-fbe7-42b1-b5de-fc1e1a86ac51" May 17 00:49:47.658041 env[1480]: time="2025-05-17T00:49:47.657975279Z" level=error msg="StopPodSandbox for \"b73e68c4e34ef0c667f67b5e6e4b248524b373214b07b74fbf31422ac03f7e1e\" failed" error="failed to destroy network for sandbox \"b73e68c4e34ef0c667f67b5e6e4b248524b373214b07b74fbf31422ac03f7e1e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:49:47.658433 kubelet[2537]: E0517 00:49:47.658382 2537 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b73e68c4e34ef0c667f67b5e6e4b248524b373214b07b74fbf31422ac03f7e1e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b73e68c4e34ef0c667f67b5e6e4b248524b373214b07b74fbf31422ac03f7e1e" May 17 00:49:47.658522 kubelet[2537]: E0517 00:49:47.658439 2537 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"b73e68c4e34ef0c667f67b5e6e4b248524b373214b07b74fbf31422ac03f7e1e"} May 17 00:49:47.658522 kubelet[2537]: E0517 00:49:47.658474 2537 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"0379ba0d-b0c4-497d-af1d-507d240f1f57\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b73e68c4e34ef0c667f67b5e6e4b248524b373214b07b74fbf31422ac03f7e1e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:49:47.658522 kubelet[2537]: E0517 00:49:47.658499 2537 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"0379ba0d-b0c4-497d-af1d-507d240f1f57\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b73e68c4e34ef0c667f67b5e6e4b248524b373214b07b74fbf31422ac03f7e1e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-b77f4458b-bwdl4" podUID="0379ba0d-b0c4-497d-af1d-507d240f1f57" May 17 00:49:47.676617 env[1480]: time="2025-05-17T00:49:47.676546679Z" level=error msg="StopPodSandbox for \"9563538b262083fde51e5f00fccc80cec92003d148de9cd91d24b213d43ef190\" failed" error="failed to destroy network for sandbox \"9563538b262083fde51e5f00fccc80cec92003d148de9cd91d24b213d43ef190\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:49:47.677122 kubelet[2537]: E0517 00:49:47.677068 2537 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"9563538b262083fde51e5f00fccc80cec92003d148de9cd91d24b213d43ef190\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="9563538b262083fde51e5f00fccc80cec92003d148de9cd91d24b213d43ef190" May 17 00:49:47.677208 kubelet[2537]: E0517 00:49:47.677147 2537 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"9563538b262083fde51e5f00fccc80cec92003d148de9cd91d24b213d43ef190"} May 17 00:49:47.677208 kubelet[2537]: E0517 00:49:47.677179 2537 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"da20061a-c164-4dad-aec7-b54414ff9706\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9563538b262083fde51e5f00fccc80cec92003d148de9cd91d24b213d43ef190\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:49:47.677340 kubelet[2537]: E0517 00:49:47.677204 2537 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"da20061a-c164-4dad-aec7-b54414ff9706\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9563538b262083fde51e5f00fccc80cec92003d148de9cd91d24b213d43ef190\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-84c64ddb56-5dt2v" podUID="da20061a-c164-4dad-aec7-b54414ff9706" May 17 00:49:47.680111 env[1480]: time="2025-05-17T00:49:47.680056369Z" level=error msg="StopPodSandbox for \"7bf04d39c27ca92b349cae2ca88c5f3cc20bf650b9e82aa96d6c732c9127f64b\" failed" error="failed to destroy network for sandbox \"7bf04d39c27ca92b349cae2ca88c5f3cc20bf650b9e82aa96d6c732c9127f64b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:49:47.680567 kubelet[2537]: E0517 00:49:47.680511 2537 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"7bf04d39c27ca92b349cae2ca88c5f3cc20bf650b9e82aa96d6c732c9127f64b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="7bf04d39c27ca92b349cae2ca88c5f3cc20bf650b9e82aa96d6c732c9127f64b" May 17 00:49:47.680669 kubelet[2537]: E0517 00:49:47.680580 2537 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"7bf04d39c27ca92b349cae2ca88c5f3cc20bf650b9e82aa96d6c732c9127f64b"} May 17 00:49:47.680669 kubelet[2537]: E0517 00:49:47.680613 2537 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"072e45c7-a564-4ff1-8f56-8086de5cb47f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7bf04d39c27ca92b349cae2ca88c5f3cc20bf650b9e82aa96d6c732c9127f64b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:49:47.680669 kubelet[2537]: E0517 00:49:47.680637 2537 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"072e45c7-a564-4ff1-8f56-8086de5cb47f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7bf04d39c27ca92b349cae2ca88c5f3cc20bf650b9e82aa96d6c732c9127f64b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-84c64ddb56-27tsz" podUID="072e45c7-a564-4ff1-8f56-8086de5cb47f" May 17 00:49:47.684465 env[1480]: time="2025-05-17T00:49:47.684410162Z" level=error msg="StopPodSandbox for \"04ae499c81553f3b0dff696a50f0d2cf978d190d027573199774552478710ce6\" failed" error="failed to destroy network for sandbox \"04ae499c81553f3b0dff696a50f0d2cf978d190d027573199774552478710ce6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:49:47.684900 kubelet[2537]: E0517 00:49:47.684852 2537 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"04ae499c81553f3b0dff696a50f0d2cf978d190d027573199774552478710ce6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="04ae499c81553f3b0dff696a50f0d2cf978d190d027573199774552478710ce6" May 17 00:49:47.684998 kubelet[2537]: E0517 00:49:47.684911 2537 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"04ae499c81553f3b0dff696a50f0d2cf978d190d027573199774552478710ce6"} May 17 00:49:47.684998 kubelet[2537]: E0517 00:49:47.684947 2537 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c807ebf0-49df-4644-b8ed-52a104f87f64\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"04ae499c81553f3b0dff696a50f0d2cf978d190d027573199774552478710ce6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:49:47.684998 kubelet[2537]: E0517 00:49:47.684969 2537 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c807ebf0-49df-4644-b8ed-52a104f87f64\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"04ae499c81553f3b0dff696a50f0d2cf978d190d027573199774552478710ce6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-674b8bbfcf-cxrsr" podUID="c807ebf0-49df-4644-b8ed-52a104f87f64" May 17 00:49:47.688866 env[1480]: time="2025-05-17T00:49:47.688810515Z" level=error msg="StopPodSandbox for \"40f13856fce73837b8380c544d31c04049bd84a3ceeb000c4fce95e608012a25\" failed" error="failed to destroy network for sandbox \"40f13856fce73837b8380c544d31c04049bd84a3ceeb000c4fce95e608012a25\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:49:47.689308 kubelet[2537]: E0517 00:49:47.689258 2537 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"40f13856fce73837b8380c544d31c04049bd84a3ceeb000c4fce95e608012a25\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="40f13856fce73837b8380c544d31c04049bd84a3ceeb000c4fce95e608012a25" May 17 00:49:47.689401 kubelet[2537]: E0517 00:49:47.689315 2537 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"40f13856fce73837b8380c544d31c04049bd84a3ceeb000c4fce95e608012a25"} May 17 00:49:47.689401 kubelet[2537]: E0517 00:49:47.689347 2537 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"463fd6d8-2e06-42b8-ade3-8bda47d821b9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"40f13856fce73837b8380c544d31c04049bd84a3ceeb000c4fce95e608012a25\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:49:47.689401 kubelet[2537]: E0517 00:49:47.689375 2537 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"463fd6d8-2e06-42b8-ade3-8bda47d821b9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"40f13856fce73837b8380c544d31c04049bd84a3ceeb000c4fce95e608012a25\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-52bcs" podUID="463fd6d8-2e06-42b8-ade3-8bda47d821b9" May 17 00:49:54.884000 audit[2352]: AVC avc: denied { watch } for pid=2352 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=522516 scontext=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:49:56.369395 kernel: kauditd_printk_skb: 40 callbacks suppressed May 17 00:49:56.369554 kernel: audit: type=1400 audit(1747442994.884:928): avc: denied { watch } for pid=2352 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=522516 scontext=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:49:56.369583 kernel: audit: type=1300 audit(1747442994.884:928): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40010ef590 a2=fc6 a3=0 items=0 ppid=2209 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 key=(null) May 17 00:49:56.369602 kernel: audit: type=1327 audit(1747442994.884:928): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:49:56.369621 kernel: audit: type=1400 audit(1747442994.884:929): avc: denied { watch } for pid=2352 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=522510 scontext=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:49:56.369641 kernel: audit: type=1300 audit(1747442994.884:929): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000546f00 a2=fc6 a3=0 items=0 ppid=2209 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 key=(null) May 17 00:49:56.369660 kernel: audit: type=1327 audit(1747442994.884:929): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:49:56.369682 kernel: audit: type=1400 audit(1747442996.102:930): avc: denied { watch } for pid=2419 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=522510 scontext=system_u:system_r:svirt_lxc_net_t:s0:c703,c977 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:49:56.369701 kernel: audit: type=1300 audit(1747442996.102:930): arch=c00000b7 syscall=27 success=no exit=-13 a0=6b a1=4011f41920 a2=fc6 a3=0 items=0 ppid=2279 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c703,c977 key=(null) May 17 00:49:56.369720 kernel: audit: type=1327 audit(1747442996.102:930): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3334002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 00:49:56.369745 kernel: audit: type=1400 audit(1747442996.106:931): avc: denied { watch } for pid=2419 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=522516 scontext=system_u:system_r:svirt_lxc_net_t:s0:c703,c977 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:49:54.884000 audit[2352]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40010ef590 a2=fc6 a3=0 items=0 ppid=2209 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 key=(null) May 17 00:49:54.884000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:49:54.884000 audit[2352]: AVC avc: denied { watch } for pid=2352 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=522510 scontext=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:49:54.884000 audit[2352]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000546f00 a2=fc6 a3=0 items=0 ppid=2209 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 key=(null) May 17 00:49:54.884000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:49:56.102000 audit[2419]: AVC avc: denied { watch } for pid=2419 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=522510 scontext=system_u:system_r:svirt_lxc_net_t:s0:c703,c977 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:49:56.102000 audit[2419]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6b a1=4011f41920 a2=fc6 a3=0 items=0 ppid=2279 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c703,c977 key=(null) May 17 00:49:56.102000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3334002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 00:49:56.106000 audit[2419]: AVC avc: denied { watch } for pid=2419 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=522516 scontext=system_u:system_r:svirt_lxc_net_t:s0:c703,c977 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:49:56.106000 audit[2419]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6b a1=4011d65d10 a2=fc6 a3=0 items=0 ppid=2279 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c703,c977 key=(null) May 17 00:49:56.106000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3334002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 00:49:56.106000 audit[2419]: AVC avc: denied { watch } for pid=2419 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=522512 scontext=system_u:system_r:svirt_lxc_net_t:s0:c703,c977 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:49:56.106000 audit[2419]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6b a1=4011d65da0 a2=fc6 a3=0 items=0 ppid=2279 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c703,c977 key=(null) May 17 00:49:56.106000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3334002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 00:49:56.106000 audit[2419]: AVC avc: denied { watch } for pid=2419 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=522518 scontext=system_u:system_r:svirt_lxc_net_t:s0:c703,c977 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:49:56.106000 audit[2419]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6b a1=40120086c0 a2=fc6 a3=0 items=0 ppid=2279 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c703,c977 key=(null) May 17 00:49:56.106000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3334002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 00:49:56.107000 audit[2419]: AVC avc: denied { watch } for pid=2419 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=522516 scontext=system_u:system_r:svirt_lxc_net_t:s0:c703,c977 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:49:56.107000 audit[2419]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6b a1=4012008750 a2=fc6 a3=0 items=0 ppid=2279 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c703,c977 key=(null) May 17 00:49:56.107000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3334002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 00:49:56.121000 audit[2419]: AVC avc: denied { watch } for pid=2419 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=522510 scontext=system_u:system_r:svirt_lxc_net_t:s0:c703,c977 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:49:56.121000 audit[2419]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6b a1=4011f41ae0 a2=fc6 a3=0 items=0 ppid=2279 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c703,c977 key=(null) May 17 00:49:56.121000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3334002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 00:49:59.147785 env[1480]: time="2025-05-17T00:49:59.147728455Z" level=info msg="StopPodSandbox for \"40f13856fce73837b8380c544d31c04049bd84a3ceeb000c4fce95e608012a25\"" May 17 00:49:59.211673 env[1480]: time="2025-05-17T00:49:59.211617671Z" level=error msg="StopPodSandbox for \"40f13856fce73837b8380c544d31c04049bd84a3ceeb000c4fce95e608012a25\" failed" error="failed to destroy network for sandbox \"40f13856fce73837b8380c544d31c04049bd84a3ceeb000c4fce95e608012a25\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:49:59.212102 kubelet[2537]: E0517 00:49:59.212022 2537 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"40f13856fce73837b8380c544d31c04049bd84a3ceeb000c4fce95e608012a25\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="40f13856fce73837b8380c544d31c04049bd84a3ceeb000c4fce95e608012a25" May 17 00:49:59.212459 kubelet[2537]: E0517 00:49:59.212111 2537 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"40f13856fce73837b8380c544d31c04049bd84a3ceeb000c4fce95e608012a25"} May 17 00:49:59.212459 kubelet[2537]: E0517 00:49:59.212146 2537 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"463fd6d8-2e06-42b8-ade3-8bda47d821b9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"40f13856fce73837b8380c544d31c04049bd84a3ceeb000c4fce95e608012a25\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:49:59.212459 kubelet[2537]: E0517 00:49:59.212177 2537 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"463fd6d8-2e06-42b8-ade3-8bda47d821b9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"40f13856fce73837b8380c544d31c04049bd84a3ceeb000c4fce95e608012a25\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-52bcs" podUID="463fd6d8-2e06-42b8-ade3-8bda47d821b9" May 17 00:49:59.786568 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount775076834.mount: Deactivated successfully. May 17 00:50:00.144447 env[1480]: time="2025-05-17T00:50:00.143994781Z" level=info msg="StopPodSandbox for \"2bf27c97334f783392bef269595031dbf8ae790b9dbf3dac41943a7c9af70091\"" May 17 00:50:00.145061 env[1480]: time="2025-05-17T00:50:00.144986483Z" level=info msg="StopPodSandbox for \"962fa1fd3460a11a02ddcad1b3937654dc37673876dbde36685c6acbc4d58e93\"" May 17 00:50:00.174107 env[1480]: time="2025-05-17T00:50:00.174036800Z" level=error msg="StopPodSandbox for \"962fa1fd3460a11a02ddcad1b3937654dc37673876dbde36685c6acbc4d58e93\" failed" error="failed to destroy network for sandbox \"962fa1fd3460a11a02ddcad1b3937654dc37673876dbde36685c6acbc4d58e93\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:50:00.174461 kubelet[2537]: E0517 00:50:00.174280 2537 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"962fa1fd3460a11a02ddcad1b3937654dc37673876dbde36685c6acbc4d58e93\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="962fa1fd3460a11a02ddcad1b3937654dc37673876dbde36685c6acbc4d58e93" May 17 00:50:00.174461 kubelet[2537]: E0517 00:50:00.174331 2537 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"962fa1fd3460a11a02ddcad1b3937654dc37673876dbde36685c6acbc4d58e93"} May 17 00:50:00.174461 kubelet[2537]: E0517 00:50:00.174367 2537 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"85f144ac-4d39-496d-b3d5-66149a1574d7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"962fa1fd3460a11a02ddcad1b3937654dc37673876dbde36685c6acbc4d58e93\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:50:00.174461 kubelet[2537]: E0517 00:50:00.174389 2537 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"85f144ac-4d39-496d-b3d5-66149a1574d7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"962fa1fd3460a11a02ddcad1b3937654dc37673876dbde36685c6acbc4d58e93\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-78d55f7ddc-pmkbg" podUID="85f144ac-4d39-496d-b3d5-66149a1574d7" May 17 00:50:00.179842 env[1480]: time="2025-05-17T00:50:00.179780126Z" level=error msg="StopPodSandbox for \"2bf27c97334f783392bef269595031dbf8ae790b9dbf3dac41943a7c9af70091\" failed" error="failed to destroy network for sandbox \"2bf27c97334f783392bef269595031dbf8ae790b9dbf3dac41943a7c9af70091\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:50:00.180057 kubelet[2537]: E0517 00:50:00.180001 2537 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"2bf27c97334f783392bef269595031dbf8ae790b9dbf3dac41943a7c9af70091\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="2bf27c97334f783392bef269595031dbf8ae790b9dbf3dac41943a7c9af70091" May 17 00:50:00.180116 kubelet[2537]: E0517 00:50:00.180056 2537 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"2bf27c97334f783392bef269595031dbf8ae790b9dbf3dac41943a7c9af70091"} May 17 00:50:00.180116 kubelet[2537]: E0517 00:50:00.180087 2537 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"cfe725ea-fbe7-42b1-b5de-fc1e1a86ac51\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2bf27c97334f783392bef269595031dbf8ae790b9dbf3dac41943a7c9af70091\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:50:00.180287 kubelet[2537]: E0517 00:50:00.180108 2537 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"cfe725ea-fbe7-42b1-b5de-fc1e1a86ac51\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2bf27c97334f783392bef269595031dbf8ae790b9dbf3dac41943a7c9af70091\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-647fb858cc-jtf2c" podUID="cfe725ea-fbe7-42b1-b5de-fc1e1a86ac51" May 17 00:50:01.157977 env[1480]: time="2025-05-17T00:50:01.157369794Z" level=info msg="StopPodSandbox for \"b73e68c4e34ef0c667f67b5e6e4b248524b373214b07b74fbf31422ac03f7e1e\"" May 17 00:50:01.157977 env[1480]: time="2025-05-17T00:50:01.157849485Z" level=info msg="StopPodSandbox for \"04ae499c81553f3b0dff696a50f0d2cf978d190d027573199774552478710ce6\"" May 17 00:50:01.158918 env[1480]: time="2025-05-17T00:50:01.158553420Z" level=info msg="StopPodSandbox for \"9563538b262083fde51e5f00fccc80cec92003d148de9cd91d24b213d43ef190\"" May 17 00:50:01.206554 env[1480]: time="2025-05-17T00:50:01.206460179Z" level=error msg="StopPodSandbox for \"04ae499c81553f3b0dff696a50f0d2cf978d190d027573199774552478710ce6\" failed" error="failed to destroy network for sandbox \"04ae499c81553f3b0dff696a50f0d2cf978d190d027573199774552478710ce6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:50:01.207254 kubelet[2537]: E0517 00:50:01.207093 2537 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"04ae499c81553f3b0dff696a50f0d2cf978d190d027573199774552478710ce6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="04ae499c81553f3b0dff696a50f0d2cf978d190d027573199774552478710ce6" May 17 00:50:01.207254 kubelet[2537]: E0517 00:50:01.207142 2537 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"04ae499c81553f3b0dff696a50f0d2cf978d190d027573199774552478710ce6"} May 17 00:50:01.207254 kubelet[2537]: E0517 00:50:01.207188 2537 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c807ebf0-49df-4644-b8ed-52a104f87f64\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"04ae499c81553f3b0dff696a50f0d2cf978d190d027573199774552478710ce6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:50:01.207254 kubelet[2537]: E0517 00:50:01.207210 2537 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c807ebf0-49df-4644-b8ed-52a104f87f64\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"04ae499c81553f3b0dff696a50f0d2cf978d190d027573199774552478710ce6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-674b8bbfcf-cxrsr" podUID="c807ebf0-49df-4644-b8ed-52a104f87f64" May 17 00:50:01.216042 env[1480]: time="2025-05-17T00:50:01.215982145Z" level=error msg="StopPodSandbox for \"b73e68c4e34ef0c667f67b5e6e4b248524b373214b07b74fbf31422ac03f7e1e\" failed" error="failed to destroy network for sandbox \"b73e68c4e34ef0c667f67b5e6e4b248524b373214b07b74fbf31422ac03f7e1e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:50:01.216528 kubelet[2537]: E0517 00:50:01.216493 2537 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b73e68c4e34ef0c667f67b5e6e4b248524b373214b07b74fbf31422ac03f7e1e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b73e68c4e34ef0c667f67b5e6e4b248524b373214b07b74fbf31422ac03f7e1e" May 17 00:50:01.216697 kubelet[2537]: E0517 00:50:01.216677 2537 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"b73e68c4e34ef0c667f67b5e6e4b248524b373214b07b74fbf31422ac03f7e1e"} May 17 00:50:01.216807 kubelet[2537]: E0517 00:50:01.216792 2537 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"0379ba0d-b0c4-497d-af1d-507d240f1f57\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b73e68c4e34ef0c667f67b5e6e4b248524b373214b07b74fbf31422ac03f7e1e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:50:01.216937 kubelet[2537]: E0517 00:50:01.216918 2537 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"0379ba0d-b0c4-497d-af1d-507d240f1f57\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b73e68c4e34ef0c667f67b5e6e4b248524b373214b07b74fbf31422ac03f7e1e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-b77f4458b-bwdl4" podUID="0379ba0d-b0c4-497d-af1d-507d240f1f57" May 17 00:50:01.224988 env[1480]: time="2025-05-17T00:50:01.224936499Z" level=error msg="StopPodSandbox for \"9563538b262083fde51e5f00fccc80cec92003d148de9cd91d24b213d43ef190\" failed" error="failed to destroy network for sandbox \"9563538b262083fde51e5f00fccc80cec92003d148de9cd91d24b213d43ef190\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:50:01.225420 kubelet[2537]: E0517 00:50:01.225368 2537 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"9563538b262083fde51e5f00fccc80cec92003d148de9cd91d24b213d43ef190\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="9563538b262083fde51e5f00fccc80cec92003d148de9cd91d24b213d43ef190" May 17 00:50:01.225518 kubelet[2537]: E0517 00:50:01.225431 2537 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"9563538b262083fde51e5f00fccc80cec92003d148de9cd91d24b213d43ef190"} May 17 00:50:01.225518 kubelet[2537]: E0517 00:50:01.225467 2537 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"da20061a-c164-4dad-aec7-b54414ff9706\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9563538b262083fde51e5f00fccc80cec92003d148de9cd91d24b213d43ef190\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:50:01.225518 kubelet[2537]: E0517 00:50:01.225490 2537 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"da20061a-c164-4dad-aec7-b54414ff9706\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9563538b262083fde51e5f00fccc80cec92003d148de9cd91d24b213d43ef190\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-84c64ddb56-5dt2v" podUID="da20061a-c164-4dad-aec7-b54414ff9706" May 17 00:50:02.097000 audit[2352]: AVC avc: denied { watch } for pid=2352 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=522510 scontext=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:50:05.367302 kernel: kauditd_printk_skb: 14 callbacks suppressed May 17 00:50:05.367383 kernel: audit: type=1400 audit(1747443002.097:936): avc: denied { watch } for pid=2352 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=522510 scontext=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:50:05.367404 kernel: audit: type=1300 audit(1747443002.097:936): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40005473a0 a2=fc6 a3=0 items=0 ppid=2209 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 key=(null) May 17 00:50:05.367424 kernel: audit: type=1327 audit(1747443002.097:936): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:50:05.367443 kernel: audit: type=1400 audit(1747443002.098:937): avc: denied { watch } for pid=2352 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=522510 scontext=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:50:05.367461 kernel: audit: type=1300 audit(1747443002.098:937): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40005474c0 a2=fc6 a3=0 items=0 ppid=2209 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 key=(null) May 17 00:50:05.367482 kernel: audit: type=1327 audit(1747443002.098:937): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:50:05.367501 kernel: audit: type=1400 audit(1747443002.099:938): avc: denied { watch } for pid=2352 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=522510 scontext=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:50:05.367528 kernel: audit: type=1300 audit(1747443002.099:938): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40005478e0 a2=fc6 a3=0 items=0 ppid=2209 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 key=(null) May 17 00:50:05.367547 kernel: audit: type=1327 audit(1747443002.099:938): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:50:05.367570 kernel: audit: type=1400 audit(1747443002.104:939): avc: denied { watch } for pid=2352 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=522510 scontext=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:50:02.097000 audit[2352]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40005473a0 a2=fc6 a3=0 items=0 ppid=2209 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 key=(null) May 17 00:50:02.097000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:50:02.098000 audit[2352]: AVC avc: denied { watch } for pid=2352 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=522510 scontext=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:50:02.098000 audit[2352]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40005474c0 a2=fc6 a3=0 items=0 ppid=2209 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 key=(null) May 17 00:50:02.098000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:50:02.099000 audit[2352]: AVC avc: denied { watch } for pid=2352 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=522510 scontext=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:50:02.099000 audit[2352]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40005478e0 a2=fc6 a3=0 items=0 ppid=2209 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 key=(null) May 17 00:50:02.099000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:50:02.104000 audit[2352]: AVC avc: denied { watch } for pid=2352 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=522510 scontext=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:50:02.104000 audit[2352]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000bb63c0 a2=fc6 a3=0 items=0 ppid=2209 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 key=(null) May 17 00:50:02.104000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:50:05.430837 env[1480]: time="2025-05-17T00:50:02.143422977Z" level=info msg="StopPodSandbox for \"7bf04d39c27ca92b349cae2ca88c5f3cc20bf650b9e82aa96d6c732c9127f64b\"" May 17 00:50:05.430837 env[1480]: time="2025-05-17T00:50:03.143533312Z" level=info msg="StopPodSandbox for \"d73a88f26a68cb38ad153b5fa3ee8edcb210df1776ea641e21a02841b7ef2432\"" May 17 00:50:05.430837 env[1480]: time="2025-05-17T00:50:05.319673857Z" level=error msg="StopPodSandbox for \"7bf04d39c27ca92b349cae2ca88c5f3cc20bf650b9e82aa96d6c732c9127f64b\" failed" error="failed to destroy network for sandbox \"7bf04d39c27ca92b349cae2ca88c5f3cc20bf650b9e82aa96d6c732c9127f64b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:50:05.430837 env[1480]: time="2025-05-17T00:50:05.320325510Z" level=error msg="StopPodSandbox for \"d73a88f26a68cb38ad153b5fa3ee8edcb210df1776ea641e21a02841b7ef2432\" failed" error="failed to destroy network for sandbox \"d73a88f26a68cb38ad153b5fa3ee8edcb210df1776ea641e21a02841b7ef2432\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:50:05.431153 kubelet[2537]: E0517 00:50:05.319935 2537 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"7bf04d39c27ca92b349cae2ca88c5f3cc20bf650b9e82aa96d6c732c9127f64b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="7bf04d39c27ca92b349cae2ca88c5f3cc20bf650b9e82aa96d6c732c9127f64b" May 17 00:50:05.431153 kubelet[2537]: E0517 00:50:05.319995 2537 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"7bf04d39c27ca92b349cae2ca88c5f3cc20bf650b9e82aa96d6c732c9127f64b"} May 17 00:50:05.431153 kubelet[2537]: E0517 00:50:05.320027 2537 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"072e45c7-a564-4ff1-8f56-8086de5cb47f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7bf04d39c27ca92b349cae2ca88c5f3cc20bf650b9e82aa96d6c732c9127f64b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:50:05.431153 kubelet[2537]: E0517 00:50:05.320061 2537 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"072e45c7-a564-4ff1-8f56-8086de5cb47f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7bf04d39c27ca92b349cae2ca88c5f3cc20bf650b9e82aa96d6c732c9127f64b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-84c64ddb56-27tsz" podUID="072e45c7-a564-4ff1-8f56-8086de5cb47f" May 17 00:50:05.431487 kubelet[2537]: E0517 00:50:05.320473 2537 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d73a88f26a68cb38ad153b5fa3ee8edcb210df1776ea641e21a02841b7ef2432\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d73a88f26a68cb38ad153b5fa3ee8edcb210df1776ea641e21a02841b7ef2432" May 17 00:50:05.431487 kubelet[2537]: E0517 00:50:05.320505 2537 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"d73a88f26a68cb38ad153b5fa3ee8edcb210df1776ea641e21a02841b7ef2432"} May 17 00:50:05.431487 kubelet[2537]: E0517 00:50:05.320531 2537 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"91388974-d4b7-418c-97fd-7623f7fc5ad5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d73a88f26a68cb38ad153b5fa3ee8edcb210df1776ea641e21a02841b7ef2432\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:50:05.431487 kubelet[2537]: E0517 00:50:05.320547 2537 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"91388974-d4b7-418c-97fd-7623f7fc5ad5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d73a88f26a68cb38ad153b5fa3ee8edcb210df1776ea641e21a02841b7ef2432\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-674b8bbfcf-j679t" podUID="91388974-d4b7-418c-97fd-7623f7fc5ad5" May 17 00:50:05.726177 env[1480]: time="2025-05-17T00:50:05.726060226Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:50:05.775216 env[1480]: time="2025-05-17T00:50:05.775173927Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f7148fde8e28b27da58f84cac134cdc53b5df321cda13c660192f06839670732,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:50:05.779327 env[1480]: time="2025-05-17T00:50:05.779288213Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:50:05.782167 env[1480]: time="2025-05-17T00:50:05.782129432Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:7cb61ea47ca0a8e6d0526a42da4f1e399b37ccd13339d0776d272465cb7ee012,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:50:05.782626 env[1480]: time="2025-05-17T00:50:05.782595602Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.0\" returns image reference \"sha256:f7148fde8e28b27da58f84cac134cdc53b5df321cda13c660192f06839670732\"" May 17 00:50:05.806168 env[1480]: time="2025-05-17T00:50:05.806117251Z" level=info msg="CreateContainer within sandbox \"9be2faa66ac60bc3e012e2b21e0c3b7e7e6e91cdef14e41c5603494b0f124c40\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 17 00:50:05.842757 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2002628447.mount: Deactivated successfully. May 17 00:50:05.863754 env[1480]: time="2025-05-17T00:50:05.863706768Z" level=info msg="CreateContainer within sandbox \"9be2faa66ac60bc3e012e2b21e0c3b7e7e6e91cdef14e41c5603494b0f124c40\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"1199e8fbc8f7a8735bd0e88aee601a4d3ea26357c725870e7083c78e967fda18\"" May 17 00:50:05.866027 env[1480]: time="2025-05-17T00:50:05.864779710Z" level=info msg="StartContainer for \"1199e8fbc8f7a8735bd0e88aee601a4d3ea26357c725870e7083c78e967fda18\"" May 17 00:50:05.884676 systemd[1]: Started cri-containerd-1199e8fbc8f7a8735bd0e88aee601a4d3ea26357c725870e7083c78e967fda18.scope. May 17 00:50:05.913000 audit[3822]: AVC avc: denied { perfmon } for pid=3822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:05.913000 audit[3822]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=3055 pid=3822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:05.913000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131393965386662633866376138373335626430653838616565363031 May 17 00:50:05.913000 audit[3822]: AVC avc: denied { bpf } for pid=3822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:05.913000 audit[3822]: AVC avc: denied { bpf } for pid=3822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:05.913000 audit[3822]: AVC avc: denied { bpf } for pid=3822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:05.913000 audit[3822]: AVC avc: denied { perfmon } for pid=3822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:05.913000 audit[3822]: AVC avc: denied { perfmon } for pid=3822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:05.913000 audit[3822]: AVC avc: denied { perfmon } for pid=3822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:05.913000 audit[3822]: AVC avc: denied { perfmon } for pid=3822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:05.913000 audit[3822]: AVC avc: denied { perfmon } for pid=3822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:05.913000 audit[3822]: AVC avc: denied { bpf } for pid=3822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:05.913000 audit[3822]: AVC avc: denied { bpf } for pid=3822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:05.913000 audit: BPF prog-id=134 op=LOAD May 17 00:50:05.913000 audit[3822]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=3055 pid=3822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:05.913000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131393965386662633866376138373335626430653838616565363031 May 17 00:50:05.913000 audit[3822]: AVC avc: denied { bpf } for pid=3822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:05.913000 audit[3822]: AVC avc: denied { bpf } for pid=3822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:05.913000 audit[3822]: AVC avc: denied { perfmon } for pid=3822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:05.913000 audit[3822]: AVC avc: denied { perfmon } for pid=3822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:05.913000 audit[3822]: AVC avc: denied { perfmon } for pid=3822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:05.913000 audit[3822]: AVC avc: denied { perfmon } for pid=3822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:05.913000 audit[3822]: AVC avc: denied { perfmon } for pid=3822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:05.913000 audit[3822]: AVC avc: denied { bpf } for pid=3822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:05.913000 audit[3822]: AVC avc: denied { bpf } for pid=3822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:05.913000 audit: BPF prog-id=135 op=LOAD May 17 00:50:05.913000 audit[3822]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=3055 pid=3822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:05.913000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131393965386662633866376138373335626430653838616565363031 May 17 00:50:05.913000 audit: BPF prog-id=135 op=UNLOAD May 17 00:50:05.913000 audit: BPF prog-id=134 op=UNLOAD May 17 00:50:05.913000 audit[3822]: AVC avc: denied { bpf } for pid=3822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:05.913000 audit[3822]: AVC avc: denied { bpf } for pid=3822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:05.913000 audit[3822]: AVC avc: denied { bpf } for pid=3822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:05.913000 audit[3822]: AVC avc: denied { perfmon } for pid=3822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:05.913000 audit[3822]: AVC avc: denied { perfmon } for pid=3822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:05.913000 audit[3822]: AVC avc: denied { perfmon } for pid=3822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:05.913000 audit[3822]: AVC avc: denied { perfmon } for pid=3822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:05.913000 audit[3822]: AVC avc: denied { perfmon } for pid=3822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:05.913000 audit[3822]: AVC avc: denied { bpf } for pid=3822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:05.913000 audit[3822]: AVC avc: denied { bpf } for pid=3822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:05.913000 audit: BPF prog-id=136 op=LOAD May 17 00:50:05.913000 audit[3822]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=3055 pid=3822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:05.913000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131393965386662633866376138373335626430653838616565363031 May 17 00:50:06.327700 env[1480]: time="2025-05-17T00:50:06.327644227Z" level=info msg="StartContainer for \"1199e8fbc8f7a8735bd0e88aee601a4d3ea26357c725870e7083c78e967fda18\" returns successfully" May 17 00:50:07.011364 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 17 00:50:07.011536 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 17 00:50:07.187166 kubelet[2537]: I0517 00:50:07.187090 2537 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-6v7c4" podStartSLOduration=3.229885157 podStartE2EDuration="45.187063723s" podCreationTimestamp="2025-05-17 00:49:22 +0000 UTC" firstStartedPulling="2025-05-17 00:49:23.826398936 +0000 UTC m=+22.818395891" lastFinishedPulling="2025-05-17 00:50:05.783577502 +0000 UTC m=+64.775574457" observedRunningTime="2025-05-17 00:50:06.615051624 +0000 UTC m=+65.607048579" watchObservedRunningTime="2025-05-17 00:50:07.187063723 +0000 UTC m=+66.179060638" May 17 00:50:07.188177 env[1480]: time="2025-05-17T00:50:07.188142985Z" level=info msg="StopPodSandbox for \"b73e68c4e34ef0c667f67b5e6e4b248524b373214b07b74fbf31422ac03f7e1e\"" May 17 00:50:07.367942 env[1480]: 2025-05-17 00:50:07.316 [INFO][3889] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="b73e68c4e34ef0c667f67b5e6e4b248524b373214b07b74fbf31422ac03f7e1e" May 17 00:50:07.367942 env[1480]: 2025-05-17 00:50:07.316 [INFO][3889] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="b73e68c4e34ef0c667f67b5e6e4b248524b373214b07b74fbf31422ac03f7e1e" iface="eth0" netns="/var/run/netns/cni-8da816c2-5e77-017a-01ec-e8258091e8e0" May 17 00:50:07.367942 env[1480]: 2025-05-17 00:50:07.316 [INFO][3889] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="b73e68c4e34ef0c667f67b5e6e4b248524b373214b07b74fbf31422ac03f7e1e" iface="eth0" netns="/var/run/netns/cni-8da816c2-5e77-017a-01ec-e8258091e8e0" May 17 00:50:07.367942 env[1480]: 2025-05-17 00:50:07.316 [INFO][3889] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="b73e68c4e34ef0c667f67b5e6e4b248524b373214b07b74fbf31422ac03f7e1e" iface="eth0" netns="/var/run/netns/cni-8da816c2-5e77-017a-01ec-e8258091e8e0" May 17 00:50:07.367942 env[1480]: 2025-05-17 00:50:07.316 [INFO][3889] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="b73e68c4e34ef0c667f67b5e6e4b248524b373214b07b74fbf31422ac03f7e1e" May 17 00:50:07.367942 env[1480]: 2025-05-17 00:50:07.316 [INFO][3889] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b73e68c4e34ef0c667f67b5e6e4b248524b373214b07b74fbf31422ac03f7e1e" May 17 00:50:07.367942 env[1480]: 2025-05-17 00:50:07.349 [INFO][3903] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b73e68c4e34ef0c667f67b5e6e4b248524b373214b07b74fbf31422ac03f7e1e" HandleID="k8s-pod-network.b73e68c4e34ef0c667f67b5e6e4b248524b373214b07b74fbf31422ac03f7e1e" Workload="ci--3510.3.7--n--4234abe502-k8s-whisker--b77f4458b--bwdl4-eth0" May 17 00:50:07.367942 env[1480]: 2025-05-17 00:50:07.349 [INFO][3903] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:50:07.367942 env[1480]: 2025-05-17 00:50:07.349 [INFO][3903] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:50:07.367942 env[1480]: 2025-05-17 00:50:07.358 [WARNING][3903] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b73e68c4e34ef0c667f67b5e6e4b248524b373214b07b74fbf31422ac03f7e1e" HandleID="k8s-pod-network.b73e68c4e34ef0c667f67b5e6e4b248524b373214b07b74fbf31422ac03f7e1e" Workload="ci--3510.3.7--n--4234abe502-k8s-whisker--b77f4458b--bwdl4-eth0" May 17 00:50:07.367942 env[1480]: 2025-05-17 00:50:07.358 [INFO][3903] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b73e68c4e34ef0c667f67b5e6e4b248524b373214b07b74fbf31422ac03f7e1e" HandleID="k8s-pod-network.b73e68c4e34ef0c667f67b5e6e4b248524b373214b07b74fbf31422ac03f7e1e" Workload="ci--3510.3.7--n--4234abe502-k8s-whisker--b77f4458b--bwdl4-eth0" May 17 00:50:07.367942 env[1480]: 2025-05-17 00:50:07.361 [INFO][3903] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:50:07.367942 env[1480]: 2025-05-17 00:50:07.363 [INFO][3889] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="b73e68c4e34ef0c667f67b5e6e4b248524b373214b07b74fbf31422ac03f7e1e" May 17 00:50:07.367330 systemd[1]: run-netns-cni\x2d8da816c2\x2d5e77\x2d017a\x2d01ec\x2de8258091e8e0.mount: Deactivated successfully. May 17 00:50:07.369647 env[1480]: time="2025-05-17T00:50:07.369587725Z" level=info msg="TearDown network for sandbox \"b73e68c4e34ef0c667f67b5e6e4b248524b373214b07b74fbf31422ac03f7e1e\" successfully" May 17 00:50:07.369647 env[1480]: time="2025-05-17T00:50:07.369642246Z" level=info msg="StopPodSandbox for \"b73e68c4e34ef0c667f67b5e6e4b248524b373214b07b74fbf31422ac03f7e1e\" returns successfully" May 17 00:50:07.404570 kubelet[2537]: I0517 00:50:07.404509 2537 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/0379ba0d-b0c4-497d-af1d-507d240f1f57-whisker-ca-bundle\") pod \"0379ba0d-b0c4-497d-af1d-507d240f1f57\" (UID: \"0379ba0d-b0c4-497d-af1d-507d240f1f57\") " May 17 00:50:07.404570 kubelet[2537]: I0517 00:50:07.404566 2537 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/0379ba0d-b0c4-497d-af1d-507d240f1f57-whisker-backend-key-pair\") pod \"0379ba0d-b0c4-497d-af1d-507d240f1f57\" (UID: \"0379ba0d-b0c4-497d-af1d-507d240f1f57\") " May 17 00:50:07.404758 kubelet[2537]: I0517 00:50:07.404603 2537 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"kube-api-access-vsxmd\" (UniqueName: \"kubernetes.io/projected/0379ba0d-b0c4-497d-af1d-507d240f1f57-kube-api-access-vsxmd\") pod \"0379ba0d-b0c4-497d-af1d-507d240f1f57\" (UID: \"0379ba0d-b0c4-497d-af1d-507d240f1f57\") " May 17 00:50:07.405086 kubelet[2537]: I0517 00:50:07.405047 2537 operation_generator.go:781] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/0379ba0d-b0c4-497d-af1d-507d240f1f57-whisker-ca-bundle" (OuterVolumeSpecName: "whisker-ca-bundle") pod "0379ba0d-b0c4-497d-af1d-507d240f1f57" (UID: "0379ba0d-b0c4-497d-af1d-507d240f1f57"). InnerVolumeSpecName "whisker-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGIDValue "" May 17 00:50:07.417267 kubelet[2537]: I0517 00:50:07.414806 2537 operation_generator.go:781] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/0379ba0d-b0c4-497d-af1d-507d240f1f57-kube-api-access-vsxmd" (OuterVolumeSpecName: "kube-api-access-vsxmd") pod "0379ba0d-b0c4-497d-af1d-507d240f1f57" (UID: "0379ba0d-b0c4-497d-af1d-507d240f1f57"). InnerVolumeSpecName "kube-api-access-vsxmd". PluginName "kubernetes.io/projected", VolumeGIDValue "" May 17 00:50:07.415270 systemd[1]: var-lib-kubelet-pods-0379ba0d\x2db0c4\x2d497d\x2daf1d\x2d507d240f1f57-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dvsxmd.mount: Deactivated successfully. May 17 00:50:07.418295 systemd[1]: var-lib-kubelet-pods-0379ba0d\x2db0c4\x2d497d\x2daf1d\x2d507d240f1f57-volumes-kubernetes.io\x7esecret-whisker\x2dbackend\x2dkey\x2dpair.mount: Deactivated successfully. May 17 00:50:07.418618 kubelet[2537]: I0517 00:50:07.418578 2537 operation_generator.go:781] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/0379ba0d-b0c4-497d-af1d-507d240f1f57-whisker-backend-key-pair" (OuterVolumeSpecName: "whisker-backend-key-pair") pod "0379ba0d-b0c4-497d-af1d-507d240f1f57" (UID: "0379ba0d-b0c4-497d-af1d-507d240f1f57"). InnerVolumeSpecName "whisker-backend-key-pair". PluginName "kubernetes.io/secret", VolumeGIDValue "" May 17 00:50:07.505629 kubelet[2537]: I0517 00:50:07.505595 2537 reconciler_common.go:299] "Volume detached for volume \"kube-api-access-vsxmd\" (UniqueName: \"kubernetes.io/projected/0379ba0d-b0c4-497d-af1d-507d240f1f57-kube-api-access-vsxmd\") on node \"ci-3510.3.7-n-4234abe502\" DevicePath \"\"" May 17 00:50:07.505818 kubelet[2537]: I0517 00:50:07.505804 2537 reconciler_common.go:299] "Volume detached for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/0379ba0d-b0c4-497d-af1d-507d240f1f57-whisker-ca-bundle\") on node \"ci-3510.3.7-n-4234abe502\" DevicePath \"\"" May 17 00:50:07.505882 kubelet[2537]: I0517 00:50:07.505870 2537 reconciler_common.go:299] "Volume detached for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/0379ba0d-b0c4-497d-af1d-507d240f1f57-whisker-backend-key-pair\") on node \"ci-3510.3.7-n-4234abe502\" DevicePath \"\"" May 17 00:50:07.593039 systemd[1]: Removed slice kubepods-besteffort-pod0379ba0d_b0c4_497d_af1d_507d240f1f57.slice. May 17 00:50:07.706687 systemd[1]: Created slice kubepods-besteffort-podf2c35a1f_88d3_4b21_9134_27f4e6567489.slice. May 17 00:50:07.789744 systemd[1]: run-containerd-runc-k8s.io-1199e8fbc8f7a8735bd0e88aee601a4d3ea26357c725870e7083c78e967fda18-runc.uWBY41.mount: Deactivated successfully. May 17 00:50:07.807854 kubelet[2537]: I0517 00:50:07.807817 2537 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/f2c35a1f-88d3-4b21-9134-27f4e6567489-whisker-backend-key-pair\") pod \"whisker-65bfcd6f48-fpglr\" (UID: \"f2c35a1f-88d3-4b21-9134-27f4e6567489\") " pod="calico-system/whisker-65bfcd6f48-fpglr" May 17 00:50:07.808078 kubelet[2537]: I0517 00:50:07.808041 2537 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/f2c35a1f-88d3-4b21-9134-27f4e6567489-whisker-ca-bundle\") pod \"whisker-65bfcd6f48-fpglr\" (UID: \"f2c35a1f-88d3-4b21-9134-27f4e6567489\") " pod="calico-system/whisker-65bfcd6f48-fpglr" May 17 00:50:07.808135 kubelet[2537]: I0517 00:50:07.808094 2537 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-m2wqv\" (UniqueName: \"kubernetes.io/projected/f2c35a1f-88d3-4b21-9134-27f4e6567489-kube-api-access-m2wqv\") pod \"whisker-65bfcd6f48-fpglr\" (UID: \"f2c35a1f-88d3-4b21-9134-27f4e6567489\") " pod="calico-system/whisker-65bfcd6f48-fpglr" May 17 00:50:08.011720 env[1480]: time="2025-05-17T00:50:08.011607133Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-65bfcd6f48-fpglr,Uid:f2c35a1f-88d3-4b21-9134-27f4e6567489,Namespace:calico-system,Attempt:0,}" May 17 00:50:08.239513 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:50:08.239650 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali045c21a7a32: link becomes ready May 17 00:50:08.244111 systemd-networkd[1635]: cali045c21a7a32: Link UP May 17 00:50:08.244292 systemd-networkd[1635]: cali045c21a7a32: Gained carrier May 17 00:50:08.263042 env[1480]: 2025-05-17 00:50:08.087 [INFO][3946] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 17 00:50:08.263042 env[1480]: 2025-05-17 00:50:08.102 [INFO][3946] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--4234abe502-k8s-whisker--65bfcd6f48--fpglr-eth0 whisker-65bfcd6f48- calico-system f2c35a1f-88d3-4b21-9134-27f4e6567489 992 0 2025-05-17 00:50:07 +0000 UTC map[app.kubernetes.io/name:whisker k8s-app:whisker pod-template-hash:65bfcd6f48 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:whisker] map[] [] [] []} {k8s ci-3510.3.7-n-4234abe502 whisker-65bfcd6f48-fpglr eth0 whisker [] [] [kns.calico-system ksa.calico-system.whisker] cali045c21a7a32 [] [] }} ContainerID="a7c7e4573bf2a282d606565fb2ce0c9ab5c420fd945e6d1bc7d4346f5e8029f3" Namespace="calico-system" Pod="whisker-65bfcd6f48-fpglr" WorkloadEndpoint="ci--3510.3.7--n--4234abe502-k8s-whisker--65bfcd6f48--fpglr-" May 17 00:50:08.263042 env[1480]: 2025-05-17 00:50:08.102 [INFO][3946] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="a7c7e4573bf2a282d606565fb2ce0c9ab5c420fd945e6d1bc7d4346f5e8029f3" Namespace="calico-system" Pod="whisker-65bfcd6f48-fpglr" WorkloadEndpoint="ci--3510.3.7--n--4234abe502-k8s-whisker--65bfcd6f48--fpglr-eth0" May 17 00:50:08.263042 env[1480]: 2025-05-17 00:50:08.126 [INFO][3959] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a7c7e4573bf2a282d606565fb2ce0c9ab5c420fd945e6d1bc7d4346f5e8029f3" HandleID="k8s-pod-network.a7c7e4573bf2a282d606565fb2ce0c9ab5c420fd945e6d1bc7d4346f5e8029f3" Workload="ci--3510.3.7--n--4234abe502-k8s-whisker--65bfcd6f48--fpglr-eth0" May 17 00:50:08.263042 env[1480]: 2025-05-17 00:50:08.126 [INFO][3959] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="a7c7e4573bf2a282d606565fb2ce0c9ab5c420fd945e6d1bc7d4346f5e8029f3" HandleID="k8s-pod-network.a7c7e4573bf2a282d606565fb2ce0c9ab5c420fd945e6d1bc7d4346f5e8029f3" Workload="ci--3510.3.7--n--4234abe502-k8s-whisker--65bfcd6f48--fpglr-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002d7180), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.7-n-4234abe502", "pod":"whisker-65bfcd6f48-fpglr", "timestamp":"2025-05-17 00:50:08.126702578 +0000 UTC"}, Hostname:"ci-3510.3.7-n-4234abe502", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:50:08.263042 env[1480]: 2025-05-17 00:50:08.126 [INFO][3959] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:50:08.263042 env[1480]: 2025-05-17 00:50:08.127 [INFO][3959] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:50:08.263042 env[1480]: 2025-05-17 00:50:08.127 [INFO][3959] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-4234abe502' May 17 00:50:08.263042 env[1480]: 2025-05-17 00:50:08.136 [INFO][3959] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.a7c7e4573bf2a282d606565fb2ce0c9ab5c420fd945e6d1bc7d4346f5e8029f3" host="ci-3510.3.7-n-4234abe502" May 17 00:50:08.263042 env[1480]: 2025-05-17 00:50:08.141 [INFO][3959] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.7-n-4234abe502" May 17 00:50:08.263042 env[1480]: 2025-05-17 00:50:08.146 [INFO][3959] ipam/ipam.go 511: Trying affinity for 192.168.86.192/26 host="ci-3510.3.7-n-4234abe502" May 17 00:50:08.263042 env[1480]: 2025-05-17 00:50:08.148 [INFO][3959] ipam/ipam.go 158: Attempting to load block cidr=192.168.86.192/26 host="ci-3510.3.7-n-4234abe502" May 17 00:50:08.263042 env[1480]: 2025-05-17 00:50:08.150 [INFO][3959] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.86.192/26 host="ci-3510.3.7-n-4234abe502" May 17 00:50:08.263042 env[1480]: 2025-05-17 00:50:08.150 [INFO][3959] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.86.192/26 handle="k8s-pod-network.a7c7e4573bf2a282d606565fb2ce0c9ab5c420fd945e6d1bc7d4346f5e8029f3" host="ci-3510.3.7-n-4234abe502" May 17 00:50:08.263042 env[1480]: 2025-05-17 00:50:08.157 [INFO][3959] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.a7c7e4573bf2a282d606565fb2ce0c9ab5c420fd945e6d1bc7d4346f5e8029f3 May 17 00:50:08.263042 env[1480]: 2025-05-17 00:50:08.170 [INFO][3959] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.86.192/26 handle="k8s-pod-network.a7c7e4573bf2a282d606565fb2ce0c9ab5c420fd945e6d1bc7d4346f5e8029f3" host="ci-3510.3.7-n-4234abe502" May 17 00:50:08.263042 env[1480]: 2025-05-17 00:50:08.180 [INFO][3959] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.86.193/26] block=192.168.86.192/26 handle="k8s-pod-network.a7c7e4573bf2a282d606565fb2ce0c9ab5c420fd945e6d1bc7d4346f5e8029f3" host="ci-3510.3.7-n-4234abe502" May 17 00:50:08.263042 env[1480]: 2025-05-17 00:50:08.180 [INFO][3959] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.86.193/26] handle="k8s-pod-network.a7c7e4573bf2a282d606565fb2ce0c9ab5c420fd945e6d1bc7d4346f5e8029f3" host="ci-3510.3.7-n-4234abe502" May 17 00:50:08.263042 env[1480]: 2025-05-17 00:50:08.180 [INFO][3959] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:50:08.263042 env[1480]: 2025-05-17 00:50:08.180 [INFO][3959] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.86.193/26] IPv6=[] ContainerID="a7c7e4573bf2a282d606565fb2ce0c9ab5c420fd945e6d1bc7d4346f5e8029f3" HandleID="k8s-pod-network.a7c7e4573bf2a282d606565fb2ce0c9ab5c420fd945e6d1bc7d4346f5e8029f3" Workload="ci--3510.3.7--n--4234abe502-k8s-whisker--65bfcd6f48--fpglr-eth0" May 17 00:50:08.263995 env[1480]: 2025-05-17 00:50:08.182 [INFO][3946] cni-plugin/k8s.go 418: Populated endpoint ContainerID="a7c7e4573bf2a282d606565fb2ce0c9ab5c420fd945e6d1bc7d4346f5e8029f3" Namespace="calico-system" Pod="whisker-65bfcd6f48-fpglr" WorkloadEndpoint="ci--3510.3.7--n--4234abe502-k8s-whisker--65bfcd6f48--fpglr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--4234abe502-k8s-whisker--65bfcd6f48--fpglr-eth0", GenerateName:"whisker-65bfcd6f48-", Namespace:"calico-system", SelfLink:"", UID:"f2c35a1f-88d3-4b21-9134-27f4e6567489", ResourceVersion:"992", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 50, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"65bfcd6f48", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-4234abe502", ContainerID:"", Pod:"whisker-65bfcd6f48-fpglr", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.86.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"cali045c21a7a32", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:50:08.263995 env[1480]: 2025-05-17 00:50:08.182 [INFO][3946] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.86.193/32] ContainerID="a7c7e4573bf2a282d606565fb2ce0c9ab5c420fd945e6d1bc7d4346f5e8029f3" Namespace="calico-system" Pod="whisker-65bfcd6f48-fpglr" WorkloadEndpoint="ci--3510.3.7--n--4234abe502-k8s-whisker--65bfcd6f48--fpglr-eth0" May 17 00:50:08.263995 env[1480]: 2025-05-17 00:50:08.182 [INFO][3946] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali045c21a7a32 ContainerID="a7c7e4573bf2a282d606565fb2ce0c9ab5c420fd945e6d1bc7d4346f5e8029f3" Namespace="calico-system" Pod="whisker-65bfcd6f48-fpglr" WorkloadEndpoint="ci--3510.3.7--n--4234abe502-k8s-whisker--65bfcd6f48--fpglr-eth0" May 17 00:50:08.263995 env[1480]: 2025-05-17 00:50:08.242 [INFO][3946] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="a7c7e4573bf2a282d606565fb2ce0c9ab5c420fd945e6d1bc7d4346f5e8029f3" Namespace="calico-system" Pod="whisker-65bfcd6f48-fpglr" WorkloadEndpoint="ci--3510.3.7--n--4234abe502-k8s-whisker--65bfcd6f48--fpglr-eth0" May 17 00:50:08.263995 env[1480]: 2025-05-17 00:50:08.243 [INFO][3946] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="a7c7e4573bf2a282d606565fb2ce0c9ab5c420fd945e6d1bc7d4346f5e8029f3" Namespace="calico-system" Pod="whisker-65bfcd6f48-fpglr" WorkloadEndpoint="ci--3510.3.7--n--4234abe502-k8s-whisker--65bfcd6f48--fpglr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--4234abe502-k8s-whisker--65bfcd6f48--fpglr-eth0", GenerateName:"whisker-65bfcd6f48-", Namespace:"calico-system", SelfLink:"", UID:"f2c35a1f-88d3-4b21-9134-27f4e6567489", ResourceVersion:"992", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 50, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"65bfcd6f48", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-4234abe502", ContainerID:"a7c7e4573bf2a282d606565fb2ce0c9ab5c420fd945e6d1bc7d4346f5e8029f3", Pod:"whisker-65bfcd6f48-fpglr", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.86.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"cali045c21a7a32", MAC:"6e:79:ae:ba:67:f7", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:50:08.263995 env[1480]: 2025-05-17 00:50:08.259 [INFO][3946] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="a7c7e4573bf2a282d606565fb2ce0c9ab5c420fd945e6d1bc7d4346f5e8029f3" Namespace="calico-system" Pod="whisker-65bfcd6f48-fpglr" WorkloadEndpoint="ci--3510.3.7--n--4234abe502-k8s-whisker--65bfcd6f48--fpglr-eth0" May 17 00:50:08.291104 env[1480]: time="2025-05-17T00:50:08.291003336Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:50:08.291296 env[1480]: time="2025-05-17T00:50:08.291121058Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:50:08.291296 env[1480]: time="2025-05-17T00:50:08.291149499Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:50:08.291491 env[1480]: time="2025-05-17T00:50:08.291442945Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a7c7e4573bf2a282d606565fb2ce0c9ab5c420fd945e6d1bc7d4346f5e8029f3 pid=3982 runtime=io.containerd.runc.v2 May 17 00:50:08.303873 systemd[1]: Started cri-containerd-a7c7e4573bf2a282d606565fb2ce0c9ab5c420fd945e6d1bc7d4346f5e8029f3.scope. May 17 00:50:08.324573 kernel: kauditd_printk_skb: 45 callbacks suppressed May 17 00:50:08.324714 kernel: audit: type=1400 audit(1747443008.317:946): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:08.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:08.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:08.361976 kernel: audit: type=1400 audit(1747443008.317:947): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:08.362108 kernel: audit: type=1400 audit(1747443008.317:948): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:08.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:08.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:08.401860 kernel: audit: type=1400 audit(1747443008.317:949): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:08.402006 kernel: audit: type=1400 audit(1747443008.317:950): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:08.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:08.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:08.445385 kernel: audit: type=1400 audit(1747443008.317:951): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:08.445551 kernel: audit: type=1400 audit(1747443008.317:952): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:08.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:08.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:08.485437 kernel: audit: type=1400 audit(1747443008.317:953): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:08.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:08.503755 kernel: audit: type=1400 audit(1747443008.317:954): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:08.503891 kernel: audit: type=1400 audit(1747443008.323:955): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:08.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:08.323000 audit: BPF prog-id=137 op=LOAD May 17 00:50:08.341000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:08.341000 audit[3992]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3982 pid=3992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:08.341000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137633765343537336266326132383264363036353635666232636530 May 17 00:50:08.341000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:08.341000 audit[3992]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3982 pid=3992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:08.341000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137633765343537336266326132383264363036353635666232636530 May 17 00:50:08.341000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:08.341000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:08.341000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:08.341000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:08.341000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:08.341000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:08.341000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:08.341000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:08.341000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:08.341000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:08.341000 audit: BPF prog-id=138 op=LOAD May 17 00:50:08.341000 audit[3992]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3982 pid=3992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:08.341000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137633765343537336266326132383264363036353635666232636530 May 17 00:50:08.360000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:08.360000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:08.360000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:08.360000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:08.360000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:08.360000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:08.360000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:08.360000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:08.360000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:08.360000 audit: BPF prog-id=139 op=LOAD May 17 00:50:08.360000 audit[3992]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3982 pid=3992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:08.360000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137633765343537336266326132383264363036353635666232636530 May 17 00:50:08.379000 audit: BPF prog-id=139 op=UNLOAD May 17 00:50:08.379000 audit: BPF prog-id=138 op=UNLOAD May 17 00:50:08.379000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:08.379000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:08.379000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:08.379000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:08.379000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:08.379000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:08.379000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:08.379000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:08.379000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:08.379000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:08.379000 audit: BPF prog-id=140 op=LOAD May 17 00:50:08.379000 audit[3992]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3982 pid=3992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:08.379000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137633765343537336266326132383264363036353635666232636530 May 17 00:50:08.539216 env[1480]: time="2025-05-17T00:50:08.539157988Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-65bfcd6f48-fpglr,Uid:f2c35a1f-88d3-4b21-9134-27f4e6567489,Namespace:calico-system,Attempt:0,} returns sandbox id \"a7c7e4573bf2a282d606565fb2ce0c9ab5c420fd945e6d1bc7d4346f5e8029f3\"" May 17 00:50:08.541227 env[1480]: time="2025-05-17T00:50:08.541169669Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\"" May 17 00:50:08.577000 audit[4048]: AVC avc: denied { write } for pid=4048 comm="tee" name="fd" dev="proc" ino=27700 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:50:08.577000 audit[4048]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc82557c0 a2=241 a3=1b6 items=1 ppid=4030 pid=4048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:08.577000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 17 00:50:08.577000 audit: PATH item=0 name="/dev/fd/63" inode=26704 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:50:08.577000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:50:08.594000 audit[4061]: AVC avc: denied { write } for pid=4061 comm="tee" name="fd" dev="proc" ino=27715 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:50:08.594000 audit[4061]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffee6cd7cf a2=241 a3=1b6 items=1 ppid=4027 pid=4061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:08.594000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 17 00:50:08.594000 audit: PATH item=0 name="/dev/fd/63" inode=27697 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:50:08.594000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:50:08.620000 audit[4072]: AVC avc: denied { write } for pid=4072 comm="tee" name="fd" dev="proc" ino=27734 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:50:08.620000 audit[4072]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffedfd17d1 a2=241 a3=1b6 items=1 ppid=4035 pid=4072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:08.620000 audit: CWD cwd="/etc/service/enabled/cni/log" May 17 00:50:08.614000 audit[4075]: AVC avc: denied { write } for pid=4075 comm="tee" name="fd" dev="proc" ino=27727 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:50:08.614000 audit[4075]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff6e947cf a2=241 a3=1b6 items=1 ppid=4028 pid=4075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:08.614000 audit: CWD cwd="/etc/service/enabled/confd/log" May 17 00:50:08.614000 audit: PATH item=0 name="/dev/fd/63" inode=27712 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:50:08.614000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:50:08.620000 audit: PATH item=0 name="/dev/fd/63" inode=26727 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:50:08.620000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:50:08.642000 audit[4092]: AVC avc: denied { write } for pid=4092 comm="tee" name="fd" dev="proc" ino=27743 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:50:08.642000 audit[4092]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc8c2d7bf a2=241 a3=1b6 items=1 ppid=4040 pid=4092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:08.642000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 17 00:50:08.642000 audit: PATH item=0 name="/dev/fd/63" inode=27737 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:50:08.642000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:50:08.651000 audit[4090]: AVC avc: denied { write } for pid=4090 comm="tee" name="fd" dev="proc" ino=27749 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:50:08.651000 audit[4090]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc19227cf a2=241 a3=1b6 items=1 ppid=4038 pid=4090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:08.651000 audit: CWD cwd="/etc/service/enabled/felix/log" May 17 00:50:08.651000 audit: PATH item=0 name="/dev/fd/63" inode=26730 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:50:08.651000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:50:08.654000 audit[4094]: AVC avc: denied { write } for pid=4094 comm="tee" name="fd" dev="proc" ino=27751 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:50:08.654000 audit[4094]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff75227d0 a2=241 a3=1b6 items=1 ppid=4025 pid=4094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:08.654000 audit: CWD cwd="/etc/service/enabled/bird/log" May 17 00:50:08.654000 audit: PATH item=0 name="/dev/fd/63" inode=27738 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:50:08.654000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:50:08.699743 env[1480]: time="2025-05-17T00:50:08.699673190Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:50:08.705819 env[1480]: time="2025-05-17T00:50:08.705752633Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:50:08.706780 kubelet[2537]: E0517 00:50:08.706164 2537 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:50:08.706780 kubelet[2537]: E0517 00:50:08.706274 2537 kuberuntime_image.go:42] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:50:08.707158 kubelet[2537]: E0517 00:50:08.706714 2537 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.0,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:2d789fd7d12f447a87f7555b072d9747,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-m2wqv,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-65bfcd6f48-fpglr_calico-system(f2c35a1f-88d3-4b21-9134-27f4e6567489): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:50:08.709051 env[1480]: time="2025-05-17T00:50:08.709014298Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\"" May 17 00:50:08.898475 env[1480]: time="2025-05-17T00:50:08.898252081Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:50:08.903761 env[1480]: time="2025-05-17T00:50:08.903690030Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:50:08.904622 kubelet[2537]: E0517 00:50:08.904099 2537 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:50:08.904622 kubelet[2537]: E0517 00:50:08.904162 2537 kuberuntime_image.go:42] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:50:08.904765 kubelet[2537]: E0517 00:50:08.904314 2537 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-m2wqv,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-65bfcd6f48-fpglr_calico-system(f2c35a1f-88d3-4b21-9134-27f4e6567489): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:50:08.905843 kubelet[2537]: E0517 00:50:08.905725 2537 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-65bfcd6f48-fpglr" podUID="f2c35a1f-88d3-4b21-9134-27f4e6567489" May 17 00:50:08.947000 audit[4128]: AVC avc: denied { bpf } for pid=4128 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:08.947000 audit[4128]: AVC avc: denied { bpf } for pid=4128 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:08.947000 audit[4128]: AVC avc: denied { perfmon } for pid=4128 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:08.947000 audit[4128]: AVC avc: denied { perfmon } for pid=4128 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:08.947000 audit[4128]: AVC avc: denied { perfmon } for pid=4128 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:08.947000 audit[4128]: AVC avc: denied { perfmon } for pid=4128 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:08.947000 audit[4128]: AVC avc: denied { perfmon } for pid=4128 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:08.947000 audit[4128]: AVC avc: denied { bpf } for pid=4128 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:08.947000 audit[4128]: AVC avc: denied { bpf } for pid=4128 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:08.947000 audit: BPF prog-id=141 op=LOAD May 17 00:50:08.947000 audit[4128]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff2e6e9d8 a2=98 a3=fffff2e6e9c8 items=0 ppid=4043 pid=4128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:08.947000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:50:08.948000 audit: BPF prog-id=141 op=UNLOAD May 17 00:50:08.949000 audit[4128]: AVC avc: denied { bpf } for pid=4128 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:08.949000 audit[4128]: AVC avc: denied { bpf } for pid=4128 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:08.949000 audit[4128]: AVC avc: denied { perfmon } for pid=4128 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:08.949000 audit[4128]: AVC avc: denied { perfmon } for pid=4128 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:08.949000 audit[4128]: AVC avc: denied { perfmon } for pid=4128 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:08.949000 audit[4128]: AVC avc: denied { perfmon } for pid=4128 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:08.949000 audit[4128]: AVC avc: denied { perfmon } for pid=4128 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:08.949000 audit[4128]: AVC avc: denied { bpf } for pid=4128 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:08.949000 audit[4128]: AVC avc: denied { bpf } for pid=4128 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:08.949000 audit: BPF prog-id=142 op=LOAD May 17 00:50:08.949000 audit[4128]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffff2e6e668 a2=74 a3=95 items=0 ppid=4043 pid=4128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:08.949000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:50:08.949000 audit: BPF prog-id=142 op=UNLOAD May 17 00:50:08.949000 audit[4128]: AVC avc: denied { bpf } for pid=4128 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:08.949000 audit[4128]: AVC avc: denied { bpf } for pid=4128 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:08.949000 audit[4128]: AVC avc: denied { perfmon } for pid=4128 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:08.949000 audit[4128]: AVC avc: denied { perfmon } for pid=4128 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:08.949000 audit[4128]: AVC avc: denied { perfmon } for pid=4128 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:08.949000 audit[4128]: AVC avc: denied { perfmon } for pid=4128 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:08.949000 audit[4128]: AVC avc: denied { perfmon } for pid=4128 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:08.949000 audit[4128]: AVC avc: denied { bpf } for pid=4128 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:08.949000 audit[4128]: AVC avc: denied { bpf } for pid=4128 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:08.949000 audit: BPF prog-id=143 op=LOAD May 17 00:50:08.949000 audit[4128]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffff2e6e6c8 a2=94 a3=2 items=0 ppid=4043 pid=4128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:08.949000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:50:08.950000 audit: BPF prog-id=143 op=UNLOAD May 17 00:50:09.045000 audit[4128]: AVC avc: denied { bpf } for pid=4128 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.045000 audit[4128]: AVC avc: denied { bpf } for pid=4128 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.045000 audit[4128]: AVC avc: denied { perfmon } for pid=4128 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.045000 audit[4128]: AVC avc: denied { perfmon } for pid=4128 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.045000 audit[4128]: AVC avc: denied { perfmon } for pid=4128 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.045000 audit[4128]: AVC avc: denied { perfmon } for pid=4128 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.045000 audit[4128]: AVC avc: denied { perfmon } for pid=4128 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.045000 audit[4128]: AVC avc: denied { bpf } for pid=4128 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.045000 audit[4128]: AVC avc: denied { bpf } for pid=4128 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.045000 audit: BPF prog-id=144 op=LOAD May 17 00:50:09.045000 audit[4128]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffff2e6e688 a2=40 a3=fffff2e6e6b8 items=0 ppid=4043 pid=4128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:09.045000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:50:09.046000 audit: BPF prog-id=144 op=UNLOAD May 17 00:50:09.046000 audit[4128]: AVC avc: denied { perfmon } for pid=4128 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.046000 audit[4128]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=fffff2e6e7a0 a2=50 a3=0 items=0 ppid=4043 pid=4128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:09.046000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:50:09.055000 audit[4128]: AVC avc: denied { bpf } for pid=4128 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.055000 audit[4128]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff2e6e6f8 a2=28 a3=fffff2e6e828 items=0 ppid=4043 pid=4128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:09.055000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:50:09.055000 audit[4128]: AVC avc: denied { bpf } for pid=4128 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.055000 audit[4128]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff2e6e728 a2=28 a3=fffff2e6e858 items=0 ppid=4043 pid=4128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:09.055000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:50:09.055000 audit[4128]: AVC avc: denied { bpf } for pid=4128 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.055000 audit[4128]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff2e6e5d8 a2=28 a3=fffff2e6e708 items=0 ppid=4043 pid=4128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:09.055000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:50:09.055000 audit[4128]: AVC avc: denied { bpf } for pid=4128 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.055000 audit[4128]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff2e6e748 a2=28 a3=fffff2e6e878 items=0 ppid=4043 pid=4128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:09.055000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:50:09.056000 audit[4128]: AVC avc: denied { bpf } for pid=4128 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.056000 audit[4128]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff2e6e728 a2=28 a3=fffff2e6e858 items=0 ppid=4043 pid=4128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:09.056000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:50:09.056000 audit[4128]: AVC avc: denied { bpf } for pid=4128 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.056000 audit[4128]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff2e6e718 a2=28 a3=fffff2e6e848 items=0 ppid=4043 pid=4128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:09.056000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:50:09.056000 audit[4128]: AVC avc: denied { bpf } for pid=4128 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.056000 audit[4128]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff2e6e748 a2=28 a3=fffff2e6e878 items=0 ppid=4043 pid=4128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:09.056000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:50:09.056000 audit[4128]: AVC avc: denied { bpf } for pid=4128 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.056000 audit[4128]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff2e6e728 a2=28 a3=fffff2e6e858 items=0 ppid=4043 pid=4128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:09.056000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:50:09.056000 audit[4128]: AVC avc: denied { bpf } for pid=4128 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.056000 audit[4128]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff2e6e748 a2=28 a3=fffff2e6e878 items=0 ppid=4043 pid=4128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:09.056000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:50:09.056000 audit[4128]: AVC avc: denied { bpf } for pid=4128 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.056000 audit[4128]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff2e6e718 a2=28 a3=fffff2e6e848 items=0 ppid=4043 pid=4128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:09.056000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:50:09.057000 audit[4128]: AVC avc: denied { bpf } for pid=4128 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.057000 audit[4128]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff2e6e798 a2=28 a3=fffff2e6e8d8 items=0 ppid=4043 pid=4128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:09.057000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:50:09.057000 audit[4128]: AVC avc: denied { perfmon } for pid=4128 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.057000 audit[4128]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=fffff2e6e4d0 a2=50 a3=0 items=0 ppid=4043 pid=4128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:09.057000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:50:09.057000 audit[4128]: AVC avc: denied { bpf } for pid=4128 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.057000 audit[4128]: AVC avc: denied { bpf } for pid=4128 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.057000 audit[4128]: AVC avc: denied { perfmon } for pid=4128 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.057000 audit[4128]: AVC avc: denied { perfmon } for pid=4128 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.057000 audit[4128]: AVC avc: denied { perfmon } for pid=4128 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.057000 audit[4128]: AVC avc: denied { perfmon } for pid=4128 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.057000 audit[4128]: AVC avc: denied { perfmon } for pid=4128 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.057000 audit[4128]: AVC avc: denied { bpf } for pid=4128 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.057000 audit[4128]: AVC avc: denied { bpf } for pid=4128 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.057000 audit: BPF prog-id=145 op=LOAD May 17 00:50:09.057000 audit[4128]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=fffff2e6e4d8 a2=94 a3=5 items=0 ppid=4043 pid=4128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:09.057000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:50:09.058000 audit: BPF prog-id=145 op=UNLOAD May 17 00:50:09.058000 audit[4128]: AVC avc: denied { perfmon } for pid=4128 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.058000 audit[4128]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=fffff2e6e5e0 a2=50 a3=0 items=0 ppid=4043 pid=4128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:09.058000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:50:09.058000 audit[4128]: AVC avc: denied { bpf } for pid=4128 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.058000 audit[4128]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=fffff2e6e728 a2=4 a3=3 items=0 ppid=4043 pid=4128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:09.058000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:50:09.058000 audit[4128]: AVC avc: denied { bpf } for pid=4128 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.058000 audit[4128]: AVC avc: denied { bpf } for pid=4128 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.058000 audit[4128]: AVC avc: denied { perfmon } for pid=4128 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.058000 audit[4128]: AVC avc: denied { bpf } for pid=4128 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.058000 audit[4128]: AVC avc: denied { perfmon } for pid=4128 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.058000 audit[4128]: AVC avc: denied { perfmon } for pid=4128 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.058000 audit[4128]: AVC avc: denied { perfmon } for pid=4128 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.058000 audit[4128]: AVC avc: denied { perfmon } for pid=4128 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.058000 audit[4128]: AVC avc: denied { perfmon } for pid=4128 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.058000 audit[4128]: AVC avc: denied { bpf } for pid=4128 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.058000 audit[4128]: AVC avc: denied { confidentiality } for pid=4128 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:50:09.058000 audit[4128]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffff2e6e708 a2=94 a3=6 items=0 ppid=4043 pid=4128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:09.058000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:50:09.059000 audit[4128]: AVC avc: denied { bpf } for pid=4128 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.059000 audit[4128]: AVC avc: denied { bpf } for pid=4128 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.059000 audit[4128]: AVC avc: denied { perfmon } for pid=4128 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.059000 audit[4128]: AVC avc: denied { bpf } for pid=4128 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.059000 audit[4128]: AVC avc: denied { perfmon } for pid=4128 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.059000 audit[4128]: AVC avc: denied { perfmon } for pid=4128 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.059000 audit[4128]: AVC avc: denied { perfmon } for pid=4128 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.059000 audit[4128]: AVC avc: denied { perfmon } for pid=4128 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.059000 audit[4128]: AVC avc: denied { perfmon } for pid=4128 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.059000 audit[4128]: AVC avc: denied { bpf } for pid=4128 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.059000 audit[4128]: AVC avc: denied { confidentiality } for pid=4128 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:50:09.059000 audit[4128]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffff2e6ded8 a2=94 a3=83 items=0 ppid=4043 pid=4128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:09.059000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:50:09.060000 audit[4128]: AVC avc: denied { bpf } for pid=4128 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.060000 audit[4128]: AVC avc: denied { bpf } for pid=4128 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.060000 audit[4128]: AVC avc: denied { perfmon } for pid=4128 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.060000 audit[4128]: AVC avc: denied { bpf } for pid=4128 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.060000 audit[4128]: AVC avc: denied { perfmon } for pid=4128 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.060000 audit[4128]: AVC avc: denied { perfmon } for pid=4128 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.060000 audit[4128]: AVC avc: denied { perfmon } for pid=4128 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.060000 audit[4128]: AVC avc: denied { perfmon } for pid=4128 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.060000 audit[4128]: AVC avc: denied { perfmon } for pid=4128 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.060000 audit[4128]: AVC avc: denied { bpf } for pid=4128 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.060000 audit[4128]: AVC avc: denied { confidentiality } for pid=4128 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:50:09.060000 audit[4128]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffff2e6ded8 a2=94 a3=83 items=0 ppid=4043 pid=4128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:09.060000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:50:09.070000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.070000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.070000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.070000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.070000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.070000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.070000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.070000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.070000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.070000 audit: BPF prog-id=146 op=LOAD May 17 00:50:09.070000 audit[4132]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffcc234978 a2=98 a3=ffffcc234968 items=0 ppid=4043 pid=4132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:09.070000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 00:50:09.071000 audit: BPF prog-id=146 op=UNLOAD May 17 00:50:09.071000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.071000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.071000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.071000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.071000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.071000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.071000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.071000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.071000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.071000 audit: BPF prog-id=147 op=LOAD May 17 00:50:09.071000 audit[4132]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffcc234828 a2=74 a3=95 items=0 ppid=4043 pid=4132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:09.071000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 00:50:09.072000 audit: BPF prog-id=147 op=UNLOAD May 17 00:50:09.072000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.072000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.072000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.072000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.072000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.072000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.072000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.072000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.072000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.072000 audit: BPF prog-id=148 op=LOAD May 17 00:50:09.072000 audit[4132]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffcc234858 a2=40 a3=ffffcc234888 items=0 ppid=4043 pid=4132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:09.072000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 00:50:09.072000 audit: BPF prog-id=148 op=UNLOAD May 17 00:50:09.145767 kubelet[2537]: I0517 00:50:09.145719 2537 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="0379ba0d-b0c4-497d-af1d-507d240f1f57" path="/var/lib/kubelet/pods/0379ba0d-b0c4-497d-af1d-507d240f1f57/volumes" May 17 00:50:09.216784 systemd-networkd[1635]: vxlan.calico: Link UP May 17 00:50:09.216792 systemd-networkd[1635]: vxlan.calico: Gained carrier May 17 00:50:09.242000 audit[4156]: AVC avc: denied { bpf } for pid=4156 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.242000 audit[4156]: AVC avc: denied { bpf } for pid=4156 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.242000 audit[4156]: AVC avc: denied { perfmon } for pid=4156 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.242000 audit[4156]: AVC avc: denied { perfmon } for pid=4156 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.242000 audit[4156]: AVC avc: denied { perfmon } for pid=4156 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.242000 audit[4156]: AVC avc: denied { perfmon } for pid=4156 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.242000 audit[4156]: AVC avc: denied { perfmon } for pid=4156 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.242000 audit[4156]: AVC avc: denied { bpf } for pid=4156 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.242000 audit[4156]: AVC avc: denied { bpf } for pid=4156 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.242000 audit: BPF prog-id=149 op=LOAD May 17 00:50:09.242000 audit[4156]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffcbe77648 a2=98 a3=ffffcbe77638 items=0 ppid=4043 pid=4156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:09.242000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:50:09.242000 audit: BPF prog-id=149 op=UNLOAD May 17 00:50:09.242000 audit[4156]: AVC avc: denied { bpf } for pid=4156 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.242000 audit[4156]: AVC avc: denied { bpf } for pid=4156 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.242000 audit[4156]: AVC avc: denied { perfmon } for pid=4156 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.242000 audit[4156]: AVC avc: denied { perfmon } for pid=4156 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.242000 audit[4156]: AVC avc: denied { perfmon } for pid=4156 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.242000 audit[4156]: AVC avc: denied { perfmon } for pid=4156 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.242000 audit[4156]: AVC avc: denied { perfmon } for pid=4156 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.242000 audit[4156]: AVC avc: denied { bpf } for pid=4156 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.242000 audit[4156]: AVC avc: denied { bpf } for pid=4156 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.242000 audit: BPF prog-id=150 op=LOAD May 17 00:50:09.242000 audit[4156]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffcbe77328 a2=74 a3=95 items=0 ppid=4043 pid=4156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:09.242000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:50:09.242000 audit: BPF prog-id=150 op=UNLOAD May 17 00:50:09.242000 audit[4156]: AVC avc: denied { bpf } for pid=4156 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.242000 audit[4156]: AVC avc: denied { bpf } for pid=4156 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.242000 audit[4156]: AVC avc: denied { perfmon } for pid=4156 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.242000 audit[4156]: AVC avc: denied { perfmon } for pid=4156 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.242000 audit[4156]: AVC avc: denied { perfmon } for pid=4156 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.242000 audit[4156]: AVC avc: denied { perfmon } for pid=4156 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.242000 audit[4156]: AVC avc: denied { perfmon } for pid=4156 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.242000 audit[4156]: AVC avc: denied { bpf } for pid=4156 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.242000 audit[4156]: AVC avc: denied { bpf } for pid=4156 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.242000 audit: BPF prog-id=151 op=LOAD May 17 00:50:09.242000 audit[4156]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffcbe77388 a2=94 a3=2 items=0 ppid=4043 pid=4156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:09.242000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:50:09.242000 audit: BPF prog-id=151 op=UNLOAD May 17 00:50:09.242000 audit[4156]: AVC avc: denied { bpf } for pid=4156 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.242000 audit[4156]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffcbe773b8 a2=28 a3=ffffcbe774e8 items=0 ppid=4043 pid=4156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:09.242000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:50:09.242000 audit[4156]: AVC avc: denied { bpf } for pid=4156 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.242000 audit[4156]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcbe773e8 a2=28 a3=ffffcbe77518 items=0 ppid=4043 pid=4156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:09.242000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:50:09.242000 audit[4156]: AVC avc: denied { bpf } for pid=4156 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.242000 audit[4156]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcbe77298 a2=28 a3=ffffcbe773c8 items=0 ppid=4043 pid=4156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:09.242000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:50:09.242000 audit[4156]: AVC avc: denied { bpf } for pid=4156 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.242000 audit[4156]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffcbe77408 a2=28 a3=ffffcbe77538 items=0 ppid=4043 pid=4156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:09.242000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:50:09.242000 audit[4156]: AVC avc: denied { bpf } for pid=4156 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.242000 audit[4156]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffcbe773e8 a2=28 a3=ffffcbe77518 items=0 ppid=4043 pid=4156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:09.242000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:50:09.242000 audit[4156]: AVC avc: denied { bpf } for pid=4156 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.242000 audit[4156]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffcbe773d8 a2=28 a3=ffffcbe77508 items=0 ppid=4043 pid=4156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:09.242000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:50:09.242000 audit[4156]: AVC avc: denied { bpf } for pid=4156 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.242000 audit[4156]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffcbe77408 a2=28 a3=ffffcbe77538 items=0 ppid=4043 pid=4156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:09.242000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:50:09.242000 audit[4156]: AVC avc: denied { bpf } for pid=4156 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.242000 audit[4156]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcbe773e8 a2=28 a3=ffffcbe77518 items=0 ppid=4043 pid=4156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:09.242000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:50:09.242000 audit[4156]: AVC avc: denied { bpf } for pid=4156 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.242000 audit[4156]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcbe77408 a2=28 a3=ffffcbe77538 items=0 ppid=4043 pid=4156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:09.242000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:50:09.242000 audit[4156]: AVC avc: denied { bpf } for pid=4156 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.242000 audit[4156]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcbe773d8 a2=28 a3=ffffcbe77508 items=0 ppid=4043 pid=4156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:09.242000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:50:09.243000 audit[4156]: AVC avc: denied { bpf } for pid=4156 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.243000 audit[4156]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffcbe77458 a2=28 a3=ffffcbe77598 items=0 ppid=4043 pid=4156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:09.243000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:50:09.243000 audit[4156]: AVC avc: denied { bpf } for pid=4156 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.243000 audit[4156]: AVC avc: denied { bpf } for pid=4156 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.243000 audit[4156]: AVC avc: denied { perfmon } for pid=4156 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.243000 audit[4156]: AVC avc: denied { perfmon } for pid=4156 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.243000 audit[4156]: AVC avc: denied { perfmon } for pid=4156 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.243000 audit[4156]: AVC avc: denied { perfmon } for pid=4156 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.243000 audit[4156]: AVC avc: denied { perfmon } for pid=4156 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.243000 audit[4156]: AVC avc: denied { bpf } for pid=4156 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.243000 audit[4156]: AVC avc: denied { bpf } for pid=4156 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.243000 audit: BPF prog-id=152 op=LOAD May 17 00:50:09.243000 audit[4156]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffcbe77278 a2=40 a3=ffffcbe772a8 items=0 ppid=4043 pid=4156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:09.243000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:50:09.243000 audit: BPF prog-id=152 op=UNLOAD May 17 00:50:09.243000 audit[4156]: AVC avc: denied { bpf } for pid=4156 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.243000 audit[4156]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=ffffcbe772a0 a2=50 a3=0 items=0 ppid=4043 pid=4156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:09.243000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:50:09.243000 audit[4156]: AVC avc: denied { bpf } for pid=4156 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.243000 audit[4156]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=0 a1=ffffcbe772a0 a2=50 a3=0 items=0 ppid=4043 pid=4156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:09.243000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:50:09.243000 audit[4156]: AVC avc: denied { bpf } for pid=4156 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.243000 audit[4156]: AVC avc: denied { bpf } for pid=4156 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.243000 audit[4156]: AVC avc: denied { bpf } for pid=4156 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.243000 audit[4156]: AVC avc: denied { perfmon } for pid=4156 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.243000 audit[4156]: AVC avc: denied { perfmon } for pid=4156 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.243000 audit[4156]: AVC avc: denied { perfmon } for pid=4156 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.243000 audit[4156]: AVC avc: denied { perfmon } for pid=4156 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.243000 audit[4156]: AVC avc: denied { perfmon } for pid=4156 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.243000 audit[4156]: AVC avc: denied { bpf } for pid=4156 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.243000 audit[4156]: AVC avc: denied { bpf } for pid=4156 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.243000 audit: BPF prog-id=153 op=LOAD May 17 00:50:09.243000 audit[4156]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffcbe76a08 a2=94 a3=2 items=0 ppid=4043 pid=4156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:09.243000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:50:09.243000 audit: BPF prog-id=153 op=UNLOAD May 17 00:50:09.243000 audit[4156]: AVC avc: denied { bpf } for pid=4156 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.243000 audit[4156]: AVC avc: denied { bpf } for pid=4156 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.243000 audit[4156]: AVC avc: denied { bpf } for pid=4156 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.243000 audit[4156]: AVC avc: denied { perfmon } for pid=4156 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.243000 audit[4156]: AVC avc: denied { perfmon } for pid=4156 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.243000 audit[4156]: AVC avc: denied { perfmon } for pid=4156 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.243000 audit[4156]: AVC avc: denied { perfmon } for pid=4156 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.243000 audit[4156]: AVC avc: denied { perfmon } for pid=4156 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.243000 audit[4156]: AVC avc: denied { bpf } for pid=4156 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.243000 audit[4156]: AVC avc: denied { bpf } for pid=4156 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.243000 audit: BPF prog-id=154 op=LOAD May 17 00:50:09.243000 audit[4156]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffcbe76b98 a2=94 a3=30 items=0 ppid=4043 pid=4156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:09.243000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:50:09.250000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.250000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.250000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.250000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.250000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.250000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.250000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.250000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.250000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.250000 audit: BPF prog-id=155 op=LOAD May 17 00:50:09.250000 audit[4159]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd470b878 a2=98 a3=ffffd470b868 items=0 ppid=4043 pid=4159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:09.250000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:50:09.250000 audit: BPF prog-id=155 op=UNLOAD May 17 00:50:09.252000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.252000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.252000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.252000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.252000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.252000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.252000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.252000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.252000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.252000 audit: BPF prog-id=156 op=LOAD May 17 00:50:09.252000 audit[4159]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffd470b508 a2=74 a3=95 items=0 ppid=4043 pid=4159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:09.252000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:50:09.252000 audit: BPF prog-id=156 op=UNLOAD May 17 00:50:09.252000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.252000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.252000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.252000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.252000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.252000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.252000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.252000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.252000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.252000 audit: BPF prog-id=157 op=LOAD May 17 00:50:09.252000 audit[4159]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffd470b568 a2=94 a3=2 items=0 ppid=4043 pid=4159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:09.252000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:50:09.252000 audit: BPF prog-id=157 op=UNLOAD May 17 00:50:09.360000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.360000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.360000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.360000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.360000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.360000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.360000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.360000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.360000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.360000 audit: BPF prog-id=158 op=LOAD May 17 00:50:09.360000 audit[4159]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffd470b528 a2=40 a3=ffffd470b558 items=0 ppid=4043 pid=4159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:09.360000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:50:09.361000 audit: BPF prog-id=158 op=UNLOAD May 17 00:50:09.361000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.361000 audit[4159]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffd470b640 a2=50 a3=0 items=0 ppid=4043 pid=4159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:09.361000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:50:09.370000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.370000 audit[4159]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd470b598 a2=28 a3=ffffd470b6c8 items=0 ppid=4043 pid=4159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:09.370000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:50:09.371000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.371000 audit[4159]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd470b5c8 a2=28 a3=ffffd470b6f8 items=0 ppid=4043 pid=4159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:09.371000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:50:09.371000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.371000 audit[4159]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd470b478 a2=28 a3=ffffd470b5a8 items=0 ppid=4043 pid=4159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:09.371000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:50:09.371000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.371000 audit[4159]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd470b5e8 a2=28 a3=ffffd470b718 items=0 ppid=4043 pid=4159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:09.371000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:50:09.371000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.371000 audit[4159]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd470b5c8 a2=28 a3=ffffd470b6f8 items=0 ppid=4043 pid=4159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:09.371000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:50:09.371000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.371000 audit[4159]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd470b5b8 a2=28 a3=ffffd470b6e8 items=0 ppid=4043 pid=4159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:09.371000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:50:09.372000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.372000 audit[4159]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd470b5e8 a2=28 a3=ffffd470b718 items=0 ppid=4043 pid=4159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:09.372000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:50:09.372000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.372000 audit[4159]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd470b5c8 a2=28 a3=ffffd470b6f8 items=0 ppid=4043 pid=4159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:09.372000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:50:09.372000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.372000 audit[4159]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd470b5e8 a2=28 a3=ffffd470b718 items=0 ppid=4043 pid=4159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:09.372000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:50:09.372000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.372000 audit[4159]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd470b5b8 a2=28 a3=ffffd470b6e8 items=0 ppid=4043 pid=4159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:09.372000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:50:09.372000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.372000 audit[4159]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd470b638 a2=28 a3=ffffd470b778 items=0 ppid=4043 pid=4159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:09.372000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:50:09.373000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.373000 audit[4159]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffd470b370 a2=50 a3=0 items=0 ppid=4043 pid=4159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:09.373000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:50:09.373000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.373000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.373000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.373000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.373000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.373000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.373000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.373000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.373000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.373000 audit: BPF prog-id=159 op=LOAD May 17 00:50:09.373000 audit[4159]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffd470b378 a2=94 a3=5 items=0 ppid=4043 pid=4159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:09.373000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:50:09.373000 audit: BPF prog-id=159 op=UNLOAD May 17 00:50:09.374000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.374000 audit[4159]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffd470b480 a2=50 a3=0 items=0 ppid=4043 pid=4159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:09.374000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:50:09.374000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.374000 audit[4159]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffd470b5c8 a2=4 a3=3 items=0 ppid=4043 pid=4159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:09.374000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:50:09.374000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.374000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.374000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.374000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.374000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.374000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.374000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.374000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.374000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.374000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.374000 audit[4159]: AVC avc: denied { confidentiality } for pid=4159 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:50:09.374000 audit[4159]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffd470b5a8 a2=94 a3=6 items=0 ppid=4043 pid=4159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:09.374000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:50:09.375000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.375000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.375000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.375000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.375000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.375000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.375000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.375000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.375000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.375000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.375000 audit[4159]: AVC avc: denied { confidentiality } for pid=4159 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:50:09.375000 audit[4159]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffd470ad78 a2=94 a3=83 items=0 ppid=4043 pid=4159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:09.375000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:50:09.375000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.375000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.375000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.375000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.375000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.375000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.375000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.375000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.375000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.375000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.375000 audit[4159]: AVC avc: denied { confidentiality } for pid=4159 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:50:09.375000 audit[4159]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffd470ad78 a2=94 a3=83 items=0 ppid=4043 pid=4159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:09.375000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:50:09.376000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.376000 audit[4159]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd470c7b8 a2=10 a3=ffffd470c8a8 items=0 ppid=4043 pid=4159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:09.376000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:50:09.377000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.377000 audit[4159]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd470c678 a2=10 a3=ffffd470c768 items=0 ppid=4043 pid=4159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:09.377000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:50:09.377000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.377000 audit[4159]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd470c5e8 a2=10 a3=ffffd470c768 items=0 ppid=4043 pid=4159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:09.377000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:50:09.377000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:09.377000 audit[4159]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd470c5e8 a2=10 a3=ffffd470c768 items=0 ppid=4043 pid=4159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:09.377000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:50:09.383000 audit: BPF prog-id=154 op=UNLOAD May 17 00:50:09.533000 audit[4187]: NETFILTER_CFG table=mangle:104 family=2 entries=16 op=nft_register_chain pid=4187 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:50:09.533000 audit[4187]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=ffffc2bf8000 a2=0 a3=ffffbf276fa8 items=0 ppid=4043 pid=4187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:09.533000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:50:09.577000 audit[4186]: NETFILTER_CFG table=nat:105 family=2 entries=15 op=nft_register_chain pid=4186 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:50:09.577000 audit[4186]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=fffffcd3f070 a2=0 a3=ffffaacccfa8 items=0 ppid=4043 pid=4186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:09.577000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:50:09.593769 kubelet[2537]: E0517 00:50:09.593722 2537 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-65bfcd6f48-fpglr" podUID="f2c35a1f-88d3-4b21-9134-27f4e6567489" May 17 00:50:09.629000 audit[4201]: NETFILTER_CFG table=filter:106 family=2 entries=20 op=nft_register_rule pid=4201 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:50:09.629000 audit[4201]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=7480 a0=3 a1=ffffcc2998d0 a2=0 a3=1 items=0 ppid=2686 pid=4201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:09.629000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:50:09.635000 audit[4201]: NETFILTER_CFG table=nat:107 family=2 entries=14 op=nft_register_rule pid=4201 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:50:09.635000 audit[4201]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3468 a0=3 a1=ffffcc2998d0 a2=0 a3=1 items=0 ppid=2686 pid=4201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:09.635000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:50:09.651000 audit[4189]: NETFILTER_CFG table=filter:108 family=2 entries=94 op=nft_register_chain pid=4189 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:50:09.651000 audit[4189]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=53116 a0=3 a1=fffff0b8ca90 a2=0 a3=ffff8cebafa8 items=0 ppid=4043 pid=4189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:09.651000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:50:09.692000 audit[4185]: NETFILTER_CFG table=raw:109 family=2 entries=21 op=nft_register_chain pid=4185 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:50:09.692000 audit[4185]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8452 a0=3 a1=ffffff441a30 a2=0 a3=ffff9c1aefa8 items=0 ppid=4043 pid=4185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:09.692000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:50:09.694441 systemd-networkd[1635]: cali045c21a7a32: Gained IPv6LL May 17 00:50:10.909411 systemd-networkd[1635]: vxlan.calico: Gained IPv6LL May 17 00:50:13.143816 env[1480]: time="2025-05-17T00:50:13.143766940Z" level=info msg="StopPodSandbox for \"04ae499c81553f3b0dff696a50f0d2cf978d190d027573199774552478710ce6\"" May 17 00:50:13.457917 env[1480]: time="2025-05-17T00:50:13.144691958Z" level=info msg="StopPodSandbox for \"40f13856fce73837b8380c544d31c04049bd84a3ceeb000c4fce95e608012a25\"" May 17 00:50:13.512548 env[1480]: 2025-05-17 00:50:13.234 [INFO][4224] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="04ae499c81553f3b0dff696a50f0d2cf978d190d027573199774552478710ce6" May 17 00:50:13.512548 env[1480]: 2025-05-17 00:50:13.458 [INFO][4224] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="04ae499c81553f3b0dff696a50f0d2cf978d190d027573199774552478710ce6" iface="eth0" netns="/var/run/netns/cni-498df743-a504-c4e6-c596-2fbf600e22ca" May 17 00:50:13.512548 env[1480]: 2025-05-17 00:50:13.459 [INFO][4224] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="04ae499c81553f3b0dff696a50f0d2cf978d190d027573199774552478710ce6" iface="eth0" netns="/var/run/netns/cni-498df743-a504-c4e6-c596-2fbf600e22ca" May 17 00:50:13.512548 env[1480]: 2025-05-17 00:50:13.460 [INFO][4224] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="04ae499c81553f3b0dff696a50f0d2cf978d190d027573199774552478710ce6" iface="eth0" netns="/var/run/netns/cni-498df743-a504-c4e6-c596-2fbf600e22ca" May 17 00:50:13.512548 env[1480]: 2025-05-17 00:50:13.460 [INFO][4224] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="04ae499c81553f3b0dff696a50f0d2cf978d190d027573199774552478710ce6" May 17 00:50:13.512548 env[1480]: 2025-05-17 00:50:13.460 [INFO][4224] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="04ae499c81553f3b0dff696a50f0d2cf978d190d027573199774552478710ce6" May 17 00:50:13.512548 env[1480]: 2025-05-17 00:50:13.496 [INFO][4237] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="04ae499c81553f3b0dff696a50f0d2cf978d190d027573199774552478710ce6" HandleID="k8s-pod-network.04ae499c81553f3b0dff696a50f0d2cf978d190d027573199774552478710ce6" Workload="ci--3510.3.7--n--4234abe502-k8s-coredns--674b8bbfcf--cxrsr-eth0" May 17 00:50:13.512548 env[1480]: 2025-05-17 00:50:13.496 [INFO][4237] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:50:13.512548 env[1480]: 2025-05-17 00:50:13.497 [INFO][4237] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:50:13.512548 env[1480]: 2025-05-17 00:50:13.506 [WARNING][4237] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="04ae499c81553f3b0dff696a50f0d2cf978d190d027573199774552478710ce6" HandleID="k8s-pod-network.04ae499c81553f3b0dff696a50f0d2cf978d190d027573199774552478710ce6" Workload="ci--3510.3.7--n--4234abe502-k8s-coredns--674b8bbfcf--cxrsr-eth0" May 17 00:50:13.512548 env[1480]: 2025-05-17 00:50:13.506 [INFO][4237] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="04ae499c81553f3b0dff696a50f0d2cf978d190d027573199774552478710ce6" HandleID="k8s-pod-network.04ae499c81553f3b0dff696a50f0d2cf978d190d027573199774552478710ce6" Workload="ci--3510.3.7--n--4234abe502-k8s-coredns--674b8bbfcf--cxrsr-eth0" May 17 00:50:13.512548 env[1480]: 2025-05-17 00:50:13.507 [INFO][4237] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:50:13.512548 env[1480]: 2025-05-17 00:50:13.510 [INFO][4224] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="04ae499c81553f3b0dff696a50f0d2cf978d190d027573199774552478710ce6" May 17 00:50:13.515500 systemd[1]: run-netns-cni\x2d498df743\x2da504\x2dc4e6\x2dc596\x2d2fbf600e22ca.mount: Deactivated successfully. May 17 00:50:13.517142 env[1480]: time="2025-05-17T00:50:13.517091474Z" level=info msg="TearDown network for sandbox \"04ae499c81553f3b0dff696a50f0d2cf978d190d027573199774552478710ce6\" successfully" May 17 00:50:13.517291 env[1480]: time="2025-05-17T00:50:13.517272638Z" level=info msg="StopPodSandbox for \"04ae499c81553f3b0dff696a50f0d2cf978d190d027573199774552478710ce6\" returns successfully" May 17 00:50:13.518542 env[1480]: time="2025-05-17T00:50:13.518502461Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-cxrsr,Uid:c807ebf0-49df-4644-b8ed-52a104f87f64,Namespace:kube-system,Attempt:1,}" May 17 00:50:13.538684 env[1480]: 2025-05-17 00:50:13.493 [INFO][4225] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="40f13856fce73837b8380c544d31c04049bd84a3ceeb000c4fce95e608012a25" May 17 00:50:13.538684 env[1480]: 2025-05-17 00:50:13.493 [INFO][4225] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="40f13856fce73837b8380c544d31c04049bd84a3ceeb000c4fce95e608012a25" iface="eth0" netns="/var/run/netns/cni-fbd6c5a8-1d01-9657-4052-927312fe97b7" May 17 00:50:13.538684 env[1480]: 2025-05-17 00:50:13.494 [INFO][4225] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="40f13856fce73837b8380c544d31c04049bd84a3ceeb000c4fce95e608012a25" iface="eth0" netns="/var/run/netns/cni-fbd6c5a8-1d01-9657-4052-927312fe97b7" May 17 00:50:13.538684 env[1480]: 2025-05-17 00:50:13.494 [INFO][4225] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="40f13856fce73837b8380c544d31c04049bd84a3ceeb000c4fce95e608012a25" iface="eth0" netns="/var/run/netns/cni-fbd6c5a8-1d01-9657-4052-927312fe97b7" May 17 00:50:13.538684 env[1480]: 2025-05-17 00:50:13.494 [INFO][4225] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="40f13856fce73837b8380c544d31c04049bd84a3ceeb000c4fce95e608012a25" May 17 00:50:13.538684 env[1480]: 2025-05-17 00:50:13.494 [INFO][4225] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="40f13856fce73837b8380c544d31c04049bd84a3ceeb000c4fce95e608012a25" May 17 00:50:13.538684 env[1480]: 2025-05-17 00:50:13.524 [INFO][4244] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="40f13856fce73837b8380c544d31c04049bd84a3ceeb000c4fce95e608012a25" HandleID="k8s-pod-network.40f13856fce73837b8380c544d31c04049bd84a3ceeb000c4fce95e608012a25" Workload="ci--3510.3.7--n--4234abe502-k8s-csi--node--driver--52bcs-eth0" May 17 00:50:13.538684 env[1480]: 2025-05-17 00:50:13.524 [INFO][4244] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:50:13.538684 env[1480]: 2025-05-17 00:50:13.524 [INFO][4244] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:50:13.538684 env[1480]: 2025-05-17 00:50:13.533 [WARNING][4244] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="40f13856fce73837b8380c544d31c04049bd84a3ceeb000c4fce95e608012a25" HandleID="k8s-pod-network.40f13856fce73837b8380c544d31c04049bd84a3ceeb000c4fce95e608012a25" Workload="ci--3510.3.7--n--4234abe502-k8s-csi--node--driver--52bcs-eth0" May 17 00:50:13.538684 env[1480]: 2025-05-17 00:50:13.533 [INFO][4244] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="40f13856fce73837b8380c544d31c04049bd84a3ceeb000c4fce95e608012a25" HandleID="k8s-pod-network.40f13856fce73837b8380c544d31c04049bd84a3ceeb000c4fce95e608012a25" Workload="ci--3510.3.7--n--4234abe502-k8s-csi--node--driver--52bcs-eth0" May 17 00:50:13.538684 env[1480]: 2025-05-17 00:50:13.535 [INFO][4244] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:50:13.538684 env[1480]: 2025-05-17 00:50:13.537 [INFO][4225] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="40f13856fce73837b8380c544d31c04049bd84a3ceeb000c4fce95e608012a25" May 17 00:50:13.541619 systemd[1]: run-netns-cni\x2dfbd6c5a8\x2d1d01\x2d9657\x2d4052\x2d927312fe97b7.mount: Deactivated successfully. May 17 00:50:13.543084 env[1480]: time="2025-05-17T00:50:13.543037816Z" level=info msg="TearDown network for sandbox \"40f13856fce73837b8380c544d31c04049bd84a3ceeb000c4fce95e608012a25\" successfully" May 17 00:50:13.543179 env[1480]: time="2025-05-17T00:50:13.543162778Z" level=info msg="StopPodSandbox for \"40f13856fce73837b8380c544d31c04049bd84a3ceeb000c4fce95e608012a25\" returns successfully" May 17 00:50:13.546242 env[1480]: time="2025-05-17T00:50:13.546191637Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-52bcs,Uid:463fd6d8-2e06-42b8-ade3-8bda47d821b9,Namespace:calico-system,Attempt:1,}" May 17 00:50:14.142891 env[1480]: time="2025-05-17T00:50:14.142843103Z" level=info msg="StopPodSandbox for \"962fa1fd3460a11a02ddcad1b3937654dc37673876dbde36685c6acbc4d58e93\"" May 17 00:50:14.143258 env[1480]: time="2025-05-17T00:50:14.143213310Z" level=info msg="StopPodSandbox for \"2bf27c97334f783392bef269595031dbf8ae790b9dbf3dac41943a7c9af70091\"" May 17 00:50:14.259097 env[1480]: 2025-05-17 00:50:14.200 [INFO][4271] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="2bf27c97334f783392bef269595031dbf8ae790b9dbf3dac41943a7c9af70091" May 17 00:50:14.259097 env[1480]: 2025-05-17 00:50:14.200 [INFO][4271] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="2bf27c97334f783392bef269595031dbf8ae790b9dbf3dac41943a7c9af70091" iface="eth0" netns="/var/run/netns/cni-677fe010-a81a-505c-b91d-5c21b2eb09ae" May 17 00:50:14.259097 env[1480]: 2025-05-17 00:50:14.200 [INFO][4271] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="2bf27c97334f783392bef269595031dbf8ae790b9dbf3dac41943a7c9af70091" iface="eth0" netns="/var/run/netns/cni-677fe010-a81a-505c-b91d-5c21b2eb09ae" May 17 00:50:14.259097 env[1480]: 2025-05-17 00:50:14.202 [INFO][4271] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="2bf27c97334f783392bef269595031dbf8ae790b9dbf3dac41943a7c9af70091" iface="eth0" netns="/var/run/netns/cni-677fe010-a81a-505c-b91d-5c21b2eb09ae" May 17 00:50:14.259097 env[1480]: 2025-05-17 00:50:14.202 [INFO][4271] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="2bf27c97334f783392bef269595031dbf8ae790b9dbf3dac41943a7c9af70091" May 17 00:50:14.259097 env[1480]: 2025-05-17 00:50:14.202 [INFO][4271] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2bf27c97334f783392bef269595031dbf8ae790b9dbf3dac41943a7c9af70091" May 17 00:50:14.259097 env[1480]: 2025-05-17 00:50:14.237 [INFO][4283] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2bf27c97334f783392bef269595031dbf8ae790b9dbf3dac41943a7c9af70091" HandleID="k8s-pod-network.2bf27c97334f783392bef269595031dbf8ae790b9dbf3dac41943a7c9af70091" Workload="ci--3510.3.7--n--4234abe502-k8s-calico--kube--controllers--647fb858cc--jtf2c-eth0" May 17 00:50:14.259097 env[1480]: 2025-05-17 00:50:14.237 [INFO][4283] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:50:14.259097 env[1480]: 2025-05-17 00:50:14.238 [INFO][4283] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:50:14.259097 env[1480]: 2025-05-17 00:50:14.254 [WARNING][4283] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2bf27c97334f783392bef269595031dbf8ae790b9dbf3dac41943a7c9af70091" HandleID="k8s-pod-network.2bf27c97334f783392bef269595031dbf8ae790b9dbf3dac41943a7c9af70091" Workload="ci--3510.3.7--n--4234abe502-k8s-calico--kube--controllers--647fb858cc--jtf2c-eth0" May 17 00:50:14.259097 env[1480]: 2025-05-17 00:50:14.254 [INFO][4283] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2bf27c97334f783392bef269595031dbf8ae790b9dbf3dac41943a7c9af70091" HandleID="k8s-pod-network.2bf27c97334f783392bef269595031dbf8ae790b9dbf3dac41943a7c9af70091" Workload="ci--3510.3.7--n--4234abe502-k8s-calico--kube--controllers--647fb858cc--jtf2c-eth0" May 17 00:50:14.259097 env[1480]: 2025-05-17 00:50:14.256 [INFO][4283] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:50:14.259097 env[1480]: 2025-05-17 00:50:14.257 [INFO][4271] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="2bf27c97334f783392bef269595031dbf8ae790b9dbf3dac41943a7c9af70091" May 17 00:50:14.262390 env[1480]: time="2025-05-17T00:50:14.262339274Z" level=info msg="TearDown network for sandbox \"2bf27c97334f783392bef269595031dbf8ae790b9dbf3dac41943a7c9af70091\" successfully" May 17 00:50:14.262556 env[1480]: time="2025-05-17T00:50:14.262538277Z" level=info msg="StopPodSandbox for \"2bf27c97334f783392bef269595031dbf8ae790b9dbf3dac41943a7c9af70091\" returns successfully" May 17 00:50:14.264394 systemd[1]: run-netns-cni\x2d677fe010\x2da81a\x2d505c\x2db91d\x2d5c21b2eb09ae.mount: Deactivated successfully. May 17 00:50:14.265894 env[1480]: time="2025-05-17T00:50:14.265851541Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-647fb858cc-jtf2c,Uid:cfe725ea-fbe7-42b1-b5de-fc1e1a86ac51,Namespace:calico-system,Attempt:1,}" May 17 00:50:14.292388 env[1480]: 2025-05-17 00:50:14.229 [INFO][4270] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="962fa1fd3460a11a02ddcad1b3937654dc37673876dbde36685c6acbc4d58e93" May 17 00:50:14.292388 env[1480]: 2025-05-17 00:50:14.229 [INFO][4270] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="962fa1fd3460a11a02ddcad1b3937654dc37673876dbde36685c6acbc4d58e93" iface="eth0" netns="/var/run/netns/cni-ce72812f-0574-a71d-1c70-43ae6e26ca19" May 17 00:50:14.292388 env[1480]: 2025-05-17 00:50:14.229 [INFO][4270] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="962fa1fd3460a11a02ddcad1b3937654dc37673876dbde36685c6acbc4d58e93" iface="eth0" netns="/var/run/netns/cni-ce72812f-0574-a71d-1c70-43ae6e26ca19" May 17 00:50:14.292388 env[1480]: 2025-05-17 00:50:14.230 [INFO][4270] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="962fa1fd3460a11a02ddcad1b3937654dc37673876dbde36685c6acbc4d58e93" iface="eth0" netns="/var/run/netns/cni-ce72812f-0574-a71d-1c70-43ae6e26ca19" May 17 00:50:14.292388 env[1480]: 2025-05-17 00:50:14.230 [INFO][4270] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="962fa1fd3460a11a02ddcad1b3937654dc37673876dbde36685c6acbc4d58e93" May 17 00:50:14.292388 env[1480]: 2025-05-17 00:50:14.230 [INFO][4270] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="962fa1fd3460a11a02ddcad1b3937654dc37673876dbde36685c6acbc4d58e93" May 17 00:50:14.292388 env[1480]: 2025-05-17 00:50:14.273 [INFO][4288] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="962fa1fd3460a11a02ddcad1b3937654dc37673876dbde36685c6acbc4d58e93" HandleID="k8s-pod-network.962fa1fd3460a11a02ddcad1b3937654dc37673876dbde36685c6acbc4d58e93" Workload="ci--3510.3.7--n--4234abe502-k8s-goldmane--78d55f7ddc--pmkbg-eth0" May 17 00:50:14.292388 env[1480]: 2025-05-17 00:50:14.273 [INFO][4288] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:50:14.292388 env[1480]: 2025-05-17 00:50:14.273 [INFO][4288] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:50:14.292388 env[1480]: 2025-05-17 00:50:14.286 [WARNING][4288] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="962fa1fd3460a11a02ddcad1b3937654dc37673876dbde36685c6acbc4d58e93" HandleID="k8s-pod-network.962fa1fd3460a11a02ddcad1b3937654dc37673876dbde36685c6acbc4d58e93" Workload="ci--3510.3.7--n--4234abe502-k8s-goldmane--78d55f7ddc--pmkbg-eth0" May 17 00:50:14.292388 env[1480]: 2025-05-17 00:50:14.286 [INFO][4288] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="962fa1fd3460a11a02ddcad1b3937654dc37673876dbde36685c6acbc4d58e93" HandleID="k8s-pod-network.962fa1fd3460a11a02ddcad1b3937654dc37673876dbde36685c6acbc4d58e93" Workload="ci--3510.3.7--n--4234abe502-k8s-goldmane--78d55f7ddc--pmkbg-eth0" May 17 00:50:14.292388 env[1480]: 2025-05-17 00:50:14.288 [INFO][4288] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:50:14.292388 env[1480]: 2025-05-17 00:50:14.290 [INFO][4270] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="962fa1fd3460a11a02ddcad1b3937654dc37673876dbde36685c6acbc4d58e93" May 17 00:50:14.294800 systemd[1]: run-netns-cni\x2dce72812f\x2d0574\x2da71d\x2d1c70\x2d43ae6e26ca19.mount: Deactivated successfully. May 17 00:50:14.296032 env[1480]: time="2025-05-17T00:50:14.295984918Z" level=info msg="TearDown network for sandbox \"962fa1fd3460a11a02ddcad1b3937654dc37673876dbde36685c6acbc4d58e93\" successfully" May 17 00:50:14.296032 env[1480]: time="2025-05-17T00:50:14.296028519Z" level=info msg="StopPodSandbox for \"962fa1fd3460a11a02ddcad1b3937654dc37673876dbde36685c6acbc4d58e93\" returns successfully" May 17 00:50:14.297099 env[1480]: time="2025-05-17T00:50:14.297070419Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-78d55f7ddc-pmkbg,Uid:85f144ac-4d39-496d-b3d5-66149a1574d7,Namespace:calico-system,Attempt:1,}" May 17 00:50:16.143614 env[1480]: time="2025-05-17T00:50:16.143566130Z" level=info msg="StopPodSandbox for \"d73a88f26a68cb38ad153b5fa3ee8edcb210df1776ea641e21a02841b7ef2432\"" May 17 00:50:16.145442 env[1480]: time="2025-05-17T00:50:16.145410605Z" level=info msg="StopPodSandbox for \"9563538b262083fde51e5f00fccc80cec92003d148de9cd91d24b213d43ef190\"" May 17 00:50:16.262635 env[1480]: 2025-05-17 00:50:16.198 [INFO][4326] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="9563538b262083fde51e5f00fccc80cec92003d148de9cd91d24b213d43ef190" May 17 00:50:16.262635 env[1480]: 2025-05-17 00:50:16.198 [INFO][4326] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="9563538b262083fde51e5f00fccc80cec92003d148de9cd91d24b213d43ef190" iface="eth0" netns="/var/run/netns/cni-b99f94c4-2bf8-f70e-aeea-d0d8a2c6e590" May 17 00:50:16.262635 env[1480]: 2025-05-17 00:50:16.198 [INFO][4326] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="9563538b262083fde51e5f00fccc80cec92003d148de9cd91d24b213d43ef190" iface="eth0" netns="/var/run/netns/cni-b99f94c4-2bf8-f70e-aeea-d0d8a2c6e590" May 17 00:50:16.262635 env[1480]: 2025-05-17 00:50:16.199 [INFO][4326] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="9563538b262083fde51e5f00fccc80cec92003d148de9cd91d24b213d43ef190" iface="eth0" netns="/var/run/netns/cni-b99f94c4-2bf8-f70e-aeea-d0d8a2c6e590" May 17 00:50:16.262635 env[1480]: 2025-05-17 00:50:16.199 [INFO][4326] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="9563538b262083fde51e5f00fccc80cec92003d148de9cd91d24b213d43ef190" May 17 00:50:16.262635 env[1480]: 2025-05-17 00:50:16.199 [INFO][4326] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9563538b262083fde51e5f00fccc80cec92003d148de9cd91d24b213d43ef190" May 17 00:50:16.262635 env[1480]: 2025-05-17 00:50:16.244 [INFO][4340] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9563538b262083fde51e5f00fccc80cec92003d148de9cd91d24b213d43ef190" HandleID="k8s-pod-network.9563538b262083fde51e5f00fccc80cec92003d148de9cd91d24b213d43ef190" Workload="ci--3510.3.7--n--4234abe502-k8s-calico--apiserver--84c64ddb56--5dt2v-eth0" May 17 00:50:16.262635 env[1480]: 2025-05-17 00:50:16.245 [INFO][4340] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:50:16.262635 env[1480]: 2025-05-17 00:50:16.245 [INFO][4340] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:50:16.262635 env[1480]: 2025-05-17 00:50:16.254 [WARNING][4340] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9563538b262083fde51e5f00fccc80cec92003d148de9cd91d24b213d43ef190" HandleID="k8s-pod-network.9563538b262083fde51e5f00fccc80cec92003d148de9cd91d24b213d43ef190" Workload="ci--3510.3.7--n--4234abe502-k8s-calico--apiserver--84c64ddb56--5dt2v-eth0" May 17 00:50:16.262635 env[1480]: 2025-05-17 00:50:16.254 [INFO][4340] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9563538b262083fde51e5f00fccc80cec92003d148de9cd91d24b213d43ef190" HandleID="k8s-pod-network.9563538b262083fde51e5f00fccc80cec92003d148de9cd91d24b213d43ef190" Workload="ci--3510.3.7--n--4234abe502-k8s-calico--apiserver--84c64ddb56--5dt2v-eth0" May 17 00:50:16.262635 env[1480]: 2025-05-17 00:50:16.256 [INFO][4340] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:50:16.262635 env[1480]: 2025-05-17 00:50:16.261 [INFO][4326] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="9563538b262083fde51e5f00fccc80cec92003d148de9cd91d24b213d43ef190" May 17 00:50:16.264935 systemd[1]: run-netns-cni\x2db99f94c4\x2d2bf8\x2df70e\x2daeea\x2dd0d8a2c6e590.mount: Deactivated successfully. May 17 00:50:16.268671 env[1480]: time="2025-05-17T00:50:16.266331606Z" level=info msg="TearDown network for sandbox \"9563538b262083fde51e5f00fccc80cec92003d148de9cd91d24b213d43ef190\" successfully" May 17 00:50:16.268671 env[1480]: time="2025-05-17T00:50:16.266380167Z" level=info msg="StopPodSandbox for \"9563538b262083fde51e5f00fccc80cec92003d148de9cd91d24b213d43ef190\" returns successfully" May 17 00:50:16.269548 env[1480]: time="2025-05-17T00:50:16.269497545Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-84c64ddb56-5dt2v,Uid:da20061a-c164-4dad-aec7-b54414ff9706,Namespace:calico-apiserver,Attempt:1,}" May 17 00:50:16.280908 env[1480]: 2025-05-17 00:50:16.217 [INFO][4327] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="d73a88f26a68cb38ad153b5fa3ee8edcb210df1776ea641e21a02841b7ef2432" May 17 00:50:16.280908 env[1480]: 2025-05-17 00:50:16.218 [INFO][4327] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="d73a88f26a68cb38ad153b5fa3ee8edcb210df1776ea641e21a02841b7ef2432" iface="eth0" netns="/var/run/netns/cni-db65c0a2-30e9-d67e-110e-257ed0b1729e" May 17 00:50:16.280908 env[1480]: 2025-05-17 00:50:16.218 [INFO][4327] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="d73a88f26a68cb38ad153b5fa3ee8edcb210df1776ea641e21a02841b7ef2432" iface="eth0" netns="/var/run/netns/cni-db65c0a2-30e9-d67e-110e-257ed0b1729e" May 17 00:50:16.280908 env[1480]: 2025-05-17 00:50:16.218 [INFO][4327] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="d73a88f26a68cb38ad153b5fa3ee8edcb210df1776ea641e21a02841b7ef2432" iface="eth0" netns="/var/run/netns/cni-db65c0a2-30e9-d67e-110e-257ed0b1729e" May 17 00:50:16.280908 env[1480]: 2025-05-17 00:50:16.218 [INFO][4327] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="d73a88f26a68cb38ad153b5fa3ee8edcb210df1776ea641e21a02841b7ef2432" May 17 00:50:16.280908 env[1480]: 2025-05-17 00:50:16.218 [INFO][4327] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d73a88f26a68cb38ad153b5fa3ee8edcb210df1776ea641e21a02841b7ef2432" May 17 00:50:16.280908 env[1480]: 2025-05-17 00:50:16.244 [INFO][4345] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d73a88f26a68cb38ad153b5fa3ee8edcb210df1776ea641e21a02841b7ef2432" HandleID="k8s-pod-network.d73a88f26a68cb38ad153b5fa3ee8edcb210df1776ea641e21a02841b7ef2432" Workload="ci--3510.3.7--n--4234abe502-k8s-coredns--674b8bbfcf--j679t-eth0" May 17 00:50:16.280908 env[1480]: 2025-05-17 00:50:16.245 [INFO][4345] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:50:16.280908 env[1480]: 2025-05-17 00:50:16.256 [INFO][4345] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:50:16.280908 env[1480]: 2025-05-17 00:50:16.273 [WARNING][4345] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d73a88f26a68cb38ad153b5fa3ee8edcb210df1776ea641e21a02841b7ef2432" HandleID="k8s-pod-network.d73a88f26a68cb38ad153b5fa3ee8edcb210df1776ea641e21a02841b7ef2432" Workload="ci--3510.3.7--n--4234abe502-k8s-coredns--674b8bbfcf--j679t-eth0" May 17 00:50:16.280908 env[1480]: 2025-05-17 00:50:16.273 [INFO][4345] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d73a88f26a68cb38ad153b5fa3ee8edcb210df1776ea641e21a02841b7ef2432" HandleID="k8s-pod-network.d73a88f26a68cb38ad153b5fa3ee8edcb210df1776ea641e21a02841b7ef2432" Workload="ci--3510.3.7--n--4234abe502-k8s-coredns--674b8bbfcf--j679t-eth0" May 17 00:50:16.280908 env[1480]: 2025-05-17 00:50:16.276 [INFO][4345] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:50:16.280908 env[1480]: 2025-05-17 00:50:16.279 [INFO][4327] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="d73a88f26a68cb38ad153b5fa3ee8edcb210df1776ea641e21a02841b7ef2432" May 17 00:50:16.283323 systemd[1]: run-netns-cni\x2ddb65c0a2\x2d30e9\x2dd67e\x2d110e\x2d257ed0b1729e.mount: Deactivated successfully. May 17 00:50:16.285493 env[1480]: time="2025-05-17T00:50:16.284788034Z" level=info msg="TearDown network for sandbox \"d73a88f26a68cb38ad153b5fa3ee8edcb210df1776ea641e21a02841b7ef2432\" successfully" May 17 00:50:16.285493 env[1480]: time="2025-05-17T00:50:16.284843275Z" level=info msg="StopPodSandbox for \"d73a88f26a68cb38ad153b5fa3ee8edcb210df1776ea641e21a02841b7ef2432\" returns successfully" May 17 00:50:16.289640 env[1480]: time="2025-05-17T00:50:16.289596165Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-j679t,Uid:91388974-d4b7-418c-97fd-7623f7fc5ad5,Namespace:kube-system,Attempt:1,}" May 17 00:50:18.732047 systemd-networkd[1635]: cali911774a374b: Link UP May 17 00:50:18.747904 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:50:18.748035 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali911774a374b: link becomes ready May 17 00:50:18.749547 systemd-networkd[1635]: cali911774a374b: Gained carrier May 17 00:50:18.765199 env[1480]: 2025-05-17 00:50:18.647 [INFO][4354] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--4234abe502-k8s-csi--node--driver--52bcs-eth0 csi-node-driver- calico-system 463fd6d8-2e06-42b8-ade3-8bda47d821b9 1027 0 2025-05-17 00:49:23 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:78f6f74485 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s ci-3510.3.7-n-4234abe502 csi-node-driver-52bcs eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali911774a374b [] [] }} ContainerID="ef88f37ad20b41a637085c66407ec0e39064d84fb7beea9b8226d24161d3c910" Namespace="calico-system" Pod="csi-node-driver-52bcs" WorkloadEndpoint="ci--3510.3.7--n--4234abe502-k8s-csi--node--driver--52bcs-" May 17 00:50:18.765199 env[1480]: 2025-05-17 00:50:18.647 [INFO][4354] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="ef88f37ad20b41a637085c66407ec0e39064d84fb7beea9b8226d24161d3c910" Namespace="calico-system" Pod="csi-node-driver-52bcs" WorkloadEndpoint="ci--3510.3.7--n--4234abe502-k8s-csi--node--driver--52bcs-eth0" May 17 00:50:18.765199 env[1480]: 2025-05-17 00:50:18.671 [INFO][4368] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ef88f37ad20b41a637085c66407ec0e39064d84fb7beea9b8226d24161d3c910" HandleID="k8s-pod-network.ef88f37ad20b41a637085c66407ec0e39064d84fb7beea9b8226d24161d3c910" Workload="ci--3510.3.7--n--4234abe502-k8s-csi--node--driver--52bcs-eth0" May 17 00:50:18.765199 env[1480]: 2025-05-17 00:50:18.671 [INFO][4368] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="ef88f37ad20b41a637085c66407ec0e39064d84fb7beea9b8226d24161d3c910" HandleID="k8s-pod-network.ef88f37ad20b41a637085c66407ec0e39064d84fb7beea9b8226d24161d3c910" Workload="ci--3510.3.7--n--4234abe502-k8s-csi--node--driver--52bcs-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002d7020), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.7-n-4234abe502", "pod":"csi-node-driver-52bcs", "timestamp":"2025-05-17 00:50:18.671368316 +0000 UTC"}, Hostname:"ci-3510.3.7-n-4234abe502", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:50:18.765199 env[1480]: 2025-05-17 00:50:18.671 [INFO][4368] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:50:18.765199 env[1480]: 2025-05-17 00:50:18.671 [INFO][4368] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:50:18.765199 env[1480]: 2025-05-17 00:50:18.672 [INFO][4368] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-4234abe502' May 17 00:50:18.765199 env[1480]: 2025-05-17 00:50:18.681 [INFO][4368] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.ef88f37ad20b41a637085c66407ec0e39064d84fb7beea9b8226d24161d3c910" host="ci-3510.3.7-n-4234abe502" May 17 00:50:18.765199 env[1480]: 2025-05-17 00:50:18.696 [INFO][4368] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.7-n-4234abe502" May 17 00:50:18.765199 env[1480]: 2025-05-17 00:50:18.701 [INFO][4368] ipam/ipam.go 511: Trying affinity for 192.168.86.192/26 host="ci-3510.3.7-n-4234abe502" May 17 00:50:18.765199 env[1480]: 2025-05-17 00:50:18.703 [INFO][4368] ipam/ipam.go 158: Attempting to load block cidr=192.168.86.192/26 host="ci-3510.3.7-n-4234abe502" May 17 00:50:18.765199 env[1480]: 2025-05-17 00:50:18.705 [INFO][4368] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.86.192/26 host="ci-3510.3.7-n-4234abe502" May 17 00:50:18.765199 env[1480]: 2025-05-17 00:50:18.705 [INFO][4368] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.86.192/26 handle="k8s-pod-network.ef88f37ad20b41a637085c66407ec0e39064d84fb7beea9b8226d24161d3c910" host="ci-3510.3.7-n-4234abe502" May 17 00:50:18.765199 env[1480]: 2025-05-17 00:50:18.707 [INFO][4368] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.ef88f37ad20b41a637085c66407ec0e39064d84fb7beea9b8226d24161d3c910 May 17 00:50:18.765199 env[1480]: 2025-05-17 00:50:18.712 [INFO][4368] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.86.192/26 handle="k8s-pod-network.ef88f37ad20b41a637085c66407ec0e39064d84fb7beea9b8226d24161d3c910" host="ci-3510.3.7-n-4234abe502" May 17 00:50:18.765199 env[1480]: 2025-05-17 00:50:18.722 [INFO][4368] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.86.194/26] block=192.168.86.192/26 handle="k8s-pod-network.ef88f37ad20b41a637085c66407ec0e39064d84fb7beea9b8226d24161d3c910" host="ci-3510.3.7-n-4234abe502" May 17 00:50:18.765199 env[1480]: 2025-05-17 00:50:18.722 [INFO][4368] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.86.194/26] handle="k8s-pod-network.ef88f37ad20b41a637085c66407ec0e39064d84fb7beea9b8226d24161d3c910" host="ci-3510.3.7-n-4234abe502" May 17 00:50:18.765199 env[1480]: 2025-05-17 00:50:18.722 [INFO][4368] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:50:18.765199 env[1480]: 2025-05-17 00:50:18.722 [INFO][4368] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.86.194/26] IPv6=[] ContainerID="ef88f37ad20b41a637085c66407ec0e39064d84fb7beea9b8226d24161d3c910" HandleID="k8s-pod-network.ef88f37ad20b41a637085c66407ec0e39064d84fb7beea9b8226d24161d3c910" Workload="ci--3510.3.7--n--4234abe502-k8s-csi--node--driver--52bcs-eth0" May 17 00:50:18.765959 env[1480]: 2025-05-17 00:50:18.724 [INFO][4354] cni-plugin/k8s.go 418: Populated endpoint ContainerID="ef88f37ad20b41a637085c66407ec0e39064d84fb7beea9b8226d24161d3c910" Namespace="calico-system" Pod="csi-node-driver-52bcs" WorkloadEndpoint="ci--3510.3.7--n--4234abe502-k8s-csi--node--driver--52bcs-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--4234abe502-k8s-csi--node--driver--52bcs-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"463fd6d8-2e06-42b8-ade3-8bda47d821b9", ResourceVersion:"1027", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 49, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-4234abe502", ContainerID:"", Pod:"csi-node-driver-52bcs", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.86.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali911774a374b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:50:18.765959 env[1480]: 2025-05-17 00:50:18.724 [INFO][4354] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.86.194/32] ContainerID="ef88f37ad20b41a637085c66407ec0e39064d84fb7beea9b8226d24161d3c910" Namespace="calico-system" Pod="csi-node-driver-52bcs" WorkloadEndpoint="ci--3510.3.7--n--4234abe502-k8s-csi--node--driver--52bcs-eth0" May 17 00:50:18.765959 env[1480]: 2025-05-17 00:50:18.724 [INFO][4354] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali911774a374b ContainerID="ef88f37ad20b41a637085c66407ec0e39064d84fb7beea9b8226d24161d3c910" Namespace="calico-system" Pod="csi-node-driver-52bcs" WorkloadEndpoint="ci--3510.3.7--n--4234abe502-k8s-csi--node--driver--52bcs-eth0" May 17 00:50:18.765959 env[1480]: 2025-05-17 00:50:18.749 [INFO][4354] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="ef88f37ad20b41a637085c66407ec0e39064d84fb7beea9b8226d24161d3c910" Namespace="calico-system" Pod="csi-node-driver-52bcs" WorkloadEndpoint="ci--3510.3.7--n--4234abe502-k8s-csi--node--driver--52bcs-eth0" May 17 00:50:18.765959 env[1480]: 2025-05-17 00:50:18.749 [INFO][4354] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="ef88f37ad20b41a637085c66407ec0e39064d84fb7beea9b8226d24161d3c910" Namespace="calico-system" Pod="csi-node-driver-52bcs" WorkloadEndpoint="ci--3510.3.7--n--4234abe502-k8s-csi--node--driver--52bcs-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--4234abe502-k8s-csi--node--driver--52bcs-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"463fd6d8-2e06-42b8-ade3-8bda47d821b9", ResourceVersion:"1027", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 49, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-4234abe502", ContainerID:"ef88f37ad20b41a637085c66407ec0e39064d84fb7beea9b8226d24161d3c910", Pod:"csi-node-driver-52bcs", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.86.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali911774a374b", MAC:"1e:14:5d:cc:4a:e9", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:50:18.765959 env[1480]: 2025-05-17 00:50:18.763 [INFO][4354] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="ef88f37ad20b41a637085c66407ec0e39064d84fb7beea9b8226d24161d3c910" Namespace="calico-system" Pod="csi-node-driver-52bcs" WorkloadEndpoint="ci--3510.3.7--n--4234abe502-k8s-csi--node--driver--52bcs-eth0" May 17 00:50:18.793272 kernel: kauditd_printk_skb: 568 callbacks suppressed May 17 00:50:18.793425 kernel: audit: type=1325 audit(1747443018.779:1068): table=filter:110 family=2 entries=36 op=nft_register_chain pid=4384 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:50:18.779000 audit[4384]: NETFILTER_CFG table=filter:110 family=2 entries=36 op=nft_register_chain pid=4384 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:50:18.779000 audit[4384]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19576 a0=3 a1=ffffcd947940 a2=0 a3=ffff943affa8 items=0 ppid=4043 pid=4384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:18.830361 kernel: audit: type=1300 audit(1747443018.779:1068): arch=c00000b7 syscall=211 success=yes exit=19576 a0=3 a1=ffffcd947940 a2=0 a3=ffff943affa8 items=0 ppid=4043 pid=4384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:18.779000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:50:18.848416 kernel: audit: type=1327 audit(1747443018.779:1068): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:50:18.981855 systemd-networkd[1635]: cali62e3db04d7d: Link UP May 17 00:50:18.994270 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali62e3db04d7d: link becomes ready May 17 00:50:18.992730 systemd-networkd[1635]: cali62e3db04d7d: Gained carrier May 17 00:50:19.018690 env[1480]: 2025-05-17 00:50:18.887 [INFO][4385] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--4234abe502-k8s-coredns--674b8bbfcf--cxrsr-eth0 coredns-674b8bbfcf- kube-system c807ebf0-49df-4644-b8ed-52a104f87f64 1026 0 2025-05-17 00:49:04 +0000 UTC map[k8s-app:kube-dns pod-template-hash:674b8bbfcf projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.7-n-4234abe502 coredns-674b8bbfcf-cxrsr eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali62e3db04d7d [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] [] }} ContainerID="7d5e002c859f81690ff99a6e500dd76eac097f5717f4459a2c6f435d1d4c6bd7" Namespace="kube-system" Pod="coredns-674b8bbfcf-cxrsr" WorkloadEndpoint="ci--3510.3.7--n--4234abe502-k8s-coredns--674b8bbfcf--cxrsr-" May 17 00:50:19.018690 env[1480]: 2025-05-17 00:50:18.887 [INFO][4385] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="7d5e002c859f81690ff99a6e500dd76eac097f5717f4459a2c6f435d1d4c6bd7" Namespace="kube-system" Pod="coredns-674b8bbfcf-cxrsr" WorkloadEndpoint="ci--3510.3.7--n--4234abe502-k8s-coredns--674b8bbfcf--cxrsr-eth0" May 17 00:50:19.018690 env[1480]: 2025-05-17 00:50:18.910 [INFO][4399] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="7d5e002c859f81690ff99a6e500dd76eac097f5717f4459a2c6f435d1d4c6bd7" HandleID="k8s-pod-network.7d5e002c859f81690ff99a6e500dd76eac097f5717f4459a2c6f435d1d4c6bd7" Workload="ci--3510.3.7--n--4234abe502-k8s-coredns--674b8bbfcf--cxrsr-eth0" May 17 00:50:19.018690 env[1480]: 2025-05-17 00:50:18.910 [INFO][4399] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="7d5e002c859f81690ff99a6e500dd76eac097f5717f4459a2c6f435d1d4c6bd7" HandleID="k8s-pod-network.7d5e002c859f81690ff99a6e500dd76eac097f5717f4459a2c6f435d1d4c6bd7" Workload="ci--3510.3.7--n--4234abe502-k8s-coredns--674b8bbfcf--cxrsr-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002d7030), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.7-n-4234abe502", "pod":"coredns-674b8bbfcf-cxrsr", "timestamp":"2025-05-17 00:50:18.910421317 +0000 UTC"}, Hostname:"ci-3510.3.7-n-4234abe502", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:50:19.018690 env[1480]: 2025-05-17 00:50:18.910 [INFO][4399] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:50:19.018690 env[1480]: 2025-05-17 00:50:18.910 [INFO][4399] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:50:19.018690 env[1480]: 2025-05-17 00:50:18.910 [INFO][4399] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-4234abe502' May 17 00:50:19.018690 env[1480]: 2025-05-17 00:50:18.926 [INFO][4399] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.7d5e002c859f81690ff99a6e500dd76eac097f5717f4459a2c6f435d1d4c6bd7" host="ci-3510.3.7-n-4234abe502" May 17 00:50:19.018690 env[1480]: 2025-05-17 00:50:18.931 [INFO][4399] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.7-n-4234abe502" May 17 00:50:19.018690 env[1480]: 2025-05-17 00:50:18.936 [INFO][4399] ipam/ipam.go 511: Trying affinity for 192.168.86.192/26 host="ci-3510.3.7-n-4234abe502" May 17 00:50:19.018690 env[1480]: 2025-05-17 00:50:18.940 [INFO][4399] ipam/ipam.go 158: Attempting to load block cidr=192.168.86.192/26 host="ci-3510.3.7-n-4234abe502" May 17 00:50:19.018690 env[1480]: 2025-05-17 00:50:18.942 [INFO][4399] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.86.192/26 host="ci-3510.3.7-n-4234abe502" May 17 00:50:19.018690 env[1480]: 2025-05-17 00:50:18.942 [INFO][4399] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.86.192/26 handle="k8s-pod-network.7d5e002c859f81690ff99a6e500dd76eac097f5717f4459a2c6f435d1d4c6bd7" host="ci-3510.3.7-n-4234abe502" May 17 00:50:19.018690 env[1480]: 2025-05-17 00:50:18.944 [INFO][4399] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.7d5e002c859f81690ff99a6e500dd76eac097f5717f4459a2c6f435d1d4c6bd7 May 17 00:50:19.018690 env[1480]: 2025-05-17 00:50:18.956 [INFO][4399] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.86.192/26 handle="k8s-pod-network.7d5e002c859f81690ff99a6e500dd76eac097f5717f4459a2c6f435d1d4c6bd7" host="ci-3510.3.7-n-4234abe502" May 17 00:50:19.018690 env[1480]: 2025-05-17 00:50:18.966 [INFO][4399] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.86.195/26] block=192.168.86.192/26 handle="k8s-pod-network.7d5e002c859f81690ff99a6e500dd76eac097f5717f4459a2c6f435d1d4c6bd7" host="ci-3510.3.7-n-4234abe502" May 17 00:50:19.018690 env[1480]: 2025-05-17 00:50:18.966 [INFO][4399] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.86.195/26] handle="k8s-pod-network.7d5e002c859f81690ff99a6e500dd76eac097f5717f4459a2c6f435d1d4c6bd7" host="ci-3510.3.7-n-4234abe502" May 17 00:50:19.018690 env[1480]: 2025-05-17 00:50:18.966 [INFO][4399] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:50:19.018690 env[1480]: 2025-05-17 00:50:18.966 [INFO][4399] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.86.195/26] IPv6=[] ContainerID="7d5e002c859f81690ff99a6e500dd76eac097f5717f4459a2c6f435d1d4c6bd7" HandleID="k8s-pod-network.7d5e002c859f81690ff99a6e500dd76eac097f5717f4459a2c6f435d1d4c6bd7" Workload="ci--3510.3.7--n--4234abe502-k8s-coredns--674b8bbfcf--cxrsr-eth0" May 17 00:50:19.019351 env[1480]: 2025-05-17 00:50:18.968 [INFO][4385] cni-plugin/k8s.go 418: Populated endpoint ContainerID="7d5e002c859f81690ff99a6e500dd76eac097f5717f4459a2c6f435d1d4c6bd7" Namespace="kube-system" Pod="coredns-674b8bbfcf-cxrsr" WorkloadEndpoint="ci--3510.3.7--n--4234abe502-k8s-coredns--674b8bbfcf--cxrsr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--4234abe502-k8s-coredns--674b8bbfcf--cxrsr-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"c807ebf0-49df-4644-b8ed-52a104f87f64", ResourceVersion:"1026", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 49, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-4234abe502", ContainerID:"", Pod:"coredns-674b8bbfcf-cxrsr", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.86.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali62e3db04d7d", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:50:19.019351 env[1480]: 2025-05-17 00:50:18.968 [INFO][4385] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.86.195/32] ContainerID="7d5e002c859f81690ff99a6e500dd76eac097f5717f4459a2c6f435d1d4c6bd7" Namespace="kube-system" Pod="coredns-674b8bbfcf-cxrsr" WorkloadEndpoint="ci--3510.3.7--n--4234abe502-k8s-coredns--674b8bbfcf--cxrsr-eth0" May 17 00:50:19.019351 env[1480]: 2025-05-17 00:50:18.968 [INFO][4385] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali62e3db04d7d ContainerID="7d5e002c859f81690ff99a6e500dd76eac097f5717f4459a2c6f435d1d4c6bd7" Namespace="kube-system" Pod="coredns-674b8bbfcf-cxrsr" WorkloadEndpoint="ci--3510.3.7--n--4234abe502-k8s-coredns--674b8bbfcf--cxrsr-eth0" May 17 00:50:19.019351 env[1480]: 2025-05-17 00:50:18.995 [INFO][4385] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="7d5e002c859f81690ff99a6e500dd76eac097f5717f4459a2c6f435d1d4c6bd7" Namespace="kube-system" Pod="coredns-674b8bbfcf-cxrsr" WorkloadEndpoint="ci--3510.3.7--n--4234abe502-k8s-coredns--674b8bbfcf--cxrsr-eth0" May 17 00:50:19.019351 env[1480]: 2025-05-17 00:50:18.995 [INFO][4385] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="7d5e002c859f81690ff99a6e500dd76eac097f5717f4459a2c6f435d1d4c6bd7" Namespace="kube-system" Pod="coredns-674b8bbfcf-cxrsr" WorkloadEndpoint="ci--3510.3.7--n--4234abe502-k8s-coredns--674b8bbfcf--cxrsr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--4234abe502-k8s-coredns--674b8bbfcf--cxrsr-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"c807ebf0-49df-4644-b8ed-52a104f87f64", ResourceVersion:"1026", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 49, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-4234abe502", ContainerID:"7d5e002c859f81690ff99a6e500dd76eac097f5717f4459a2c6f435d1d4c6bd7", Pod:"coredns-674b8bbfcf-cxrsr", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.86.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali62e3db04d7d", MAC:"2a:a5:ef:30:47:b1", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:50:19.019351 env[1480]: 2025-05-17 00:50:19.016 [INFO][4385] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="7d5e002c859f81690ff99a6e500dd76eac097f5717f4459a2c6f435d1d4c6bd7" Namespace="kube-system" Pod="coredns-674b8bbfcf-cxrsr" WorkloadEndpoint="ci--3510.3.7--n--4234abe502-k8s-coredns--674b8bbfcf--cxrsr-eth0" May 17 00:50:19.048000 audit[4436]: NETFILTER_CFG table=filter:111 family=2 entries=46 op=nft_register_chain pid=4436 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:50:19.048000 audit[4436]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=23740 a0=3 a1=ffffc345f690 a2=0 a3=ffffa0367fa8 items=0 ppid=4043 pid=4436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:19.100151 kernel: audit: type=1325 audit(1747443019.048:1069): table=filter:111 family=2 entries=46 op=nft_register_chain pid=4436 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:50:19.100915 kernel: audit: type=1300 audit(1747443019.048:1069): arch=c00000b7 syscall=211 success=yes exit=23740 a0=3 a1=ffffc345f690 a2=0 a3=ffffa0367fa8 items=0 ppid=4043 pid=4436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:19.048000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:50:19.117693 kernel: audit: type=1327 audit(1747443019.048:1069): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:50:19.144453 env[1480]: time="2025-05-17T00:50:19.144405925Z" level=info msg="StopPodSandbox for \"7bf04d39c27ca92b349cae2ca88c5f3cc20bf650b9e82aa96d6c732c9127f64b\"" May 17 00:50:19.186804 systemd-networkd[1635]: cali746fd20fc8f: Link UP May 17 00:50:19.200321 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali746fd20fc8f: link becomes ready May 17 00:50:19.200308 systemd-networkd[1635]: cali746fd20fc8f: Gained carrier May 17 00:50:19.239291 env[1480]: 2025-05-17 00:50:19.023 [INFO][4405] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--4234abe502-k8s-calico--kube--controllers--647fb858cc--jtf2c-eth0 calico-kube-controllers-647fb858cc- calico-system cfe725ea-fbe7-42b1-b5de-fc1e1a86ac51 1031 0 2025-05-17 00:49:23 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:647fb858cc projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510.3.7-n-4234abe502 calico-kube-controllers-647fb858cc-jtf2c eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali746fd20fc8f [] [] }} ContainerID="3fe75f67e59eb8ceb42c25b651f0c0f61478108befbc3f1dd795a5bcf4f067b9" Namespace="calico-system" Pod="calico-kube-controllers-647fb858cc-jtf2c" WorkloadEndpoint="ci--3510.3.7--n--4234abe502-k8s-calico--kube--controllers--647fb858cc--jtf2c-" May 17 00:50:19.239291 env[1480]: 2025-05-17 00:50:19.023 [INFO][4405] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="3fe75f67e59eb8ceb42c25b651f0c0f61478108befbc3f1dd795a5bcf4f067b9" Namespace="calico-system" Pod="calico-kube-controllers-647fb858cc-jtf2c" WorkloadEndpoint="ci--3510.3.7--n--4234abe502-k8s-calico--kube--controllers--647fb858cc--jtf2c-eth0" May 17 00:50:19.239291 env[1480]: 2025-05-17 00:50:19.105 [INFO][4431] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="3fe75f67e59eb8ceb42c25b651f0c0f61478108befbc3f1dd795a5bcf4f067b9" HandleID="k8s-pod-network.3fe75f67e59eb8ceb42c25b651f0c0f61478108befbc3f1dd795a5bcf4f067b9" Workload="ci--3510.3.7--n--4234abe502-k8s-calico--kube--controllers--647fb858cc--jtf2c-eth0" May 17 00:50:19.239291 env[1480]: 2025-05-17 00:50:19.105 [INFO][4431] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="3fe75f67e59eb8ceb42c25b651f0c0f61478108befbc3f1dd795a5bcf4f067b9" HandleID="k8s-pod-network.3fe75f67e59eb8ceb42c25b651f0c0f61478108befbc3f1dd795a5bcf4f067b9" Workload="ci--3510.3.7--n--4234abe502-k8s-calico--kube--controllers--647fb858cc--jtf2c-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002a95f0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.7-n-4234abe502", "pod":"calico-kube-controllers-647fb858cc-jtf2c", "timestamp":"2025-05-17 00:50:19.105025638 +0000 UTC"}, Hostname:"ci-3510.3.7-n-4234abe502", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:50:19.239291 env[1480]: 2025-05-17 00:50:19.105 [INFO][4431] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:50:19.239291 env[1480]: 2025-05-17 00:50:19.105 [INFO][4431] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:50:19.239291 env[1480]: 2025-05-17 00:50:19.105 [INFO][4431] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-4234abe502' May 17 00:50:19.239291 env[1480]: 2025-05-17 00:50:19.128 [INFO][4431] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.3fe75f67e59eb8ceb42c25b651f0c0f61478108befbc3f1dd795a5bcf4f067b9" host="ci-3510.3.7-n-4234abe502" May 17 00:50:19.239291 env[1480]: 2025-05-17 00:50:19.133 [INFO][4431] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.7-n-4234abe502" May 17 00:50:19.239291 env[1480]: 2025-05-17 00:50:19.140 [INFO][4431] ipam/ipam.go 511: Trying affinity for 192.168.86.192/26 host="ci-3510.3.7-n-4234abe502" May 17 00:50:19.239291 env[1480]: 2025-05-17 00:50:19.143 [INFO][4431] ipam/ipam.go 158: Attempting to load block cidr=192.168.86.192/26 host="ci-3510.3.7-n-4234abe502" May 17 00:50:19.239291 env[1480]: 2025-05-17 00:50:19.146 [INFO][4431] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.86.192/26 host="ci-3510.3.7-n-4234abe502" May 17 00:50:19.239291 env[1480]: 2025-05-17 00:50:19.147 [INFO][4431] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.86.192/26 handle="k8s-pod-network.3fe75f67e59eb8ceb42c25b651f0c0f61478108befbc3f1dd795a5bcf4f067b9" host="ci-3510.3.7-n-4234abe502" May 17 00:50:19.239291 env[1480]: 2025-05-17 00:50:19.150 [INFO][4431] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.3fe75f67e59eb8ceb42c25b651f0c0f61478108befbc3f1dd795a5bcf4f067b9 May 17 00:50:19.239291 env[1480]: 2025-05-17 00:50:19.160 [INFO][4431] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.86.192/26 handle="k8s-pod-network.3fe75f67e59eb8ceb42c25b651f0c0f61478108befbc3f1dd795a5bcf4f067b9" host="ci-3510.3.7-n-4234abe502" May 17 00:50:19.239291 env[1480]: 2025-05-17 00:50:19.168 [INFO][4431] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.86.196/26] block=192.168.86.192/26 handle="k8s-pod-network.3fe75f67e59eb8ceb42c25b651f0c0f61478108befbc3f1dd795a5bcf4f067b9" host="ci-3510.3.7-n-4234abe502" May 17 00:50:19.239291 env[1480]: 2025-05-17 00:50:19.168 [INFO][4431] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.86.196/26] handle="k8s-pod-network.3fe75f67e59eb8ceb42c25b651f0c0f61478108befbc3f1dd795a5bcf4f067b9" host="ci-3510.3.7-n-4234abe502" May 17 00:50:19.239291 env[1480]: 2025-05-17 00:50:19.168 [INFO][4431] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:50:19.239291 env[1480]: 2025-05-17 00:50:19.168 [INFO][4431] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.86.196/26] IPv6=[] ContainerID="3fe75f67e59eb8ceb42c25b651f0c0f61478108befbc3f1dd795a5bcf4f067b9" HandleID="k8s-pod-network.3fe75f67e59eb8ceb42c25b651f0c0f61478108befbc3f1dd795a5bcf4f067b9" Workload="ci--3510.3.7--n--4234abe502-k8s-calico--kube--controllers--647fb858cc--jtf2c-eth0" May 17 00:50:19.239890 env[1480]: 2025-05-17 00:50:19.170 [INFO][4405] cni-plugin/k8s.go 418: Populated endpoint ContainerID="3fe75f67e59eb8ceb42c25b651f0c0f61478108befbc3f1dd795a5bcf4f067b9" Namespace="calico-system" Pod="calico-kube-controllers-647fb858cc-jtf2c" WorkloadEndpoint="ci--3510.3.7--n--4234abe502-k8s-calico--kube--controllers--647fb858cc--jtf2c-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--4234abe502-k8s-calico--kube--controllers--647fb858cc--jtf2c-eth0", GenerateName:"calico-kube-controllers-647fb858cc-", Namespace:"calico-system", SelfLink:"", UID:"cfe725ea-fbe7-42b1-b5de-fc1e1a86ac51", ResourceVersion:"1031", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 49, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"647fb858cc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-4234abe502", ContainerID:"", Pod:"calico-kube-controllers-647fb858cc-jtf2c", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.86.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali746fd20fc8f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:50:19.239890 env[1480]: 2025-05-17 00:50:19.170 [INFO][4405] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.86.196/32] ContainerID="3fe75f67e59eb8ceb42c25b651f0c0f61478108befbc3f1dd795a5bcf4f067b9" Namespace="calico-system" Pod="calico-kube-controllers-647fb858cc-jtf2c" WorkloadEndpoint="ci--3510.3.7--n--4234abe502-k8s-calico--kube--controllers--647fb858cc--jtf2c-eth0" May 17 00:50:19.239890 env[1480]: 2025-05-17 00:50:19.170 [INFO][4405] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali746fd20fc8f ContainerID="3fe75f67e59eb8ceb42c25b651f0c0f61478108befbc3f1dd795a5bcf4f067b9" Namespace="calico-system" Pod="calico-kube-controllers-647fb858cc-jtf2c" WorkloadEndpoint="ci--3510.3.7--n--4234abe502-k8s-calico--kube--controllers--647fb858cc--jtf2c-eth0" May 17 00:50:19.239890 env[1480]: 2025-05-17 00:50:19.200 [INFO][4405] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="3fe75f67e59eb8ceb42c25b651f0c0f61478108befbc3f1dd795a5bcf4f067b9" Namespace="calico-system" Pod="calico-kube-controllers-647fb858cc-jtf2c" WorkloadEndpoint="ci--3510.3.7--n--4234abe502-k8s-calico--kube--controllers--647fb858cc--jtf2c-eth0" May 17 00:50:19.239890 env[1480]: 2025-05-17 00:50:19.201 [INFO][4405] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="3fe75f67e59eb8ceb42c25b651f0c0f61478108befbc3f1dd795a5bcf4f067b9" Namespace="calico-system" Pod="calico-kube-controllers-647fb858cc-jtf2c" WorkloadEndpoint="ci--3510.3.7--n--4234abe502-k8s-calico--kube--controllers--647fb858cc--jtf2c-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--4234abe502-k8s-calico--kube--controllers--647fb858cc--jtf2c-eth0", GenerateName:"calico-kube-controllers-647fb858cc-", Namespace:"calico-system", SelfLink:"", UID:"cfe725ea-fbe7-42b1-b5de-fc1e1a86ac51", ResourceVersion:"1031", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 49, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"647fb858cc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-4234abe502", ContainerID:"3fe75f67e59eb8ceb42c25b651f0c0f61478108befbc3f1dd795a5bcf4f067b9", Pod:"calico-kube-controllers-647fb858cc-jtf2c", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.86.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali746fd20fc8f", MAC:"3a:8f:81:27:49:8e", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:50:19.239890 env[1480]: 2025-05-17 00:50:19.218 [INFO][4405] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="3fe75f67e59eb8ceb42c25b651f0c0f61478108befbc3f1dd795a5bcf4f067b9" Namespace="calico-system" Pod="calico-kube-controllers-647fb858cc-jtf2c" WorkloadEndpoint="ci--3510.3.7--n--4234abe502-k8s-calico--kube--controllers--647fb858cc--jtf2c-eth0" May 17 00:50:19.260000 audit[4464]: NETFILTER_CFG table=filter:112 family=2 entries=44 op=nft_register_chain pid=4464 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:50:19.260000 audit[4464]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21952 a0=3 a1=ffffe4d876f0 a2=0 a3=ffff89b4efa8 items=0 ppid=4043 pid=4464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:19.314478 kernel: audit: type=1325 audit(1747443019.260:1070): table=filter:112 family=2 entries=44 op=nft_register_chain pid=4464 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:50:19.314625 kernel: audit: type=1300 audit(1747443019.260:1070): arch=c00000b7 syscall=211 success=yes exit=21952 a0=3 a1=ffffe4d876f0 a2=0 a3=ffff89b4efa8 items=0 ppid=4043 pid=4464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:19.260000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:50:19.334025 kernel: audit: type=1327 audit(1747443019.260:1070): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:50:19.361764 env[1480]: 2025-05-17 00:50:19.255 [INFO][4450] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="7bf04d39c27ca92b349cae2ca88c5f3cc20bf650b9e82aa96d6c732c9127f64b" May 17 00:50:19.361764 env[1480]: 2025-05-17 00:50:19.255 [INFO][4450] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="7bf04d39c27ca92b349cae2ca88c5f3cc20bf650b9e82aa96d6c732c9127f64b" iface="eth0" netns="/var/run/netns/cni-9b4aa08b-a334-98f6-7499-ac3896800f86" May 17 00:50:19.361764 env[1480]: 2025-05-17 00:50:19.255 [INFO][4450] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="7bf04d39c27ca92b349cae2ca88c5f3cc20bf650b9e82aa96d6c732c9127f64b" iface="eth0" netns="/var/run/netns/cni-9b4aa08b-a334-98f6-7499-ac3896800f86" May 17 00:50:19.361764 env[1480]: 2025-05-17 00:50:19.257 [INFO][4450] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="7bf04d39c27ca92b349cae2ca88c5f3cc20bf650b9e82aa96d6c732c9127f64b" iface="eth0" netns="/var/run/netns/cni-9b4aa08b-a334-98f6-7499-ac3896800f86" May 17 00:50:19.361764 env[1480]: 2025-05-17 00:50:19.257 [INFO][4450] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="7bf04d39c27ca92b349cae2ca88c5f3cc20bf650b9e82aa96d6c732c9127f64b" May 17 00:50:19.361764 env[1480]: 2025-05-17 00:50:19.257 [INFO][4450] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7bf04d39c27ca92b349cae2ca88c5f3cc20bf650b9e82aa96d6c732c9127f64b" May 17 00:50:19.361764 env[1480]: 2025-05-17 00:50:19.346 [INFO][4466] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7bf04d39c27ca92b349cae2ca88c5f3cc20bf650b9e82aa96d6c732c9127f64b" HandleID="k8s-pod-network.7bf04d39c27ca92b349cae2ca88c5f3cc20bf650b9e82aa96d6c732c9127f64b" Workload="ci--3510.3.7--n--4234abe502-k8s-calico--apiserver--84c64ddb56--27tsz-eth0" May 17 00:50:19.361764 env[1480]: 2025-05-17 00:50:19.347 [INFO][4466] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:50:19.361764 env[1480]: 2025-05-17 00:50:19.347 [INFO][4466] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:50:19.361764 env[1480]: 2025-05-17 00:50:19.357 [WARNING][4466] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7bf04d39c27ca92b349cae2ca88c5f3cc20bf650b9e82aa96d6c732c9127f64b" HandleID="k8s-pod-network.7bf04d39c27ca92b349cae2ca88c5f3cc20bf650b9e82aa96d6c732c9127f64b" Workload="ci--3510.3.7--n--4234abe502-k8s-calico--apiserver--84c64ddb56--27tsz-eth0" May 17 00:50:19.361764 env[1480]: 2025-05-17 00:50:19.357 [INFO][4466] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7bf04d39c27ca92b349cae2ca88c5f3cc20bf650b9e82aa96d6c732c9127f64b" HandleID="k8s-pod-network.7bf04d39c27ca92b349cae2ca88c5f3cc20bf650b9e82aa96d6c732c9127f64b" Workload="ci--3510.3.7--n--4234abe502-k8s-calico--apiserver--84c64ddb56--27tsz-eth0" May 17 00:50:19.361764 env[1480]: 2025-05-17 00:50:19.358 [INFO][4466] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:50:19.361764 env[1480]: 2025-05-17 00:50:19.360 [INFO][4450] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="7bf04d39c27ca92b349cae2ca88c5f3cc20bf650b9e82aa96d6c732c9127f64b" May 17 00:50:19.366510 systemd[1]: run-netns-cni\x2d9b4aa08b\x2da334\x2d98f6\x2d7499\x2dac3896800f86.mount: Deactivated successfully. May 17 00:50:19.367375 env[1480]: time="2025-05-17T00:50:19.367322356Z" level=info msg="TearDown network for sandbox \"7bf04d39c27ca92b349cae2ca88c5f3cc20bf650b9e82aa96d6c732c9127f64b\" successfully" May 17 00:50:19.367481 env[1480]: time="2025-05-17T00:50:19.367463398Z" level=info msg="StopPodSandbox for \"7bf04d39c27ca92b349cae2ca88c5f3cc20bf650b9e82aa96d6c732c9127f64b\" returns successfully" May 17 00:50:19.368475 env[1480]: time="2025-05-17T00:50:19.368426696Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-84c64ddb56-27tsz,Uid:072e45c7-a564-4ff1-8f56-8086de5cb47f,Namespace:calico-apiserver,Attempt:1,}" May 17 00:50:19.377689 env[1480]: time="2025-05-17T00:50:19.377600785Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:50:19.377900 env[1480]: time="2025-05-17T00:50:19.377708147Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:50:19.377900 env[1480]: time="2025-05-17T00:50:19.377721788Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:50:19.378004 env[1480]: time="2025-05-17T00:50:19.377920631Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ef88f37ad20b41a637085c66407ec0e39064d84fb7beea9b8226d24161d3c910 pid=4480 runtime=io.containerd.runc.v2 May 17 00:50:19.541436 systemd[1]: Started cri-containerd-ef88f37ad20b41a637085c66407ec0e39064d84fb7beea9b8226d24161d3c910.scope. May 17 00:50:19.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:19.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:19.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:19.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:19.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:19.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:19.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:19.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:19.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:19.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:19.580000 audit: BPF prog-id=160 op=LOAD May 17 00:50:19.581000 audit[4490]: AVC avc: denied { bpf } for pid=4490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:19.581000 audit[4490]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4480 pid=4490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:19.581000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566383866333761643230623431613633373038356336363430376563 May 17 00:50:19.581000 audit[4490]: AVC avc: denied { perfmon } for pid=4490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:19.581000 audit[4490]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4480 pid=4490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:19.581000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566383866333761643230623431613633373038356336363430376563 May 17 00:50:19.581000 audit[4490]: AVC avc: denied { bpf } for pid=4490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:19.581000 audit[4490]: AVC avc: denied { bpf } for pid=4490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:19.581000 audit[4490]: AVC avc: denied { bpf } for pid=4490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:19.581000 audit[4490]: AVC avc: denied { perfmon } for pid=4490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:19.581000 audit[4490]: AVC avc: denied { perfmon } for pid=4490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:19.581000 audit[4490]: AVC avc: denied { perfmon } for pid=4490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:19.590269 kernel: audit: type=1400 audit(1747443019.562:1071): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:19.581000 audit[4490]: AVC avc: denied { perfmon } for pid=4490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:19.581000 audit[4490]: AVC avc: denied { perfmon } for pid=4490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:19.581000 audit[4490]: AVC avc: denied { bpf } for pid=4490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:19.581000 audit[4490]: AVC avc: denied { bpf } for pid=4490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:19.581000 audit: BPF prog-id=161 op=LOAD May 17 00:50:19.581000 audit[4490]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4480 pid=4490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:19.581000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566383866333761643230623431613633373038356336363430376563 May 17 00:50:19.581000 audit[4490]: AVC avc: denied { bpf } for pid=4490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:19.581000 audit[4490]: AVC avc: denied { bpf } for pid=4490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:19.581000 audit[4490]: AVC avc: denied { perfmon } for pid=4490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:19.581000 audit[4490]: AVC avc: denied { perfmon } for pid=4490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:19.581000 audit[4490]: AVC avc: denied { perfmon } for pid=4490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:19.581000 audit[4490]: AVC avc: denied { perfmon } for pid=4490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:19.581000 audit[4490]: AVC avc: denied { perfmon } for pid=4490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:19.581000 audit[4490]: AVC avc: denied { bpf } for pid=4490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:19.581000 audit[4490]: AVC avc: denied { bpf } for pid=4490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:19.581000 audit: BPF prog-id=162 op=LOAD May 17 00:50:19.581000 audit[4490]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4480 pid=4490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:19.581000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566383866333761643230623431613633373038356336363430376563 May 17 00:50:19.581000 audit: BPF prog-id=162 op=UNLOAD May 17 00:50:19.581000 audit: BPF prog-id=161 op=UNLOAD May 17 00:50:19.581000 audit[4490]: AVC avc: denied { bpf } for pid=4490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:19.581000 audit[4490]: AVC avc: denied { bpf } for pid=4490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:19.581000 audit[4490]: AVC avc: denied { bpf } for pid=4490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:19.581000 audit[4490]: AVC avc: denied { perfmon } for pid=4490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:19.581000 audit[4490]: AVC avc: denied { perfmon } for pid=4490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:19.581000 audit[4490]: AVC avc: denied { perfmon } for pid=4490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:19.581000 audit[4490]: AVC avc: denied { perfmon } for pid=4490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:19.581000 audit[4490]: AVC avc: denied { perfmon } for pid=4490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:19.581000 audit[4490]: AVC avc: denied { bpf } for pid=4490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:19.581000 audit[4490]: AVC avc: denied { bpf } for pid=4490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:19.581000 audit: BPF prog-id=163 op=LOAD May 17 00:50:19.581000 audit[4490]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4480 pid=4490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:19.581000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566383866333761643230623431613633373038356336363430376563 May 17 00:50:19.597140 env[1480]: time="2025-05-17T00:50:19.597097474Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-52bcs,Uid:463fd6d8-2e06-42b8-ade3-8bda47d821b9,Namespace:calico-system,Attempt:1,} returns sandbox id \"ef88f37ad20b41a637085c66407ec0e39064d84fb7beea9b8226d24161d3c910\"" May 17 00:50:19.601487 env[1480]: time="2025-05-17T00:50:19.601449074Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.0\"" May 17 00:50:20.189467 systemd-networkd[1635]: cali911774a374b: Gained IPv6LL May 17 00:50:20.253450 systemd-networkd[1635]: cali62e3db04d7d: Gained IPv6LL May 17 00:50:21.149405 systemd-networkd[1635]: cali746fd20fc8f: Gained IPv6LL May 17 00:50:22.014594 systemd-networkd[1635]: cali5c1c43afae2: Link UP May 17 00:50:22.027696 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:50:22.027922 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5c1c43afae2: link becomes ready May 17 00:50:22.030319 systemd-networkd[1635]: cali5c1c43afae2: Gained carrier May 17 00:50:22.054142 env[1480]: 2025-05-17 00:50:21.923 [INFO][4519] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--4234abe502-k8s-goldmane--78d55f7ddc--pmkbg-eth0 goldmane-78d55f7ddc- calico-system 85f144ac-4d39-496d-b3d5-66149a1574d7 1032 0 2025-05-17 00:49:23 +0000 UTC map[app.kubernetes.io/name:goldmane k8s-app:goldmane pod-template-hash:78d55f7ddc projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:goldmane] map[] [] [] []} {k8s ci-3510.3.7-n-4234abe502 goldmane-78d55f7ddc-pmkbg eth0 goldmane [] [] [kns.calico-system ksa.calico-system.goldmane] cali5c1c43afae2 [] [] }} ContainerID="8ca17f80f60f18caf2af4ec3f51c89b5e4ffb37f1647f79ed391c689ee788670" Namespace="calico-system" Pod="goldmane-78d55f7ddc-pmkbg" WorkloadEndpoint="ci--3510.3.7--n--4234abe502-k8s-goldmane--78d55f7ddc--pmkbg-" May 17 00:50:22.054142 env[1480]: 2025-05-17 00:50:21.923 [INFO][4519] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="8ca17f80f60f18caf2af4ec3f51c89b5e4ffb37f1647f79ed391c689ee788670" Namespace="calico-system" Pod="goldmane-78d55f7ddc-pmkbg" WorkloadEndpoint="ci--3510.3.7--n--4234abe502-k8s-goldmane--78d55f7ddc--pmkbg-eth0" May 17 00:50:22.054142 env[1480]: 2025-05-17 00:50:21.953 [INFO][4531] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="8ca17f80f60f18caf2af4ec3f51c89b5e4ffb37f1647f79ed391c689ee788670" HandleID="k8s-pod-network.8ca17f80f60f18caf2af4ec3f51c89b5e4ffb37f1647f79ed391c689ee788670" Workload="ci--3510.3.7--n--4234abe502-k8s-goldmane--78d55f7ddc--pmkbg-eth0" May 17 00:50:22.054142 env[1480]: 2025-05-17 00:50:21.954 [INFO][4531] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="8ca17f80f60f18caf2af4ec3f51c89b5e4ffb37f1647f79ed391c689ee788670" HandleID="k8s-pod-network.8ca17f80f60f18caf2af4ec3f51c89b5e4ffb37f1647f79ed391c689ee788670" Workload="ci--3510.3.7--n--4234abe502-k8s-goldmane--78d55f7ddc--pmkbg-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000237050), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.7-n-4234abe502", "pod":"goldmane-78d55f7ddc-pmkbg", "timestamp":"2025-05-17 00:50:21.95316539 +0000 UTC"}, Hostname:"ci-3510.3.7-n-4234abe502", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:50:22.054142 env[1480]: 2025-05-17 00:50:21.954 [INFO][4531] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:50:22.054142 env[1480]: 2025-05-17 00:50:21.954 [INFO][4531] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:50:22.054142 env[1480]: 2025-05-17 00:50:21.954 [INFO][4531] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-4234abe502' May 17 00:50:22.054142 env[1480]: 2025-05-17 00:50:21.967 [INFO][4531] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.8ca17f80f60f18caf2af4ec3f51c89b5e4ffb37f1647f79ed391c689ee788670" host="ci-3510.3.7-n-4234abe502" May 17 00:50:22.054142 env[1480]: 2025-05-17 00:50:21.978 [INFO][4531] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.7-n-4234abe502" May 17 00:50:22.054142 env[1480]: 2025-05-17 00:50:21.983 [INFO][4531] ipam/ipam.go 511: Trying affinity for 192.168.86.192/26 host="ci-3510.3.7-n-4234abe502" May 17 00:50:22.054142 env[1480]: 2025-05-17 00:50:21.985 [INFO][4531] ipam/ipam.go 158: Attempting to load block cidr=192.168.86.192/26 host="ci-3510.3.7-n-4234abe502" May 17 00:50:22.054142 env[1480]: 2025-05-17 00:50:21.988 [INFO][4531] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.86.192/26 host="ci-3510.3.7-n-4234abe502" May 17 00:50:22.054142 env[1480]: 2025-05-17 00:50:21.988 [INFO][4531] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.86.192/26 handle="k8s-pod-network.8ca17f80f60f18caf2af4ec3f51c89b5e4ffb37f1647f79ed391c689ee788670" host="ci-3510.3.7-n-4234abe502" May 17 00:50:22.054142 env[1480]: 2025-05-17 00:50:21.990 [INFO][4531] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.8ca17f80f60f18caf2af4ec3f51c89b5e4ffb37f1647f79ed391c689ee788670 May 17 00:50:22.054142 env[1480]: 2025-05-17 00:50:21.999 [INFO][4531] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.86.192/26 handle="k8s-pod-network.8ca17f80f60f18caf2af4ec3f51c89b5e4ffb37f1647f79ed391c689ee788670" host="ci-3510.3.7-n-4234abe502" May 17 00:50:22.054142 env[1480]: 2025-05-17 00:50:22.009 [INFO][4531] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.86.197/26] block=192.168.86.192/26 handle="k8s-pod-network.8ca17f80f60f18caf2af4ec3f51c89b5e4ffb37f1647f79ed391c689ee788670" host="ci-3510.3.7-n-4234abe502" May 17 00:50:22.054142 env[1480]: 2025-05-17 00:50:22.009 [INFO][4531] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.86.197/26] handle="k8s-pod-network.8ca17f80f60f18caf2af4ec3f51c89b5e4ffb37f1647f79ed391c689ee788670" host="ci-3510.3.7-n-4234abe502" May 17 00:50:22.054142 env[1480]: 2025-05-17 00:50:22.009 [INFO][4531] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:50:22.054142 env[1480]: 2025-05-17 00:50:22.009 [INFO][4531] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.86.197/26] IPv6=[] ContainerID="8ca17f80f60f18caf2af4ec3f51c89b5e4ffb37f1647f79ed391c689ee788670" HandleID="k8s-pod-network.8ca17f80f60f18caf2af4ec3f51c89b5e4ffb37f1647f79ed391c689ee788670" Workload="ci--3510.3.7--n--4234abe502-k8s-goldmane--78d55f7ddc--pmkbg-eth0" May 17 00:50:22.055055 env[1480]: 2025-05-17 00:50:22.012 [INFO][4519] cni-plugin/k8s.go 418: Populated endpoint ContainerID="8ca17f80f60f18caf2af4ec3f51c89b5e4ffb37f1647f79ed391c689ee788670" Namespace="calico-system" Pod="goldmane-78d55f7ddc-pmkbg" WorkloadEndpoint="ci--3510.3.7--n--4234abe502-k8s-goldmane--78d55f7ddc--pmkbg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--4234abe502-k8s-goldmane--78d55f7ddc--pmkbg-eth0", GenerateName:"goldmane-78d55f7ddc-", Namespace:"calico-system", SelfLink:"", UID:"85f144ac-4d39-496d-b3d5-66149a1574d7", ResourceVersion:"1032", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 49, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"78d55f7ddc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-4234abe502", ContainerID:"", Pod:"goldmane-78d55f7ddc-pmkbg", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.86.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali5c1c43afae2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:50:22.055055 env[1480]: 2025-05-17 00:50:22.012 [INFO][4519] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.86.197/32] ContainerID="8ca17f80f60f18caf2af4ec3f51c89b5e4ffb37f1647f79ed391c689ee788670" Namespace="calico-system" Pod="goldmane-78d55f7ddc-pmkbg" WorkloadEndpoint="ci--3510.3.7--n--4234abe502-k8s-goldmane--78d55f7ddc--pmkbg-eth0" May 17 00:50:22.055055 env[1480]: 2025-05-17 00:50:22.012 [INFO][4519] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5c1c43afae2 ContainerID="8ca17f80f60f18caf2af4ec3f51c89b5e4ffb37f1647f79ed391c689ee788670" Namespace="calico-system" Pod="goldmane-78d55f7ddc-pmkbg" WorkloadEndpoint="ci--3510.3.7--n--4234abe502-k8s-goldmane--78d55f7ddc--pmkbg-eth0" May 17 00:50:22.055055 env[1480]: 2025-05-17 00:50:22.031 [INFO][4519] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="8ca17f80f60f18caf2af4ec3f51c89b5e4ffb37f1647f79ed391c689ee788670" Namespace="calico-system" Pod="goldmane-78d55f7ddc-pmkbg" WorkloadEndpoint="ci--3510.3.7--n--4234abe502-k8s-goldmane--78d55f7ddc--pmkbg-eth0" May 17 00:50:22.055055 env[1480]: 2025-05-17 00:50:22.036 [INFO][4519] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="8ca17f80f60f18caf2af4ec3f51c89b5e4ffb37f1647f79ed391c689ee788670" Namespace="calico-system" Pod="goldmane-78d55f7ddc-pmkbg" WorkloadEndpoint="ci--3510.3.7--n--4234abe502-k8s-goldmane--78d55f7ddc--pmkbg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--4234abe502-k8s-goldmane--78d55f7ddc--pmkbg-eth0", GenerateName:"goldmane-78d55f7ddc-", Namespace:"calico-system", SelfLink:"", UID:"85f144ac-4d39-496d-b3d5-66149a1574d7", ResourceVersion:"1032", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 49, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"78d55f7ddc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-4234abe502", ContainerID:"8ca17f80f60f18caf2af4ec3f51c89b5e4ffb37f1647f79ed391c689ee788670", Pod:"goldmane-78d55f7ddc-pmkbg", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.86.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali5c1c43afae2", MAC:"d6:09:cc:25:8f:04", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:50:22.055055 env[1480]: 2025-05-17 00:50:22.052 [INFO][4519] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="8ca17f80f60f18caf2af4ec3f51c89b5e4ffb37f1647f79ed391c689ee788670" Namespace="calico-system" Pod="goldmane-78d55f7ddc-pmkbg" WorkloadEndpoint="ci--3510.3.7--n--4234abe502-k8s-goldmane--78d55f7ddc--pmkbg-eth0" May 17 00:50:22.075000 audit[4576]: NETFILTER_CFG table=filter:113 family=2 entries=56 op=nft_register_chain pid=4576 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:50:22.075000 audit[4576]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=28744 a0=3 a1=ffffc5eb7010 a2=0 a3=ffffb4cc9fa8 items=0 ppid=4043 pid=4576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:22.075000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:50:22.161004 env[1480]: time="2025-05-17T00:50:22.160903628Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:50:22.161349 env[1480]: time="2025-05-17T00:50:22.161319115Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:50:22.161495 env[1480]: time="2025-05-17T00:50:22.161461678Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:50:22.163214 env[1480]: time="2025-05-17T00:50:22.162318533Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7d5e002c859f81690ff99a6e500dd76eac097f5717f4459a2c6f435d1d4c6bd7 pid=4591 runtime=io.containerd.runc.v2 May 17 00:50:22.178811 systemd-networkd[1635]: caliebc373168f1: Link UP May 17 00:50:22.188502 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliebc373168f1: link becomes ready May 17 00:50:22.188366 systemd-networkd[1635]: caliebc373168f1: Gained carrier May 17 00:50:22.218736 env[1480]: 2025-05-17 00:50:22.028 [INFO][4536] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--4234abe502-k8s-calico--apiserver--84c64ddb56--5dt2v-eth0 calico-apiserver-84c64ddb56- calico-apiserver da20061a-c164-4dad-aec7-b54414ff9706 1038 0 2025-05-17 00:49:18 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:84c64ddb56 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.7-n-4234abe502 calico-apiserver-84c64ddb56-5dt2v eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] caliebc373168f1 [] [] }} ContainerID="3182a56ea9946ba5082e3e29fd441f6cf589a98ff0116cb3608dd30050fed381" Namespace="calico-apiserver" Pod="calico-apiserver-84c64ddb56-5dt2v" WorkloadEndpoint="ci--3510.3.7--n--4234abe502-k8s-calico--apiserver--84c64ddb56--5dt2v-" May 17 00:50:22.218736 env[1480]: 2025-05-17 00:50:22.028 [INFO][4536] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="3182a56ea9946ba5082e3e29fd441f6cf589a98ff0116cb3608dd30050fed381" Namespace="calico-apiserver" Pod="calico-apiserver-84c64ddb56-5dt2v" WorkloadEndpoint="ci--3510.3.7--n--4234abe502-k8s-calico--apiserver--84c64ddb56--5dt2v-eth0" May 17 00:50:22.218736 env[1480]: 2025-05-17 00:50:22.118 [INFO][4556] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="3182a56ea9946ba5082e3e29fd441f6cf589a98ff0116cb3608dd30050fed381" HandleID="k8s-pod-network.3182a56ea9946ba5082e3e29fd441f6cf589a98ff0116cb3608dd30050fed381" Workload="ci--3510.3.7--n--4234abe502-k8s-calico--apiserver--84c64ddb56--5dt2v-eth0" May 17 00:50:22.218736 env[1480]: 2025-05-17 00:50:22.118 [INFO][4556] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="3182a56ea9946ba5082e3e29fd441f6cf589a98ff0116cb3608dd30050fed381" HandleID="k8s-pod-network.3182a56ea9946ba5082e3e29fd441f6cf589a98ff0116cb3608dd30050fed381" Workload="ci--3510.3.7--n--4234abe502-k8s-calico--apiserver--84c64ddb56--5dt2v-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40001028a0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.7-n-4234abe502", "pod":"calico-apiserver-84c64ddb56-5dt2v", "timestamp":"2025-05-17 00:50:22.117984412 +0000 UTC"}, Hostname:"ci-3510.3.7-n-4234abe502", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:50:22.218736 env[1480]: 2025-05-17 00:50:22.118 [INFO][4556] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:50:22.218736 env[1480]: 2025-05-17 00:50:22.118 [INFO][4556] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:50:22.218736 env[1480]: 2025-05-17 00:50:22.118 [INFO][4556] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-4234abe502' May 17 00:50:22.218736 env[1480]: 2025-05-17 00:50:22.128 [INFO][4556] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.3182a56ea9946ba5082e3e29fd441f6cf589a98ff0116cb3608dd30050fed381" host="ci-3510.3.7-n-4234abe502" May 17 00:50:22.218736 env[1480]: 2025-05-17 00:50:22.134 [INFO][4556] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.7-n-4234abe502" May 17 00:50:22.218736 env[1480]: 2025-05-17 00:50:22.139 [INFO][4556] ipam/ipam.go 511: Trying affinity for 192.168.86.192/26 host="ci-3510.3.7-n-4234abe502" May 17 00:50:22.218736 env[1480]: 2025-05-17 00:50:22.143 [INFO][4556] ipam/ipam.go 158: Attempting to load block cidr=192.168.86.192/26 host="ci-3510.3.7-n-4234abe502" May 17 00:50:22.218736 env[1480]: 2025-05-17 00:50:22.148 [INFO][4556] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.86.192/26 host="ci-3510.3.7-n-4234abe502" May 17 00:50:22.218736 env[1480]: 2025-05-17 00:50:22.148 [INFO][4556] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.86.192/26 handle="k8s-pod-network.3182a56ea9946ba5082e3e29fd441f6cf589a98ff0116cb3608dd30050fed381" host="ci-3510.3.7-n-4234abe502" May 17 00:50:22.218736 env[1480]: 2025-05-17 00:50:22.150 [INFO][4556] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.3182a56ea9946ba5082e3e29fd441f6cf589a98ff0116cb3608dd30050fed381 May 17 00:50:22.218736 env[1480]: 2025-05-17 00:50:22.156 [INFO][4556] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.86.192/26 handle="k8s-pod-network.3182a56ea9946ba5082e3e29fd441f6cf589a98ff0116cb3608dd30050fed381" host="ci-3510.3.7-n-4234abe502" May 17 00:50:22.218736 env[1480]: 2025-05-17 00:50:22.172 [INFO][4556] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.86.198/26] block=192.168.86.192/26 handle="k8s-pod-network.3182a56ea9946ba5082e3e29fd441f6cf589a98ff0116cb3608dd30050fed381" host="ci-3510.3.7-n-4234abe502" May 17 00:50:22.218736 env[1480]: 2025-05-17 00:50:22.172 [INFO][4556] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.86.198/26] handle="k8s-pod-network.3182a56ea9946ba5082e3e29fd441f6cf589a98ff0116cb3608dd30050fed381" host="ci-3510.3.7-n-4234abe502" May 17 00:50:22.218736 env[1480]: 2025-05-17 00:50:22.172 [INFO][4556] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:50:22.218736 env[1480]: 2025-05-17 00:50:22.172 [INFO][4556] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.86.198/26] IPv6=[] ContainerID="3182a56ea9946ba5082e3e29fd441f6cf589a98ff0116cb3608dd30050fed381" HandleID="k8s-pod-network.3182a56ea9946ba5082e3e29fd441f6cf589a98ff0116cb3608dd30050fed381" Workload="ci--3510.3.7--n--4234abe502-k8s-calico--apiserver--84c64ddb56--5dt2v-eth0" May 17 00:50:22.219330 env[1480]: 2025-05-17 00:50:22.174 [INFO][4536] cni-plugin/k8s.go 418: Populated endpoint ContainerID="3182a56ea9946ba5082e3e29fd441f6cf589a98ff0116cb3608dd30050fed381" Namespace="calico-apiserver" Pod="calico-apiserver-84c64ddb56-5dt2v" WorkloadEndpoint="ci--3510.3.7--n--4234abe502-k8s-calico--apiserver--84c64ddb56--5dt2v-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--4234abe502-k8s-calico--apiserver--84c64ddb56--5dt2v-eth0", GenerateName:"calico-apiserver-84c64ddb56-", Namespace:"calico-apiserver", SelfLink:"", UID:"da20061a-c164-4dad-aec7-b54414ff9706", ResourceVersion:"1038", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 49, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"84c64ddb56", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-4234abe502", ContainerID:"", Pod:"calico-apiserver-84c64ddb56-5dt2v", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.86.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"caliebc373168f1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:50:22.219330 env[1480]: 2025-05-17 00:50:22.175 [INFO][4536] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.86.198/32] ContainerID="3182a56ea9946ba5082e3e29fd441f6cf589a98ff0116cb3608dd30050fed381" Namespace="calico-apiserver" Pod="calico-apiserver-84c64ddb56-5dt2v" WorkloadEndpoint="ci--3510.3.7--n--4234abe502-k8s-calico--apiserver--84c64ddb56--5dt2v-eth0" May 17 00:50:22.219330 env[1480]: 2025-05-17 00:50:22.176 [INFO][4536] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to caliebc373168f1 ContainerID="3182a56ea9946ba5082e3e29fd441f6cf589a98ff0116cb3608dd30050fed381" Namespace="calico-apiserver" Pod="calico-apiserver-84c64ddb56-5dt2v" WorkloadEndpoint="ci--3510.3.7--n--4234abe502-k8s-calico--apiserver--84c64ddb56--5dt2v-eth0" May 17 00:50:22.219330 env[1480]: 2025-05-17 00:50:22.179 [INFO][4536] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="3182a56ea9946ba5082e3e29fd441f6cf589a98ff0116cb3608dd30050fed381" Namespace="calico-apiserver" Pod="calico-apiserver-84c64ddb56-5dt2v" WorkloadEndpoint="ci--3510.3.7--n--4234abe502-k8s-calico--apiserver--84c64ddb56--5dt2v-eth0" May 17 00:50:22.219330 env[1480]: 2025-05-17 00:50:22.180 [INFO][4536] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="3182a56ea9946ba5082e3e29fd441f6cf589a98ff0116cb3608dd30050fed381" Namespace="calico-apiserver" Pod="calico-apiserver-84c64ddb56-5dt2v" WorkloadEndpoint="ci--3510.3.7--n--4234abe502-k8s-calico--apiserver--84c64ddb56--5dt2v-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--4234abe502-k8s-calico--apiserver--84c64ddb56--5dt2v-eth0", GenerateName:"calico-apiserver-84c64ddb56-", Namespace:"calico-apiserver", SelfLink:"", UID:"da20061a-c164-4dad-aec7-b54414ff9706", ResourceVersion:"1038", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 49, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"84c64ddb56", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-4234abe502", ContainerID:"3182a56ea9946ba5082e3e29fd441f6cf589a98ff0116cb3608dd30050fed381", Pod:"calico-apiserver-84c64ddb56-5dt2v", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.86.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"caliebc373168f1", MAC:"8a:cb:ac:e4:7a:82", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:50:22.219330 env[1480]: 2025-05-17 00:50:22.214 [INFO][4536] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="3182a56ea9946ba5082e3e29fd441f6cf589a98ff0116cb3608dd30050fed381" Namespace="calico-apiserver" Pod="calico-apiserver-84c64ddb56-5dt2v" WorkloadEndpoint="ci--3510.3.7--n--4234abe502-k8s-calico--apiserver--84c64ddb56--5dt2v-eth0" May 17 00:50:22.238374 env[1480]: time="2025-05-17T00:50:22.238223304Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:50:22.238538 env[1480]: time="2025-05-17T00:50:22.238336266Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:50:22.238538 env[1480]: time="2025-05-17T00:50:22.238348226Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:50:22.238622 env[1480]: time="2025-05-17T00:50:22.238563150Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3fe75f67e59eb8ceb42c25b651f0c0f61478108befbc3f1dd795a5bcf4f067b9 pid=4627 runtime=io.containerd.runc.v2 May 17 00:50:22.259189 systemd[1]: Started cri-containerd-7d5e002c859f81690ff99a6e500dd76eac097f5717f4459a2c6f435d1d4c6bd7.scope. May 17 00:50:22.272000 audit[4647]: NETFILTER_CFG table=filter:114 family=2 entries=66 op=nft_register_chain pid=4647 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:50:22.272000 audit[4647]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=32960 a0=3 a1=ffffff726170 a2=0 a3=ffffac506fa8 items=0 ppid=4043 pid=4647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:22.272000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:50:22.295391 systemd[1]: Started cri-containerd-3fe75f67e59eb8ceb42c25b651f0c0f61478108befbc3f1dd795a5bcf4f067b9.scope. May 17 00:50:22.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:22.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:22.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:22.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:22.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:22.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:22.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:22.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:22.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:22.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:22.300000 audit: BPF prog-id=164 op=LOAD May 17 00:50:22.301000 audit[4606]: AVC avc: denied { bpf } for pid=4606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:22.301000 audit[4606]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4591 pid=4606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:22.301000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764356530303263383539663831363930666639396136653530306464 May 17 00:50:22.301000 audit[4606]: AVC avc: denied { perfmon } for pid=4606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:22.301000 audit[4606]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4591 pid=4606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:22.301000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764356530303263383539663831363930666639396136653530306464 May 17 00:50:22.302000 audit[4606]: AVC avc: denied { bpf } for pid=4606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:22.302000 audit[4606]: AVC avc: denied { bpf } for pid=4606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:22.302000 audit[4606]: AVC avc: denied { bpf } for pid=4606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:22.302000 audit[4606]: AVC avc: denied { perfmon } for pid=4606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:22.302000 audit[4606]: AVC avc: denied { perfmon } for pid=4606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:22.302000 audit[4606]: AVC avc: denied { perfmon } for pid=4606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:22.302000 audit[4606]: AVC avc: denied { perfmon } for pid=4606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:22.302000 audit[4606]: AVC avc: denied { perfmon } for pid=4606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:22.302000 audit[4606]: AVC avc: denied { bpf } for pid=4606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:22.302000 audit[4606]: AVC avc: denied { bpf } for pid=4606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:22.302000 audit: BPF prog-id=165 op=LOAD May 17 00:50:22.302000 audit[4606]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4591 pid=4606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:22.302000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764356530303263383539663831363930666639396136653530306464 May 17 00:50:22.302000 audit[4606]: AVC avc: denied { bpf } for pid=4606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:22.302000 audit[4606]: AVC avc: denied { bpf } for pid=4606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:22.302000 audit[4606]: AVC avc: denied { perfmon } for pid=4606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:22.302000 audit[4606]: AVC avc: denied { perfmon } for pid=4606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:22.302000 audit[4606]: AVC avc: denied { perfmon } for pid=4606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:22.302000 audit[4606]: AVC avc: denied { perfmon } for pid=4606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:22.302000 audit[4606]: AVC avc: denied { perfmon } for pid=4606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:22.302000 audit[4606]: AVC avc: denied { bpf } for pid=4606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:22.302000 audit[4606]: AVC avc: denied { bpf } for pid=4606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:22.302000 audit: BPF prog-id=166 op=LOAD May 17 00:50:22.302000 audit[4606]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4591 pid=4606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:22.302000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764356530303263383539663831363930666639396136653530306464 May 17 00:50:22.303000 audit: BPF prog-id=166 op=UNLOAD May 17 00:50:22.303000 audit: BPF prog-id=165 op=UNLOAD May 17 00:50:22.303000 audit[4606]: AVC avc: denied { bpf } for pid=4606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:22.303000 audit[4606]: AVC avc: denied { bpf } for pid=4606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:22.303000 audit[4606]: AVC avc: denied { bpf } for pid=4606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:22.303000 audit[4606]: AVC avc: denied { perfmon } for pid=4606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:22.303000 audit[4606]: AVC avc: denied { perfmon } for pid=4606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:22.303000 audit[4606]: AVC avc: denied { perfmon } for pid=4606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:22.303000 audit[4606]: AVC avc: denied { perfmon } for pid=4606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:22.303000 audit[4606]: AVC avc: denied { perfmon } for pid=4606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:22.303000 audit[4606]: AVC avc: denied { bpf } for pid=4606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:22.303000 audit[4606]: AVC avc: denied { bpf } for pid=4606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:22.303000 audit: BPF prog-id=167 op=LOAD May 17 00:50:22.303000 audit[4606]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4591 pid=4606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:22.303000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764356530303263383539663831363930666639396136653530306464 May 17 00:50:22.343000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:22.343000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:22.343000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:22.343000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:22.343000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:22.343000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:22.343000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:22.343000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:22.343000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:22.343000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:22.343000 audit: BPF prog-id=168 op=LOAD May 17 00:50:22.343509 systemd-networkd[1635]: cali72ba905362e: Link UP May 17 00:50:22.344000 audit[4640]: AVC avc: denied { bpf } for pid=4640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:22.344000 audit[4640]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=4627 pid=4640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:22.344000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366653735663637653539656238636562343263323562363531663063 May 17 00:50:22.344000 audit[4640]: AVC avc: denied { perfmon } for pid=4640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:22.344000 audit[4640]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=4627 pid=4640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:22.344000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366653735663637653539656238636562343263323562363531663063 May 17 00:50:22.344000 audit[4640]: AVC avc: denied { bpf } for pid=4640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:22.344000 audit[4640]: AVC avc: denied { bpf } for pid=4640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:22.344000 audit[4640]: AVC avc: denied { bpf } for pid=4640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:22.344000 audit[4640]: AVC avc: denied { perfmon } for pid=4640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:22.344000 audit[4640]: AVC avc: denied { perfmon } for pid=4640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:22.344000 audit[4640]: AVC avc: denied { perfmon } for pid=4640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:22.344000 audit[4640]: AVC avc: denied { perfmon } for pid=4640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:22.344000 audit[4640]: AVC avc: denied { perfmon } for pid=4640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:22.344000 audit[4640]: AVC avc: denied { bpf } for pid=4640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:22.344000 audit[4640]: AVC avc: denied { bpf } for pid=4640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:22.344000 audit: BPF prog-id=169 op=LOAD May 17 00:50:22.344000 audit[4640]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=4627 pid=4640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:22.344000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366653735663637653539656238636562343263323562363531663063 May 17 00:50:22.345000 audit[4640]: AVC avc: denied { bpf } for pid=4640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:22.345000 audit[4640]: AVC avc: denied { bpf } for pid=4640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:22.345000 audit[4640]: AVC avc: denied { perfmon } for pid=4640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:22.345000 audit[4640]: AVC avc: denied { perfmon } for pid=4640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:22.345000 audit[4640]: AVC avc: denied { perfmon } for pid=4640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:22.345000 audit[4640]: AVC avc: denied { perfmon } for pid=4640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:22.345000 audit[4640]: AVC avc: denied { perfmon } for pid=4640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:22.345000 audit[4640]: AVC avc: denied { bpf } for pid=4640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:22.345000 audit[4640]: AVC avc: denied { bpf } for pid=4640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:22.345000 audit: BPF prog-id=170 op=LOAD May 17 00:50:22.345000 audit[4640]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=4627 pid=4640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:22.345000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366653735663637653539656238636562343263323562363531663063 May 17 00:50:22.345000 audit: BPF prog-id=170 op=UNLOAD May 17 00:50:22.345000 audit: BPF prog-id=169 op=UNLOAD May 17 00:50:22.345000 audit[4640]: AVC avc: denied { bpf } for pid=4640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:22.345000 audit[4640]: AVC avc: denied { bpf } for pid=4640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:22.345000 audit[4640]: AVC avc: denied { bpf } for pid=4640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:22.345000 audit[4640]: AVC avc: denied { perfmon } for pid=4640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:22.345000 audit[4640]: AVC avc: denied { perfmon } for pid=4640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:22.345000 audit[4640]: AVC avc: denied { perfmon } for pid=4640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:22.345000 audit[4640]: AVC avc: denied { perfmon } for pid=4640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:22.345000 audit[4640]: AVC avc: denied { perfmon } for pid=4640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:22.345000 audit[4640]: AVC avc: denied { bpf } for pid=4640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:22.345000 audit[4640]: AVC avc: denied { bpf } for pid=4640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:22.345000 audit: BPF prog-id=171 op=LOAD May 17 00:50:22.345000 audit[4640]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=4627 pid=4640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:22.345000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366653735663637653539656238636562343263323562363531663063 May 17 00:50:22.355301 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali72ba905362e: link becomes ready May 17 00:50:22.355586 systemd-networkd[1635]: cali72ba905362e: Gained carrier May 17 00:50:22.359765 env[1480]: time="2025-05-17T00:50:22.359715819Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-cxrsr,Uid:c807ebf0-49df-4644-b8ed-52a104f87f64,Namespace:kube-system,Attempt:1,} returns sandbox id \"7d5e002c859f81690ff99a6e500dd76eac097f5717f4459a2c6f435d1d4c6bd7\"" May 17 00:50:22.384378 env[1480]: 2025-05-17 00:50:22.103 [INFO][4550] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--4234abe502-k8s-coredns--674b8bbfcf--j679t-eth0 coredns-674b8bbfcf- kube-system 91388974-d4b7-418c-97fd-7623f7fc5ad5 1039 0 2025-05-17 00:49:04 +0000 UTC map[k8s-app:kube-dns pod-template-hash:674b8bbfcf projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.7-n-4234abe502 coredns-674b8bbfcf-j679t eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali72ba905362e [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] [] }} ContainerID="bc9e9c14071efdcf7e33b44031799c0b1d9688d0324fb2e75f80cbe349c01178" Namespace="kube-system" Pod="coredns-674b8bbfcf-j679t" WorkloadEndpoint="ci--3510.3.7--n--4234abe502-k8s-coredns--674b8bbfcf--j679t-" May 17 00:50:22.384378 env[1480]: 2025-05-17 00:50:22.103 [INFO][4550] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="bc9e9c14071efdcf7e33b44031799c0b1d9688d0324fb2e75f80cbe349c01178" Namespace="kube-system" Pod="coredns-674b8bbfcf-j679t" WorkloadEndpoint="ci--3510.3.7--n--4234abe502-k8s-coredns--674b8bbfcf--j679t-eth0" May 17 00:50:22.384378 env[1480]: 2025-05-17 00:50:22.157 [INFO][4579] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="bc9e9c14071efdcf7e33b44031799c0b1d9688d0324fb2e75f80cbe349c01178" HandleID="k8s-pod-network.bc9e9c14071efdcf7e33b44031799c0b1d9688d0324fb2e75f80cbe349c01178" Workload="ci--3510.3.7--n--4234abe502-k8s-coredns--674b8bbfcf--j679t-eth0" May 17 00:50:22.384378 env[1480]: 2025-05-17 00:50:22.158 [INFO][4579] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="bc9e9c14071efdcf7e33b44031799c0b1d9688d0324fb2e75f80cbe349c01178" HandleID="k8s-pod-network.bc9e9c14071efdcf7e33b44031799c0b1d9688d0324fb2e75f80cbe349c01178" Workload="ci--3510.3.7--n--4234abe502-k8s-coredns--674b8bbfcf--j679t-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400022f900), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.7-n-4234abe502", "pod":"coredns-674b8bbfcf-j679t", "timestamp":"2025-05-17 00:50:22.157600128 +0000 UTC"}, Hostname:"ci-3510.3.7-n-4234abe502", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:50:22.384378 env[1480]: 2025-05-17 00:50:22.160 [INFO][4579] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:50:22.384378 env[1480]: 2025-05-17 00:50:22.173 [INFO][4579] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:50:22.384378 env[1480]: 2025-05-17 00:50:22.173 [INFO][4579] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-4234abe502' May 17 00:50:22.384378 env[1480]: 2025-05-17 00:50:22.236 [INFO][4579] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.bc9e9c14071efdcf7e33b44031799c0b1d9688d0324fb2e75f80cbe349c01178" host="ci-3510.3.7-n-4234abe502" May 17 00:50:22.384378 env[1480]: 2025-05-17 00:50:22.245 [INFO][4579] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.7-n-4234abe502" May 17 00:50:22.384378 env[1480]: 2025-05-17 00:50:22.262 [INFO][4579] ipam/ipam.go 511: Trying affinity for 192.168.86.192/26 host="ci-3510.3.7-n-4234abe502" May 17 00:50:22.384378 env[1480]: 2025-05-17 00:50:22.265 [INFO][4579] ipam/ipam.go 158: Attempting to load block cidr=192.168.86.192/26 host="ci-3510.3.7-n-4234abe502" May 17 00:50:22.384378 env[1480]: 2025-05-17 00:50:22.274 [INFO][4579] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.86.192/26 host="ci-3510.3.7-n-4234abe502" May 17 00:50:22.384378 env[1480]: 2025-05-17 00:50:22.274 [INFO][4579] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.86.192/26 handle="k8s-pod-network.bc9e9c14071efdcf7e33b44031799c0b1d9688d0324fb2e75f80cbe349c01178" host="ci-3510.3.7-n-4234abe502" May 17 00:50:22.384378 env[1480]: 2025-05-17 00:50:22.295 [INFO][4579] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.bc9e9c14071efdcf7e33b44031799c0b1d9688d0324fb2e75f80cbe349c01178 May 17 00:50:22.384378 env[1480]: 2025-05-17 00:50:22.304 [INFO][4579] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.86.192/26 handle="k8s-pod-network.bc9e9c14071efdcf7e33b44031799c0b1d9688d0324fb2e75f80cbe349c01178" host="ci-3510.3.7-n-4234abe502" May 17 00:50:22.384378 env[1480]: 2025-05-17 00:50:22.322 [INFO][4579] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.86.199/26] block=192.168.86.192/26 handle="k8s-pod-network.bc9e9c14071efdcf7e33b44031799c0b1d9688d0324fb2e75f80cbe349c01178" host="ci-3510.3.7-n-4234abe502" May 17 00:50:22.384378 env[1480]: 2025-05-17 00:50:22.322 [INFO][4579] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.86.199/26] handle="k8s-pod-network.bc9e9c14071efdcf7e33b44031799c0b1d9688d0324fb2e75f80cbe349c01178" host="ci-3510.3.7-n-4234abe502" May 17 00:50:22.384378 env[1480]: 2025-05-17 00:50:22.322 [INFO][4579] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:50:22.384378 env[1480]: 2025-05-17 00:50:22.322 [INFO][4579] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.86.199/26] IPv6=[] ContainerID="bc9e9c14071efdcf7e33b44031799c0b1d9688d0324fb2e75f80cbe349c01178" HandleID="k8s-pod-network.bc9e9c14071efdcf7e33b44031799c0b1d9688d0324fb2e75f80cbe349c01178" Workload="ci--3510.3.7--n--4234abe502-k8s-coredns--674b8bbfcf--j679t-eth0" May 17 00:50:22.384958 env[1480]: 2025-05-17 00:50:22.324 [INFO][4550] cni-plugin/k8s.go 418: Populated endpoint ContainerID="bc9e9c14071efdcf7e33b44031799c0b1d9688d0324fb2e75f80cbe349c01178" Namespace="kube-system" Pod="coredns-674b8bbfcf-j679t" WorkloadEndpoint="ci--3510.3.7--n--4234abe502-k8s-coredns--674b8bbfcf--j679t-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--4234abe502-k8s-coredns--674b8bbfcf--j679t-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"91388974-d4b7-418c-97fd-7623f7fc5ad5", ResourceVersion:"1039", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 49, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-4234abe502", ContainerID:"", Pod:"coredns-674b8bbfcf-j679t", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.86.199/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali72ba905362e", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:50:22.384958 env[1480]: 2025-05-17 00:50:22.324 [INFO][4550] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.86.199/32] ContainerID="bc9e9c14071efdcf7e33b44031799c0b1d9688d0324fb2e75f80cbe349c01178" Namespace="kube-system" Pod="coredns-674b8bbfcf-j679t" WorkloadEndpoint="ci--3510.3.7--n--4234abe502-k8s-coredns--674b8bbfcf--j679t-eth0" May 17 00:50:22.384958 env[1480]: 2025-05-17 00:50:22.324 [INFO][4550] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali72ba905362e ContainerID="bc9e9c14071efdcf7e33b44031799c0b1d9688d0324fb2e75f80cbe349c01178" Namespace="kube-system" Pod="coredns-674b8bbfcf-j679t" WorkloadEndpoint="ci--3510.3.7--n--4234abe502-k8s-coredns--674b8bbfcf--j679t-eth0" May 17 00:50:22.384958 env[1480]: 2025-05-17 00:50:22.345 [INFO][4550] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="bc9e9c14071efdcf7e33b44031799c0b1d9688d0324fb2e75f80cbe349c01178" Namespace="kube-system" Pod="coredns-674b8bbfcf-j679t" WorkloadEndpoint="ci--3510.3.7--n--4234abe502-k8s-coredns--674b8bbfcf--j679t-eth0" May 17 00:50:22.384958 env[1480]: 2025-05-17 00:50:22.357 [INFO][4550] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="bc9e9c14071efdcf7e33b44031799c0b1d9688d0324fb2e75f80cbe349c01178" Namespace="kube-system" Pod="coredns-674b8bbfcf-j679t" WorkloadEndpoint="ci--3510.3.7--n--4234abe502-k8s-coredns--674b8bbfcf--j679t-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--4234abe502-k8s-coredns--674b8bbfcf--j679t-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"91388974-d4b7-418c-97fd-7623f7fc5ad5", ResourceVersion:"1039", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 49, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-4234abe502", ContainerID:"bc9e9c14071efdcf7e33b44031799c0b1d9688d0324fb2e75f80cbe349c01178", Pod:"coredns-674b8bbfcf-j679t", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.86.199/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali72ba905362e", MAC:"4e:bd:ef:e8:40:ff", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:50:22.384958 env[1480]: 2025-05-17 00:50:22.380 [INFO][4550] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="bc9e9c14071efdcf7e33b44031799c0b1d9688d0324fb2e75f80cbe349c01178" Namespace="kube-system" Pod="coredns-674b8bbfcf-j679t" WorkloadEndpoint="ci--3510.3.7--n--4234abe502-k8s-coredns--674b8bbfcf--j679t-eth0" May 17 00:50:22.396000 audit[4682]: NETFILTER_CFG table=filter:115 family=2 entries=58 op=nft_register_chain pid=4682 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:50:22.396000 audit[4682]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=26760 a0=3 a1=ffffdbc81790 a2=0 a3=ffffa5d6dfa8 items=0 ppid=4043 pid=4682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:22.396000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:50:22.400479 env[1480]: time="2025-05-17T00:50:22.400430394Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-647fb858cc-jtf2c,Uid:cfe725ea-fbe7-42b1-b5de-fc1e1a86ac51,Namespace:calico-system,Attempt:1,} returns sandbox id \"3fe75f67e59eb8ceb42c25b651f0c0f61478108befbc3f1dd795a5bcf4f067b9\"" May 17 00:50:23.133443 systemd-networkd[1635]: cali5c1c43afae2: Gained IPv6LL May 17 00:50:23.966395 systemd-networkd[1635]: caliebc373168f1: Gained IPv6LL May 17 00:50:24.043917 env[1480]: time="2025-05-17T00:50:24.043727586Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:50:24.043917 env[1480]: time="2025-05-17T00:50:24.043775666Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:50:24.043917 env[1480]: time="2025-05-17T00:50:24.043789027Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:50:24.044521 env[1480]: time="2025-05-17T00:50:24.044438918Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8ca17f80f60f18caf2af4ec3f51c89b5e4ffb37f1647f79ed391c689ee788670 pid=4696 runtime=io.containerd.runc.v2 May 17 00:50:24.085811 systemd[1]: run-containerd-runc-k8s.io-8ca17f80f60f18caf2af4ec3f51c89b5e4ffb37f1647f79ed391c689ee788670-runc.YD6q6o.mount: Deactivated successfully. May 17 00:50:24.090102 systemd[1]: Started cri-containerd-8ca17f80f60f18caf2af4ec3f51c89b5e4ffb37f1647f79ed391c689ee788670.scope. May 17 00:50:24.100393 env[1480]: time="2025-05-17T00:50:24.100347835Z" level=info msg="CreateContainer within sandbox \"7d5e002c859f81690ff99a6e500dd76eac097f5717f4459a2c6f435d1d4c6bd7\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 17 00:50:24.218763 kernel: kauditd_printk_skb: 179 callbacks suppressed May 17 00:50:24.218909 kernel: audit: type=1400 audit(1747443024.213:1128): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.236753 systemd-networkd[1635]: cali72ba905362e: Gained IPv6LL May 17 00:50:24.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.259012 kernel: audit: type=1400 audit(1747443024.213:1129): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.281196 kernel: audit: type=1400 audit(1747443024.213:1130): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.305543 kernel: audit: type=1400 audit(1747443024.213:1131): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.323870 kernel: audit: type=1400 audit(1747443024.213:1132): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.343202 kernel: audit: type=1400 audit(1747443024.213:1133): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.343399 kernel: audit: type=1400 audit(1747443024.213:1134): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.381289 kernel: audit: type=1400 audit(1747443024.213:1135): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.399700 kernel: audit: type=1400 audit(1747443024.213:1136): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.419861 kernel: audit: type=1400 audit(1747443024.218:1137): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.219000 audit: BPF prog-id=172 op=LOAD May 17 00:50:24.237000 audit[4705]: AVC avc: denied { bpf } for pid=4705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.237000 audit[4705]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4696 pid=4705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:24.237000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863613137663830663630663138636166326166346563336635316338 May 17 00:50:24.237000 audit[4705]: AVC avc: denied { perfmon } for pid=4705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.237000 audit[4705]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4696 pid=4705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:24.237000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863613137663830663630663138636166326166346563336635316338 May 17 00:50:24.237000 audit[4705]: AVC avc: denied { bpf } for pid=4705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.237000 audit[4705]: AVC avc: denied { bpf } for pid=4705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.237000 audit[4705]: AVC avc: denied { bpf } for pid=4705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.237000 audit[4705]: AVC avc: denied { perfmon } for pid=4705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.237000 audit[4705]: AVC avc: denied { perfmon } for pid=4705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.237000 audit[4705]: AVC avc: denied { perfmon } for pid=4705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.237000 audit[4705]: AVC avc: denied { perfmon } for pid=4705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.237000 audit[4705]: AVC avc: denied { perfmon } for pid=4705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.237000 audit[4705]: AVC avc: denied { bpf } for pid=4705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.237000 audit[4705]: AVC avc: denied { bpf } for pid=4705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.237000 audit: BPF prog-id=173 op=LOAD May 17 00:50:24.237000 audit[4705]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4696 pid=4705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:24.237000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863613137663830663630663138636166326166346563336635316338 May 17 00:50:24.238000 audit[4705]: AVC avc: denied { bpf } for pid=4705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.238000 audit[4705]: AVC avc: denied { bpf } for pid=4705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.238000 audit[4705]: AVC avc: denied { perfmon } for pid=4705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.238000 audit[4705]: AVC avc: denied { perfmon } for pid=4705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.238000 audit[4705]: AVC avc: denied { perfmon } for pid=4705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.238000 audit[4705]: AVC avc: denied { perfmon } for pid=4705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.238000 audit[4705]: AVC avc: denied { perfmon } for pid=4705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.238000 audit[4705]: AVC avc: denied { bpf } for pid=4705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.238000 audit[4705]: AVC avc: denied { bpf } for pid=4705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.238000 audit: BPF prog-id=174 op=LOAD May 17 00:50:24.238000 audit[4705]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4696 pid=4705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:24.238000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863613137663830663630663138636166326166346563336635316338 May 17 00:50:24.238000 audit: BPF prog-id=174 op=UNLOAD May 17 00:50:24.238000 audit: BPF prog-id=173 op=UNLOAD May 17 00:50:24.238000 audit[4705]: AVC avc: denied { bpf } for pid=4705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.238000 audit[4705]: AVC avc: denied { bpf } for pid=4705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.238000 audit[4705]: AVC avc: denied { bpf } for pid=4705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.238000 audit[4705]: AVC avc: denied { perfmon } for pid=4705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.238000 audit[4705]: AVC avc: denied { perfmon } for pid=4705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.238000 audit[4705]: AVC avc: denied { perfmon } for pid=4705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.238000 audit[4705]: AVC avc: denied { perfmon } for pid=4705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.238000 audit[4705]: AVC avc: denied { perfmon } for pid=4705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.238000 audit[4705]: AVC avc: denied { bpf } for pid=4705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.238000 audit[4705]: AVC avc: denied { bpf } for pid=4705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.238000 audit: BPF prog-id=175 op=LOAD May 17 00:50:24.238000 audit[4705]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4696 pid=4705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:24.238000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863613137663830663630663138636166326166346563336635316338 May 17 00:50:24.429108 env[1480]: time="2025-05-17T00:50:24.429059695Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-78d55f7ddc-pmkbg,Uid:85f144ac-4d39-496d-b3d5-66149a1574d7,Namespace:calico-system,Attempt:1,} returns sandbox id \"8ca17f80f60f18caf2af4ec3f51c89b5e4ffb37f1647f79ed391c689ee788670\"" May 17 00:50:24.800966 env[1480]: time="2025-05-17T00:50:24.800878883Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:50:24.800966 env[1480]: time="2025-05-17T00:50:24.800922604Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:50:24.800966 env[1480]: time="2025-05-17T00:50:24.800934164Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:50:24.801414 env[1480]: time="2025-05-17T00:50:24.801367852Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3182a56ea9946ba5082e3e29fd441f6cf589a98ff0116cb3608dd30050fed381 pid=4737 runtime=io.containerd.runc.v2 May 17 00:50:24.817308 systemd[1]: Started cri-containerd-3182a56ea9946ba5082e3e29fd441f6cf589a98ff0116cb3608dd30050fed381.scope. May 17 00:50:24.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.831000 audit: BPF prog-id=176 op=LOAD May 17 00:50:24.831000 audit[4746]: AVC avc: denied { bpf } for pid=4746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.831000 audit[4746]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4737 pid=4746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:24.831000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331383261353665613939343662613530383265336532396664343431 May 17 00:50:24.831000 audit[4746]: AVC avc: denied { perfmon } for pid=4746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.831000 audit[4746]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4737 pid=4746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:24.831000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331383261353665613939343662613530383265336532396664343431 May 17 00:50:24.831000 audit[4746]: AVC avc: denied { bpf } for pid=4746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.831000 audit[4746]: AVC avc: denied { bpf } for pid=4746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.831000 audit[4746]: AVC avc: denied { bpf } for pid=4746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.831000 audit[4746]: AVC avc: denied { perfmon } for pid=4746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.831000 audit[4746]: AVC avc: denied { perfmon } for pid=4746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.831000 audit[4746]: AVC avc: denied { perfmon } for pid=4746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.831000 audit[4746]: AVC avc: denied { perfmon } for pid=4746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.831000 audit[4746]: AVC avc: denied { perfmon } for pid=4746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.831000 audit[4746]: AVC avc: denied { bpf } for pid=4746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.831000 audit[4746]: AVC avc: denied { bpf } for pid=4746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.831000 audit: BPF prog-id=177 op=LOAD May 17 00:50:24.831000 audit[4746]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4737 pid=4746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:24.831000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331383261353665613939343662613530383265336532396664343431 May 17 00:50:24.831000 audit[4746]: AVC avc: denied { bpf } for pid=4746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.831000 audit[4746]: AVC avc: denied { bpf } for pid=4746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.831000 audit[4746]: AVC avc: denied { perfmon } for pid=4746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.831000 audit[4746]: AVC avc: denied { perfmon } for pid=4746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.831000 audit[4746]: AVC avc: denied { perfmon } for pid=4746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.831000 audit[4746]: AVC avc: denied { perfmon } for pid=4746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.831000 audit[4746]: AVC avc: denied { perfmon } for pid=4746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.831000 audit[4746]: AVC avc: denied { bpf } for pid=4746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.831000 audit[4746]: AVC avc: denied { bpf } for pid=4746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.831000 audit: BPF prog-id=178 op=LOAD May 17 00:50:24.831000 audit[4746]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4737 pid=4746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:24.831000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331383261353665613939343662613530383265336532396664343431 May 17 00:50:24.831000 audit: BPF prog-id=178 op=UNLOAD May 17 00:50:24.831000 audit: BPF prog-id=177 op=UNLOAD May 17 00:50:24.831000 audit[4746]: AVC avc: denied { bpf } for pid=4746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.831000 audit[4746]: AVC avc: denied { bpf } for pid=4746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.831000 audit[4746]: AVC avc: denied { bpf } for pid=4746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.831000 audit[4746]: AVC avc: denied { perfmon } for pid=4746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.831000 audit[4746]: AVC avc: denied { perfmon } for pid=4746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.831000 audit[4746]: AVC avc: denied { perfmon } for pid=4746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.831000 audit[4746]: AVC avc: denied { perfmon } for pid=4746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.831000 audit[4746]: AVC avc: denied { perfmon } for pid=4746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.831000 audit[4746]: AVC avc: denied { bpf } for pid=4746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.831000 audit[4746]: AVC avc: denied { bpf } for pid=4746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.831000 audit: BPF prog-id=179 op=LOAD May 17 00:50:24.831000 audit[4746]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4737 pid=4746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:24.831000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331383261353665613939343662613530383265336532396664343431 May 17 00:50:24.852730 env[1480]: time="2025-05-17T00:50:24.852688887Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-84c64ddb56-5dt2v,Uid:da20061a-c164-4dad-aec7-b54414ff9706,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"3182a56ea9946ba5082e3e29fd441f6cf589a98ff0116cb3608dd30050fed381\"" May 17 00:50:24.869561 env[1480]: time="2025-05-17T00:50:24.868359086Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:50:24.869561 env[1480]: time="2025-05-17T00:50:24.868403767Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:50:24.869561 env[1480]: time="2025-05-17T00:50:24.868414727Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:50:24.869561 env[1480]: time="2025-05-17T00:50:24.868817015Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bc9e9c14071efdcf7e33b44031799c0b1d9688d0324fb2e75f80cbe349c01178 pid=4780 runtime=io.containerd.runc.v2 May 17 00:50:24.885016 systemd[1]: Started cri-containerd-bc9e9c14071efdcf7e33b44031799c0b1d9688d0324fb2e75f80cbe349c01178.scope. May 17 00:50:24.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.903000 audit: BPF prog-id=180 op=LOAD May 17 00:50:24.903000 audit[4790]: AVC avc: denied { bpf } for pid=4790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.903000 audit[4790]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4780 pid=4790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:24.903000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263396539633134303731656664636637653333623434303331373939 May 17 00:50:24.904000 audit[4790]: AVC avc: denied { perfmon } for pid=4790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.904000 audit[4790]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4780 pid=4790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:24.904000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263396539633134303731656664636637653333623434303331373939 May 17 00:50:24.905000 audit[4790]: AVC avc: denied { bpf } for pid=4790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.905000 audit[4790]: AVC avc: denied { bpf } for pid=4790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.905000 audit[4790]: AVC avc: denied { bpf } for pid=4790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.905000 audit[4790]: AVC avc: denied { perfmon } for pid=4790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.905000 audit[4790]: AVC avc: denied { perfmon } for pid=4790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.905000 audit[4790]: AVC avc: denied { perfmon } for pid=4790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.905000 audit[4790]: AVC avc: denied { perfmon } for pid=4790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.905000 audit[4790]: AVC avc: denied { perfmon } for pid=4790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.905000 audit[4790]: AVC avc: denied { bpf } for pid=4790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.905000 audit[4790]: AVC avc: denied { bpf } for pid=4790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.905000 audit: BPF prog-id=181 op=LOAD May 17 00:50:24.905000 audit[4790]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4780 pid=4790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:24.905000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263396539633134303731656664636637653333623434303331373939 May 17 00:50:24.907000 audit[4790]: AVC avc: denied { bpf } for pid=4790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.907000 audit[4790]: AVC avc: denied { bpf } for pid=4790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.907000 audit[4790]: AVC avc: denied { perfmon } for pid=4790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.907000 audit[4790]: AVC avc: denied { perfmon } for pid=4790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.907000 audit[4790]: AVC avc: denied { perfmon } for pid=4790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.907000 audit[4790]: AVC avc: denied { perfmon } for pid=4790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.907000 audit[4790]: AVC avc: denied { perfmon } for pid=4790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.907000 audit[4790]: AVC avc: denied { bpf } for pid=4790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.907000 audit[4790]: AVC avc: denied { bpf } for pid=4790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.907000 audit: BPF prog-id=182 op=LOAD May 17 00:50:24.907000 audit[4790]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4780 pid=4790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:24.907000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263396539633134303731656664636637653333623434303331373939 May 17 00:50:24.909000 audit: BPF prog-id=182 op=UNLOAD May 17 00:50:24.909000 audit: BPF prog-id=181 op=UNLOAD May 17 00:50:24.909000 audit[4790]: AVC avc: denied { bpf } for pid=4790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.909000 audit[4790]: AVC avc: denied { bpf } for pid=4790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.909000 audit[4790]: AVC avc: denied { bpf } for pid=4790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.909000 audit[4790]: AVC avc: denied { perfmon } for pid=4790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.909000 audit[4790]: AVC avc: denied { perfmon } for pid=4790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.909000 audit[4790]: AVC avc: denied { perfmon } for pid=4790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.909000 audit[4790]: AVC avc: denied { perfmon } for pid=4790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.909000 audit[4790]: AVC avc: denied { perfmon } for pid=4790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.909000 audit[4790]: AVC avc: denied { bpf } for pid=4790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.909000 audit[4790]: AVC avc: denied { bpf } for pid=4790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:24.909000 audit: BPF prog-id=183 op=LOAD May 17 00:50:24.909000 audit[4790]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4780 pid=4790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:24.909000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263396539633134303731656664636637653333623434303331373939 May 17 00:50:24.929195 env[1480]: time="2025-05-17T00:50:24.927876947Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-j679t,Uid:91388974-d4b7-418c-97fd-7623f7fc5ad5,Namespace:kube-system,Attempt:1,} returns sandbox id \"bc9e9c14071efdcf7e33b44031799c0b1d9688d0324fb2e75f80cbe349c01178\"" May 17 00:50:25.002372 env[1480]: time="2025-05-17T00:50:25.002322674Z" level=info msg="CreateContainer within sandbox \"bc9e9c14071efdcf7e33b44031799c0b1d9688d0324fb2e75f80cbe349c01178\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 17 00:50:25.852312 env[1480]: time="2025-05-17T00:50:25.852260491Z" level=info msg="CreateContainer within sandbox \"bc9e9c14071efdcf7e33b44031799c0b1d9688d0324fb2e75f80cbe349c01178\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"b1d78c1aae98ca8941d5ae2389c94ff43382d48160c182a26f2c6e9cd8b06ed0\"" May 17 00:50:25.853705 env[1480]: time="2025-05-17T00:50:25.853642876Z" level=info msg="StartContainer for \"b1d78c1aae98ca8941d5ae2389c94ff43382d48160c182a26f2c6e9cd8b06ed0\"" May 17 00:50:25.885643 systemd[1]: Started cri-containerd-b1d78c1aae98ca8941d5ae2389c94ff43382d48160c182a26f2c6e9cd8b06ed0.scope. May 17 00:50:25.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:25.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:25.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:25.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:25.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:25.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:25.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:25.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:25.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:25.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:25.903000 audit: BPF prog-id=184 op=LOAD May 17 00:50:25.923550 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:50:25.923662 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5bc0762f53e: link becomes ready May 17 00:50:25.923903 systemd-networkd[1635]: cali5bc0762f53e: Link UP May 17 00:50:25.924000 audit[4843]: AVC avc: denied { bpf } for pid=4843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:25.924000 audit[4843]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=4780 pid=4843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:25.924000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231643738633161616539386361383934316435616532333839633934 May 17 00:50:25.924000 audit[4843]: AVC avc: denied { perfmon } for pid=4843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:25.924000 audit[4843]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=4780 pid=4843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:25.924000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231643738633161616539386361383934316435616532333839633934 May 17 00:50:25.925000 audit[4843]: AVC avc: denied { bpf } for pid=4843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:25.925000 audit[4843]: AVC avc: denied { bpf } for pid=4843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:25.925000 audit[4843]: AVC avc: denied { bpf } for pid=4843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:25.925000 audit[4843]: AVC avc: denied { perfmon } for pid=4843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:25.925000 audit[4843]: AVC avc: denied { perfmon } for pid=4843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:25.925000 audit[4843]: AVC avc: denied { perfmon } for pid=4843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:25.925000 audit[4843]: AVC avc: denied { perfmon } for pid=4843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:25.925000 audit[4843]: AVC avc: denied { perfmon } for pid=4843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:25.925000 audit[4843]: AVC avc: denied { bpf } for pid=4843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:25.925000 audit[4843]: AVC avc: denied { bpf } for pid=4843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:25.927320 systemd-networkd[1635]: cali5bc0762f53e: Gained carrier May 17 00:50:25.925000 audit: BPF prog-id=185 op=LOAD May 17 00:50:25.925000 audit[4843]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=4780 pid=4843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:25.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231643738633161616539386361383934316435616532333839633934 May 17 00:50:25.928000 audit[4843]: AVC avc: denied { bpf } for pid=4843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:25.928000 audit[4843]: AVC avc: denied { bpf } for pid=4843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:25.928000 audit[4843]: AVC avc: denied { perfmon } for pid=4843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:25.928000 audit[4843]: AVC avc: denied { perfmon } for pid=4843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:25.928000 audit[4843]: AVC avc: denied { perfmon } for pid=4843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:25.928000 audit[4843]: AVC avc: denied { perfmon } for pid=4843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:25.928000 audit[4843]: AVC avc: denied { perfmon } for pid=4843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:25.928000 audit[4843]: AVC avc: denied { bpf } for pid=4843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:25.928000 audit[4843]: AVC avc: denied { bpf } for pid=4843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:25.928000 audit: BPF prog-id=186 op=LOAD May 17 00:50:25.928000 audit[4843]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=4780 pid=4843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:25.928000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231643738633161616539386361383934316435616532333839633934 May 17 00:50:25.928000 audit: BPF prog-id=186 op=UNLOAD May 17 00:50:25.928000 audit: BPF prog-id=185 op=UNLOAD May 17 00:50:25.928000 audit[4843]: AVC avc: denied { bpf } for pid=4843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:25.928000 audit[4843]: AVC avc: denied { bpf } for pid=4843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:25.928000 audit[4843]: AVC avc: denied { bpf } for pid=4843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:25.928000 audit[4843]: AVC avc: denied { perfmon } for pid=4843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:25.928000 audit[4843]: AVC avc: denied { perfmon } for pid=4843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:25.928000 audit[4843]: AVC avc: denied { perfmon } for pid=4843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:25.928000 audit[4843]: AVC avc: denied { perfmon } for pid=4843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:25.928000 audit[4843]: AVC avc: denied { perfmon } for pid=4843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:25.928000 audit[4843]: AVC avc: denied { bpf } for pid=4843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:25.928000 audit[4843]: AVC avc: denied { bpf } for pid=4843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:25.928000 audit: BPF prog-id=187 op=LOAD May 17 00:50:25.928000 audit[4843]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=4780 pid=4843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:25.928000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231643738633161616539386361383934316435616532333839633934 May 17 00:50:25.962016 env[1480]: 2025-05-17 00:50:25.779 [INFO][4815] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--4234abe502-k8s-calico--apiserver--84c64ddb56--27tsz-eth0 calico-apiserver-84c64ddb56- calico-apiserver 072e45c7-a564-4ff1-8f56-8086de5cb47f 1057 0 2025-05-17 00:49:18 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:84c64ddb56 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.7-n-4234abe502 calico-apiserver-84c64ddb56-27tsz eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali5bc0762f53e [] [] }} ContainerID="5646210db81d6961dfb04dcbdfce1e656b59480b0ab5126211bef0adcacf875b" Namespace="calico-apiserver" Pod="calico-apiserver-84c64ddb56-27tsz" WorkloadEndpoint="ci--3510.3.7--n--4234abe502-k8s-calico--apiserver--84c64ddb56--27tsz-" May 17 00:50:25.962016 env[1480]: 2025-05-17 00:50:25.779 [INFO][4815] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="5646210db81d6961dfb04dcbdfce1e656b59480b0ab5126211bef0adcacf875b" Namespace="calico-apiserver" Pod="calico-apiserver-84c64ddb56-27tsz" WorkloadEndpoint="ci--3510.3.7--n--4234abe502-k8s-calico--apiserver--84c64ddb56--27tsz-eth0" May 17 00:50:25.962016 env[1480]: 2025-05-17 00:50:25.803 [INFO][4828] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="5646210db81d6961dfb04dcbdfce1e656b59480b0ab5126211bef0adcacf875b" HandleID="k8s-pod-network.5646210db81d6961dfb04dcbdfce1e656b59480b0ab5126211bef0adcacf875b" Workload="ci--3510.3.7--n--4234abe502-k8s-calico--apiserver--84c64ddb56--27tsz-eth0" May 17 00:50:25.962016 env[1480]: 2025-05-17 00:50:25.850 [INFO][4828] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="5646210db81d6961dfb04dcbdfce1e656b59480b0ab5126211bef0adcacf875b" HandleID="k8s-pod-network.5646210db81d6961dfb04dcbdfce1e656b59480b0ab5126211bef0adcacf875b" Workload="ci--3510.3.7--n--4234abe502-k8s-calico--apiserver--84c64ddb56--27tsz-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002d7050), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.7-n-4234abe502", "pod":"calico-apiserver-84c64ddb56-27tsz", "timestamp":"2025-05-17 00:50:25.803585829 +0000 UTC"}, Hostname:"ci-3510.3.7-n-4234abe502", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:50:25.962016 env[1480]: 2025-05-17 00:50:25.850 [INFO][4828] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:50:25.962016 env[1480]: 2025-05-17 00:50:25.850 [INFO][4828] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:50:25.962016 env[1480]: 2025-05-17 00:50:25.850 [INFO][4828] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-4234abe502' May 17 00:50:25.962016 env[1480]: 2025-05-17 00:50:25.865 [INFO][4828] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.5646210db81d6961dfb04dcbdfce1e656b59480b0ab5126211bef0adcacf875b" host="ci-3510.3.7-n-4234abe502" May 17 00:50:25.962016 env[1480]: 2025-05-17 00:50:25.869 [INFO][4828] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.7-n-4234abe502" May 17 00:50:25.962016 env[1480]: 2025-05-17 00:50:25.874 [INFO][4828] ipam/ipam.go 511: Trying affinity for 192.168.86.192/26 host="ci-3510.3.7-n-4234abe502" May 17 00:50:25.962016 env[1480]: 2025-05-17 00:50:25.875 [INFO][4828] ipam/ipam.go 158: Attempting to load block cidr=192.168.86.192/26 host="ci-3510.3.7-n-4234abe502" May 17 00:50:25.962016 env[1480]: 2025-05-17 00:50:25.878 [INFO][4828] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.86.192/26 host="ci-3510.3.7-n-4234abe502" May 17 00:50:25.962016 env[1480]: 2025-05-17 00:50:25.878 [INFO][4828] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.86.192/26 handle="k8s-pod-network.5646210db81d6961dfb04dcbdfce1e656b59480b0ab5126211bef0adcacf875b" host="ci-3510.3.7-n-4234abe502" May 17 00:50:25.962016 env[1480]: 2025-05-17 00:50:25.879 [INFO][4828] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.5646210db81d6961dfb04dcbdfce1e656b59480b0ab5126211bef0adcacf875b May 17 00:50:25.962016 env[1480]: 2025-05-17 00:50:25.892 [INFO][4828] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.86.192/26 handle="k8s-pod-network.5646210db81d6961dfb04dcbdfce1e656b59480b0ab5126211bef0adcacf875b" host="ci-3510.3.7-n-4234abe502" May 17 00:50:25.962016 env[1480]: 2025-05-17 00:50:25.902 [INFO][4828] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.86.200/26] block=192.168.86.192/26 handle="k8s-pod-network.5646210db81d6961dfb04dcbdfce1e656b59480b0ab5126211bef0adcacf875b" host="ci-3510.3.7-n-4234abe502" May 17 00:50:25.962016 env[1480]: 2025-05-17 00:50:25.903 [INFO][4828] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.86.200/26] handle="k8s-pod-network.5646210db81d6961dfb04dcbdfce1e656b59480b0ab5126211bef0adcacf875b" host="ci-3510.3.7-n-4234abe502" May 17 00:50:25.962016 env[1480]: 2025-05-17 00:50:25.903 [INFO][4828] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:50:25.962016 env[1480]: 2025-05-17 00:50:25.903 [INFO][4828] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.86.200/26] IPv6=[] ContainerID="5646210db81d6961dfb04dcbdfce1e656b59480b0ab5126211bef0adcacf875b" HandleID="k8s-pod-network.5646210db81d6961dfb04dcbdfce1e656b59480b0ab5126211bef0adcacf875b" Workload="ci--3510.3.7--n--4234abe502-k8s-calico--apiserver--84c64ddb56--27tsz-eth0" May 17 00:50:25.962730 env[1480]: 2025-05-17 00:50:25.907 [INFO][4815] cni-plugin/k8s.go 418: Populated endpoint ContainerID="5646210db81d6961dfb04dcbdfce1e656b59480b0ab5126211bef0adcacf875b" Namespace="calico-apiserver" Pod="calico-apiserver-84c64ddb56-27tsz" WorkloadEndpoint="ci--3510.3.7--n--4234abe502-k8s-calico--apiserver--84c64ddb56--27tsz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--4234abe502-k8s-calico--apiserver--84c64ddb56--27tsz-eth0", GenerateName:"calico-apiserver-84c64ddb56-", Namespace:"calico-apiserver", SelfLink:"", UID:"072e45c7-a564-4ff1-8f56-8086de5cb47f", ResourceVersion:"1057", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 49, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"84c64ddb56", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-4234abe502", ContainerID:"", Pod:"calico-apiserver-84c64ddb56-27tsz", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.86.200/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali5bc0762f53e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:50:25.962730 env[1480]: 2025-05-17 00:50:25.907 [INFO][4815] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.86.200/32] ContainerID="5646210db81d6961dfb04dcbdfce1e656b59480b0ab5126211bef0adcacf875b" Namespace="calico-apiserver" Pod="calico-apiserver-84c64ddb56-27tsz" WorkloadEndpoint="ci--3510.3.7--n--4234abe502-k8s-calico--apiserver--84c64ddb56--27tsz-eth0" May 17 00:50:25.962730 env[1480]: 2025-05-17 00:50:25.907 [INFO][4815] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5bc0762f53e ContainerID="5646210db81d6961dfb04dcbdfce1e656b59480b0ab5126211bef0adcacf875b" Namespace="calico-apiserver" Pod="calico-apiserver-84c64ddb56-27tsz" WorkloadEndpoint="ci--3510.3.7--n--4234abe502-k8s-calico--apiserver--84c64ddb56--27tsz-eth0" May 17 00:50:25.962730 env[1480]: 2025-05-17 00:50:25.928 [INFO][4815] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="5646210db81d6961dfb04dcbdfce1e656b59480b0ab5126211bef0adcacf875b" Namespace="calico-apiserver" Pod="calico-apiserver-84c64ddb56-27tsz" WorkloadEndpoint="ci--3510.3.7--n--4234abe502-k8s-calico--apiserver--84c64ddb56--27tsz-eth0" May 17 00:50:25.962730 env[1480]: 2025-05-17 00:50:25.935 [INFO][4815] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="5646210db81d6961dfb04dcbdfce1e656b59480b0ab5126211bef0adcacf875b" Namespace="calico-apiserver" Pod="calico-apiserver-84c64ddb56-27tsz" WorkloadEndpoint="ci--3510.3.7--n--4234abe502-k8s-calico--apiserver--84c64ddb56--27tsz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--4234abe502-k8s-calico--apiserver--84c64ddb56--27tsz-eth0", GenerateName:"calico-apiserver-84c64ddb56-", Namespace:"calico-apiserver", SelfLink:"", UID:"072e45c7-a564-4ff1-8f56-8086de5cb47f", ResourceVersion:"1057", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 49, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"84c64ddb56", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-4234abe502", ContainerID:"5646210db81d6961dfb04dcbdfce1e656b59480b0ab5126211bef0adcacf875b", Pod:"calico-apiserver-84c64ddb56-27tsz", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.86.200/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali5bc0762f53e", MAC:"9a:aa:e4:6c:79:0a", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:50:25.962730 env[1480]: 2025-05-17 00:50:25.958 [INFO][4815] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="5646210db81d6961dfb04dcbdfce1e656b59480b0ab5126211bef0adcacf875b" Namespace="calico-apiserver" Pod="calico-apiserver-84c64ddb56-27tsz" WorkloadEndpoint="ci--3510.3.7--n--4234abe502-k8s-calico--apiserver--84c64ddb56--27tsz-eth0" May 17 00:50:25.977000 audit[4873]: NETFILTER_CFG table=filter:116 family=2 entries=63 op=nft_register_chain pid=4873 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:50:25.977000 audit[4873]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=30664 a0=3 a1=fffffc5ec630 a2=0 a3=ffff90041fa8 items=0 ppid=4043 pid=4873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:25.977000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:50:25.987000 audit[4854]: AVC avc: denied { getattr } for pid=4854 comm="coredns" path="cgroup:[4026532679]" dev="nsfs" ino=4026532679 scontext=system_u:system_r:svirt_lxc_net_t:s0:c530,c603 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 May 17 00:50:25.987000 audit[4854]: SYSCALL arch=c00000b7 syscall=79 success=no exit=-13 a0=ffffffffffffff9c a1=4000056ac8 a2=40000ea578 a3=0 items=0 ppid=4780 pid=4854 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c530,c603 key=(null) May 17 00:50:25.987000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 May 17 00:50:27.741405 systemd-networkd[1635]: cali5bc0762f53e: Gained IPv6LL May 17 00:50:27.744864 env[1480]: time="2025-05-17T00:50:27.744799551Z" level=info msg="StartContainer for \"b1d78c1aae98ca8941d5ae2389c94ff43382d48160c182a26f2c6e9cd8b06ed0\" returns successfully" May 17 00:50:28.769985 kubelet[2537]: I0517 00:50:28.769919 2537 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-674b8bbfcf-j679t" podStartSLOduration=84.769890294 podStartE2EDuration="1m24.769890294s" podCreationTimestamp="2025-05-17 00:49:04 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:50:28.768410028 +0000 UTC m=+87.760406983" watchObservedRunningTime="2025-05-17 00:50:28.769890294 +0000 UTC m=+87.761887249" May 17 00:50:28.800000 audit[4886]: NETFILTER_CFG table=filter:117 family=2 entries=20 op=nft_register_rule pid=4886 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:50:28.800000 audit[4886]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=7480 a0=3 a1=fffff708ddc0 a2=0 a3=1 items=0 ppid=2686 pid=4886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:28.800000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:50:28.804000 audit[4886]: NETFILTER_CFG table=nat:118 family=2 entries=14 op=nft_register_rule pid=4886 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:50:28.804000 audit[4886]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3468 a0=3 a1=fffff708ddc0 a2=0 a3=1 items=0 ppid=2686 pid=4886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:28.804000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:50:29.215263 env[1480]: time="2025-05-17T00:50:29.215003338Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:50:29.215263 env[1480]: time="2025-05-17T00:50:29.215053339Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:50:29.215263 env[1480]: time="2025-05-17T00:50:29.215065699Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:50:29.215852 env[1480]: time="2025-05-17T00:50:29.215770671Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5646210db81d6961dfb04dcbdfce1e656b59480b0ab5126211bef0adcacf875b pid=4895 runtime=io.containerd.runc.v2 May 17 00:50:29.242006 systemd[1]: run-containerd-runc-k8s.io-5646210db81d6961dfb04dcbdfce1e656b59480b0ab5126211bef0adcacf875b-runc.RTpnCH.mount: Deactivated successfully. May 17 00:50:29.246968 systemd[1]: Started cri-containerd-5646210db81d6961dfb04dcbdfce1e656b59480b0ab5126211bef0adcacf875b.scope. May 17 00:50:29.270263 kernel: kauditd_printk_skb: 230 callbacks suppressed May 17 00:50:29.270413 kernel: audit: type=1400 audit(1747443029.260:1204): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:29.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:29.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:29.306432 kernel: audit: type=1400 audit(1747443029.260:1205): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:29.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:29.326770 kernel: audit: type=1400 audit(1747443029.260:1206): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:29.326941 kernel: audit: type=1400 audit(1747443029.260:1207): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:29.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:29.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:29.364643 kernel: audit: type=1400 audit(1747443029.260:1208): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:29.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:29.383832 kernel: audit: type=1400 audit(1747443029.260:1209): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:29.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:29.405138 kernel: audit: type=1400 audit(1747443029.260:1210): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:29.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:29.424703 kernel: audit: type=1400 audit(1747443029.260:1211): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:29.425290 kernel: audit: type=1400 audit(1747443029.260:1212): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:29.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:29.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:29.463723 kernel: audit: type=1400 audit(1747443029.260:1213): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:29.260000 audit: BPF prog-id=188 op=LOAD May 17 00:50:29.284000 audit[4906]: AVC avc: denied { bpf } for pid=4906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:29.284000 audit[4906]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4895 pid=4906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:29.284000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536343632313064623831643639363164666230346463626466636531 May 17 00:50:29.284000 audit[4906]: AVC avc: denied { perfmon } for pid=4906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:29.284000 audit[4906]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4895 pid=4906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:29.284000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536343632313064623831643639363164666230346463626466636531 May 17 00:50:29.284000 audit[4906]: AVC avc: denied { bpf } for pid=4906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:29.284000 audit[4906]: AVC avc: denied { bpf } for pid=4906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:29.284000 audit[4906]: AVC avc: denied { bpf } for pid=4906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:29.284000 audit[4906]: AVC avc: denied { perfmon } for pid=4906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:29.284000 audit[4906]: AVC avc: denied { perfmon } for pid=4906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:29.284000 audit[4906]: AVC avc: denied { perfmon } for pid=4906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:29.284000 audit[4906]: AVC avc: denied { perfmon } for pid=4906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:29.284000 audit[4906]: AVC avc: denied { perfmon } for pid=4906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:29.284000 audit[4906]: AVC avc: denied { bpf } for pid=4906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:29.284000 audit[4906]: AVC avc: denied { bpf } for pid=4906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:29.284000 audit: BPF prog-id=189 op=LOAD May 17 00:50:29.284000 audit[4906]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4895 pid=4906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:29.284000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536343632313064623831643639363164666230346463626466636531 May 17 00:50:29.284000 audit[4906]: AVC avc: denied { bpf } for pid=4906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:29.284000 audit[4906]: AVC avc: denied { bpf } for pid=4906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:29.284000 audit[4906]: AVC avc: denied { perfmon } for pid=4906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:29.284000 audit[4906]: AVC avc: denied { perfmon } for pid=4906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:29.284000 audit[4906]: AVC avc: denied { perfmon } for pid=4906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:29.284000 audit[4906]: AVC avc: denied { perfmon } for pid=4906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:29.284000 audit[4906]: AVC avc: denied { perfmon } for pid=4906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:29.284000 audit[4906]: AVC avc: denied { bpf } for pid=4906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:29.284000 audit[4906]: AVC avc: denied { bpf } for pid=4906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:29.284000 audit: BPF prog-id=190 op=LOAD May 17 00:50:29.284000 audit[4906]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4895 pid=4906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:29.284000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536343632313064623831643639363164666230346463626466636531 May 17 00:50:29.285000 audit: BPF prog-id=190 op=UNLOAD May 17 00:50:29.285000 audit: BPF prog-id=189 op=UNLOAD May 17 00:50:29.285000 audit[4906]: AVC avc: denied { bpf } for pid=4906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:29.285000 audit[4906]: AVC avc: denied { bpf } for pid=4906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:29.285000 audit[4906]: AVC avc: denied { bpf } for pid=4906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:29.285000 audit[4906]: AVC avc: denied { perfmon } for pid=4906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:29.285000 audit[4906]: AVC avc: denied { perfmon } for pid=4906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:29.285000 audit[4906]: AVC avc: denied { perfmon } for pid=4906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:29.285000 audit[4906]: AVC avc: denied { perfmon } for pid=4906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:29.285000 audit[4906]: AVC avc: denied { perfmon } for pid=4906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:29.285000 audit[4906]: AVC avc: denied { bpf } for pid=4906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:29.285000 audit[4906]: AVC avc: denied { bpf } for pid=4906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:29.285000 audit: BPF prog-id=191 op=LOAD May 17 00:50:29.285000 audit[4906]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4895 pid=4906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:29.285000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536343632313064623831643639363164666230346463626466636531 May 17 00:50:29.806000 audit[4936]: NETFILTER_CFG table=filter:119 family=2 entries=17 op=nft_register_rule pid=4936 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:50:29.806000 audit[4936]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5248 a0=3 a1=ffffc85b5140 a2=0 a3=1 items=0 ppid=2686 pid=4936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:29.806000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:50:29.812000 audit[4936]: NETFILTER_CFG table=nat:120 family=2 entries=35 op=nft_register_chain pid=4936 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:50:29.812000 audit[4936]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14196 a0=3 a1=ffffc85b5140 a2=0 a3=1 items=0 ppid=2686 pid=4936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:29.812000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:50:30.050917 env[1480]: time="2025-05-17T00:50:29.465613034Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-84c64ddb56-27tsz,Uid:072e45c7-a564-4ff1-8f56-8086de5cb47f,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"5646210db81d6961dfb04dcbdfce1e656b59480b0ab5126211bef0adcacf875b\"" May 17 00:50:30.894408 env[1480]: time="2025-05-17T00:50:30.894352468Z" level=info msg="CreateContainer within sandbox \"7d5e002c859f81690ff99a6e500dd76eac097f5717f4459a2c6f435d1d4c6bd7\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"20ecde7ff9c3661eeed8bec4f44cbf169aaed71a483fb2afbfcc0ea527b124f8\"" May 17 00:50:30.895899 env[1480]: time="2025-05-17T00:50:30.894989519Z" level=info msg="StartContainer for \"20ecde7ff9c3661eeed8bec4f44cbf169aaed71a483fb2afbfcc0ea527b124f8\"" May 17 00:50:30.920817 systemd[1]: run-containerd-runc-k8s.io-20ecde7ff9c3661eeed8bec4f44cbf169aaed71a483fb2afbfcc0ea527b124f8-runc.3XflhM.mount: Deactivated successfully. May 17 00:50:30.926657 systemd[1]: Started cri-containerd-20ecde7ff9c3661eeed8bec4f44cbf169aaed71a483fb2afbfcc0ea527b124f8.scope. May 17 00:50:30.953000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.953000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.953000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.953000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.953000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.953000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.953000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.953000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.953000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.953000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.953000 audit: BPF prog-id=192 op=LOAD May 17 00:50:30.953000 audit[4946]: AVC avc: denied { bpf } for pid=4946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.953000 audit[4946]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c5b38 a2=10 a3=0 items=0 ppid=4591 pid=4946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:30.953000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230656364653766663963333636316565656438626563346634346362 May 17 00:50:30.954000 audit[4946]: AVC avc: denied { perfmon } for pid=4946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.954000 audit[4946]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=4591 pid=4946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:30.954000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230656364653766663963333636316565656438626563346634346362 May 17 00:50:30.954000 audit[4946]: AVC avc: denied { bpf } for pid=4946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.954000 audit[4946]: AVC avc: denied { bpf } for pid=4946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.954000 audit[4946]: AVC avc: denied { bpf } for pid=4946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.954000 audit[4946]: AVC avc: denied { perfmon } for pid=4946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.954000 audit[4946]: AVC avc: denied { perfmon } for pid=4946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.954000 audit[4946]: AVC avc: denied { perfmon } for pid=4946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.954000 audit[4946]: AVC avc: denied { perfmon } for pid=4946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.954000 audit[4946]: AVC avc: denied { perfmon } for pid=4946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.954000 audit[4946]: AVC avc: denied { bpf } for pid=4946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.954000 audit[4946]: AVC avc: denied { bpf } for pid=4946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.954000 audit: BPF prog-id=193 op=LOAD May 17 00:50:30.954000 audit[4946]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=4591 pid=4946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:30.954000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230656364653766663963333636316565656438626563346634346362 May 17 00:50:30.954000 audit[4946]: AVC avc: denied { bpf } for pid=4946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.954000 audit[4946]: AVC avc: denied { bpf } for pid=4946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.954000 audit[4946]: AVC avc: denied { perfmon } for pid=4946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.954000 audit[4946]: AVC avc: denied { perfmon } for pid=4946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.954000 audit[4946]: AVC avc: denied { perfmon } for pid=4946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.954000 audit[4946]: AVC avc: denied { perfmon } for pid=4946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.954000 audit[4946]: AVC avc: denied { perfmon } for pid=4946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.954000 audit[4946]: AVC avc: denied { bpf } for pid=4946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.954000 audit[4946]: AVC avc: denied { bpf } for pid=4946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.954000 audit: BPF prog-id=194 op=LOAD May 17 00:50:30.954000 audit[4946]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=4591 pid=4946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:30.954000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230656364653766663963333636316565656438626563346634346362 May 17 00:50:30.954000 audit: BPF prog-id=194 op=UNLOAD May 17 00:50:30.954000 audit: BPF prog-id=193 op=UNLOAD May 17 00:50:30.954000 audit[4946]: AVC avc: denied { bpf } for pid=4946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.954000 audit[4946]: AVC avc: denied { bpf } for pid=4946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.954000 audit[4946]: AVC avc: denied { bpf } for pid=4946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.954000 audit[4946]: AVC avc: denied { perfmon } for pid=4946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.954000 audit[4946]: AVC avc: denied { perfmon } for pid=4946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.954000 audit[4946]: AVC avc: denied { perfmon } for pid=4946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.954000 audit[4946]: AVC avc: denied { perfmon } for pid=4946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.954000 audit[4946]: AVC avc: denied { perfmon } for pid=4946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.954000 audit[4946]: AVC avc: denied { bpf } for pid=4946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.954000 audit[4946]: AVC avc: denied { bpf } for pid=4946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.954000 audit: BPF prog-id=195 op=LOAD May 17 00:50:30.954000 audit[4946]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=4591 pid=4946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:30.954000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230656364653766663963333636316565656438626563346634346362 May 17 00:50:30.978000 audit[4957]: AVC avc: denied { getattr } for pid=4957 comm="coredns" path="cgroup:[4026532688]" dev="nsfs" ino=4026532688 scontext=system_u:system_r:svirt_lxc_net_t:s0:c393,c790 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 May 17 00:50:30.978000 audit[4957]: SYSCALL arch=c00000b7 syscall=79 success=no exit=-13 a0=ffffffffffffff9c a1=4000054810 a2=400014c578 a3=0 items=0 ppid=4591 pid=4957 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c393,c790 key=(null) May 17 00:50:30.978000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 May 17 00:50:31.091675 env[1480]: time="2025-05-17T00:50:31.091612054Z" level=info msg="StartContainer for \"20ecde7ff9c3661eeed8bec4f44cbf169aaed71a483fb2afbfcc0ea527b124f8\" returns successfully" May 17 00:50:31.820915 kubelet[2537]: I0517 00:50:31.820830 2537 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-674b8bbfcf-cxrsr" podStartSLOduration=87.820813134 podStartE2EDuration="1m27.820813134s" podCreationTimestamp="2025-05-17 00:49:04 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:50:31.781264657 +0000 UTC m=+90.773261652" watchObservedRunningTime="2025-05-17 00:50:31.820813134 +0000 UTC m=+90.812810089" May 17 00:50:31.828000 audit[4979]: NETFILTER_CFG table=filter:121 family=2 entries=14 op=nft_register_rule pid=4979 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:50:31.828000 audit[4979]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5248 a0=3 a1=ffffc41324d0 a2=0 a3=1 items=0 ppid=2686 pid=4979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:31.828000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:50:31.833000 audit[4979]: NETFILTER_CFG table=nat:122 family=2 entries=44 op=nft_register_rule pid=4979 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:50:31.833000 audit[4979]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14196 a0=3 a1=ffffc41324d0 a2=0 a3=1 items=0 ppid=2686 pid=4979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:31.833000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:50:31.850000 audit[4981]: NETFILTER_CFG table=filter:123 family=2 entries=14 op=nft_register_rule pid=4981 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:50:31.850000 audit[4981]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5248 a0=3 a1=fffff26d9ba0 a2=0 a3=1 items=0 ppid=2686 pid=4981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:31.850000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:50:32.400000 audit[4981]: NETFILTER_CFG table=nat:124 family=2 entries=56 op=nft_register_chain pid=4981 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:50:32.400000 audit[4981]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19860 a0=3 a1=fffff26d9ba0 a2=0 a3=1 items=0 ppid=2686 pid=4981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:32.400000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:50:34.986370 env[1480]: time="2025-05-17T00:50:34.986315905Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:50:35.096365 env[1480]: time="2025-05-17T00:50:35.096309391Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ebe7e098653491dec9f15f87d7f5d33f47b09d1d6f3ef83deeaaa6237024c045,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:50:35.145299 env[1480]: time="2025-05-17T00:50:35.145251012Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:50:35.191758 env[1480]: time="2025-05-17T00:50:35.191705791Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:27883a4104876fe239311dd93ce6efd0c4a87de7163d57a4c8d96bd65a287ffd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:50:35.193541 env[1480]: time="2025-05-17T00:50:35.193413899Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.0\" returns image reference \"sha256:ebe7e098653491dec9f15f87d7f5d33f47b09d1d6f3ef83deeaaa6237024c045\"" May 17 00:50:35.199776 env[1480]: time="2025-05-17T00:50:35.199736365Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.0\"" May 17 00:50:35.242449 env[1480]: time="2025-05-17T00:50:35.242117876Z" level=info msg="CreateContainer within sandbox \"ef88f37ad20b41a637085c66407ec0e39064d84fb7beea9b8226d24161d3c910\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 17 00:50:35.748093 env[1480]: time="2025-05-17T00:50:35.748039162Z" level=info msg="CreateContainer within sandbox \"ef88f37ad20b41a637085c66407ec0e39064d84fb7beea9b8226d24161d3c910\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"0f7bba05d3050eccd4f1785ad732e9d448a5246790a275b7c1997a803e199194\"" May 17 00:50:35.749094 env[1480]: time="2025-05-17T00:50:35.749066659Z" level=info msg="StartContainer for \"0f7bba05d3050eccd4f1785ad732e9d448a5246790a275b7c1997a803e199194\"" May 17 00:50:35.779378 systemd[1]: run-containerd-runc-k8s.io-0f7bba05d3050eccd4f1785ad732e9d448a5246790a275b7c1997a803e199194-runc.qFc86b.mount: Deactivated successfully. May 17 00:50:35.780922 systemd[1]: Started cri-containerd-0f7bba05d3050eccd4f1785ad732e9d448a5246790a275b7c1997a803e199194.scope. May 17 00:50:36.214964 kernel: kauditd_printk_skb: 125 callbacks suppressed May 17 00:50:36.215127 kernel: audit: type=1400 audit(1747443036.190:1247): avc: denied { perfmon } for pid=4994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:36.190000 audit[4994]: AVC avc: denied { perfmon } for pid=4994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:36.190000 audit[4994]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4480 pid=4994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:36.216332 kernel: audit: type=1300 audit(1747443036.190:1247): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4480 pid=4994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:36.190000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066376262613035643330353065636364346631373835616437333265 May 17 00:50:36.274775 kernel: audit: type=1327 audit(1747443036.190:1247): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066376262613035643330353065636364346631373835616437333265 May 17 00:50:36.190000 audit[4994]: AVC avc: denied { bpf } for pid=4994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:36.293607 kernel: audit: type=1400 audit(1747443036.190:1248): avc: denied { bpf } for pid=4994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:37.699972 kernel: audit: type=1400 audit(1747443036.190:1248): avc: denied { bpf } for pid=4994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:37.700057 kernel: audit: type=1400 audit(1747443036.190:1248): avc: denied { bpf } for pid=4994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:37.700084 kernel: audit: type=1400 audit(1747443036.190:1248): avc: denied { perfmon } for pid=4994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:37.700104 kernel: audit: type=1400 audit(1747443036.190:1248): avc: denied { perfmon } for pid=4994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:37.700121 kernel: audit: type=1400 audit(1747443036.190:1248): avc: denied { perfmon } for pid=4994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:37.700137 kernel: audit: type=1400 audit(1747443036.190:1248): avc: denied { perfmon } for pid=4994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:36.190000 audit[4994]: AVC avc: denied { bpf } for pid=4994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:36.190000 audit[4994]: AVC avc: denied { bpf } for pid=4994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:36.190000 audit[4994]: AVC avc: denied { perfmon } for pid=4994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:36.190000 audit[4994]: AVC avc: denied { perfmon } for pid=4994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:36.190000 audit[4994]: AVC avc: denied { perfmon } for pid=4994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:36.190000 audit[4994]: AVC avc: denied { perfmon } for pid=4994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:36.190000 audit[4994]: AVC avc: denied { perfmon } for pid=4994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:36.190000 audit[4994]: AVC avc: denied { bpf } for pid=4994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:36.190000 audit[4994]: AVC avc: denied { bpf } for pid=4994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:36.190000 audit: BPF prog-id=196 op=LOAD May 17 00:50:36.190000 audit[4994]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4480 pid=4994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:36.190000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066376262613035643330353065636364346631373835616437333265 May 17 00:50:36.196000 audit[4994]: AVC avc: denied { bpf } for pid=4994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:36.196000 audit[4994]: AVC avc: denied { bpf } for pid=4994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:36.196000 audit[4994]: AVC avc: denied { perfmon } for pid=4994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:36.196000 audit[4994]: AVC avc: denied { perfmon } for pid=4994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:36.196000 audit[4994]: AVC avc: denied { perfmon } for pid=4994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:36.196000 audit[4994]: AVC avc: denied { perfmon } for pid=4994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:36.196000 audit[4994]: AVC avc: denied { perfmon } for pid=4994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:36.196000 audit[4994]: AVC avc: denied { bpf } for pid=4994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:36.196000 audit[4994]: AVC avc: denied { bpf } for pid=4994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:36.196000 audit: BPF prog-id=197 op=LOAD May 17 00:50:36.196000 audit[4994]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4480 pid=4994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:36.196000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066376262613035643330353065636364346631373835616437333265 May 17 00:50:36.214000 audit: BPF prog-id=197 op=UNLOAD May 17 00:50:36.214000 audit: BPF prog-id=196 op=UNLOAD May 17 00:50:36.214000 audit[4994]: AVC avc: denied { bpf } for pid=4994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:36.214000 audit[4994]: AVC avc: denied { bpf } for pid=4994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:36.214000 audit[4994]: AVC avc: denied { bpf } for pid=4994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:36.214000 audit[4994]: AVC avc: denied { perfmon } for pid=4994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:36.214000 audit[4994]: AVC avc: denied { perfmon } for pid=4994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:36.214000 audit[4994]: AVC avc: denied { perfmon } for pid=4994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:36.214000 audit[4994]: AVC avc: denied { perfmon } for pid=4994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:36.214000 audit[4994]: AVC avc: denied { perfmon } for pid=4994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:36.214000 audit[4994]: AVC avc: denied { bpf } for pid=4994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:36.214000 audit[4994]: AVC avc: denied { bpf } for pid=4994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:36.214000 audit: BPF prog-id=198 op=LOAD May 17 00:50:36.214000 audit[4994]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4480 pid=4994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:36.214000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066376262613035643330353065636364346631373835616437333265 May 17 00:50:37.605556 systemd[1]: run-containerd-runc-k8s.io-1199e8fbc8f7a8735bd0e88aee601a4d3ea26357c725870e7083c78e967fda18-runc.oZSfCx.mount: Deactivated successfully. May 17 00:50:37.751574 env[1480]: time="2025-05-17T00:50:37.751522528Z" level=info msg="StartContainer for \"0f7bba05d3050eccd4f1785ad732e9d448a5246790a275b7c1997a803e199194\" returns successfully" May 17 00:50:43.145646 env[1480]: time="2025-05-17T00:50:43.145593103Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:50:43.173745 update_engine[1468]: I0517 00:50:43.173696 1468 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs May 17 00:50:43.173745 update_engine[1468]: I0517 00:50:43.173738 1468 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs May 17 00:50:43.174621 update_engine[1468]: I0517 00:50:43.174594 1468 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs May 17 00:50:43.175332 update_engine[1468]: I0517 00:50:43.175305 1468 omaha_request_params.cc:62] Current group set to lts May 17 00:50:43.175430 update_engine[1468]: I0517 00:50:43.175411 1468 update_attempter.cc:499] Already updated boot flags. Skipping. May 17 00:50:43.175430 update_engine[1468]: I0517 00:50:43.175421 1468 update_attempter.cc:643] Scheduling an action processor start. May 17 00:50:43.175487 update_engine[1468]: I0517 00:50:43.175439 1468 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction May 17 00:50:43.175487 update_engine[1468]: I0517 00:50:43.175464 1468 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs May 17 00:50:43.177368 locksmithd[1551]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 May 17 00:50:43.204280 update_engine[1468]: I0517 00:50:43.204226 1468 omaha_request_action.cc:270] Posting an Omaha request to disabled May 17 00:50:43.204280 update_engine[1468]: I0517 00:50:43.204268 1468 omaha_request_action.cc:271] Request: May 17 00:50:43.204280 update_engine[1468]: May 17 00:50:43.204280 update_engine[1468]: May 17 00:50:43.204280 update_engine[1468]: May 17 00:50:43.204280 update_engine[1468]: May 17 00:50:43.204280 update_engine[1468]: May 17 00:50:43.204280 update_engine[1468]: May 17 00:50:43.204280 update_engine[1468]: May 17 00:50:43.204280 update_engine[1468]: May 17 00:50:43.204280 update_engine[1468]: I0517 00:50:43.204274 1468 libcurl_http_fetcher.cc:47] Starting/Resuming transfer May 17 00:50:43.302110 env[1480]: time="2025-05-17T00:50:43.302058048Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4188fe2931435deda58a0dc1767a2f6ad2bb27e47662ccec626bd07006f56373,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:50:43.393419 update_engine[1468]: I0517 00:50:43.393378 1468 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP May 17 00:50:43.393701 update_engine[1468]: I0517 00:50:43.393680 1468 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. May 17 00:50:43.395931 env[1480]: time="2025-05-17T00:50:43.395815135Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:50:43.439833 env[1480]: time="2025-05-17T00:50:43.439779134Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:eb5bc5c9e7a71f1d8ea69bbcc8e54b84fb7ec1e32d919c8b148f80b770f20182,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:50:43.441102 env[1480]: time="2025-05-17T00:50:43.440519519Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.0\" returns image reference \"sha256:4188fe2931435deda58a0dc1767a2f6ad2bb27e47662ccec626bd07006f56373\"" May 17 00:50:43.442392 env[1480]: time="2025-05-17T00:50:43.442354704Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\"" May 17 00:50:43.489312 env[1480]: time="2025-05-17T00:50:43.489264166Z" level=info msg="CreateContainer within sandbox \"3fe75f67e59eb8ceb42c25b651f0c0f61478108befbc3f1dd795a5bcf4f067b9\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" May 17 00:50:43.518646 update_engine[1468]: E0517 00:50:43.518603 1468 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled May 17 00:50:43.518799 update_engine[1468]: I0517 00:50:43.518711 1468 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 May 17 00:50:43.634981 env[1480]: time="2025-05-17T00:50:43.634913868Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:50:43.692166 env[1480]: time="2025-05-17T00:50:43.692105651Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:50:43.693484 kubelet[2537]: E0517 00:50:43.693425 2537 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:50:43.693869 kubelet[2537]: E0517 00:50:43.693489 2537 kuberuntime_image.go:42] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:50:43.694588 kubelet[2537]: E0517 00:50:43.694532 2537 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.0,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:2d789fd7d12f447a87f7555b072d9747,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-m2wqv,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-65bfcd6f48-fpglr_calico-system(f2c35a1f-88d3-4b21-9134-27f4e6567489): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:50:43.694738 env[1480]: time="2025-05-17T00:50:43.694706259Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\"" May 17 00:50:43.912158 env[1480]: time="2025-05-17T00:50:43.912106111Z" level=info msg="CreateContainer within sandbox \"3fe75f67e59eb8ceb42c25b651f0c0f61478108befbc3f1dd795a5bcf4f067b9\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"75428c4c09b4fe20fd36bcd3990495245e13100967d591c566b7f85e38200274\"" May 17 00:50:43.913257 env[1480]: time="2025-05-17T00:50:43.913206910Z" level=info msg="StartContainer for \"75428c4c09b4fe20fd36bcd3990495245e13100967d591c566b7f85e38200274\"" May 17 00:50:43.944014 systemd[1]: Started cri-containerd-75428c4c09b4fe20fd36bcd3990495245e13100967d591c566b7f85e38200274.scope. May 17 00:50:43.945724 env[1480]: time="2025-05-17T00:50:43.945675556Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:50:43.978404 kernel: kauditd_printk_skb: 33 callbacks suppressed May 17 00:50:43.978558 kernel: audit: type=1400 audit(1747443043.971:1253): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:43.971000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:43.997270 kernel: audit: type=1400 audit(1747443043.971:1254): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:43.971000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:43.972000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:44.033677 kernel: audit: type=1400 audit(1747443043.972:1255): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:43.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:44.054244 kernel: audit: type=1400 audit(1747443043.972:1256): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:43.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:44.290701 kernel: audit: type=1400 audit(1747443043.972:1257): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:44.290803 kernel: audit: type=1400 audit(1747443043.972:1258): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:44.290827 kernel: audit: type=1400 audit(1747443043.972:1259): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:44.290849 kernel: audit: type=1400 audit(1747443043.972:1260): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:44.290868 kernel: audit: type=1400 audit(1747443043.972:1261): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:44.290887 kernel: audit: type=1400 audit(1747443043.979:1262): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:43.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:43.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:43.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:43.972000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:43.979000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:43.979000 audit: BPF prog-id=199 op=LOAD May 17 00:50:43.995000 audit[5055]: AVC avc: denied { bpf } for pid=5055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:43.995000 audit[5055]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=4627 pid=5055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:43.995000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735343238633463303962346665323066643336626364333939303439 May 17 00:50:43.995000 audit[5055]: AVC avc: denied { perfmon } for pid=5055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:43.995000 audit[5055]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=4627 pid=5055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:43.995000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735343238633463303962346665323066643336626364333939303439 May 17 00:50:43.995000 audit[5055]: AVC avc: denied { bpf } for pid=5055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:43.995000 audit[5055]: AVC avc: denied { bpf } for pid=5055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:43.995000 audit[5055]: AVC avc: denied { bpf } for pid=5055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:43.995000 audit[5055]: AVC avc: denied { perfmon } for pid=5055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:43.995000 audit[5055]: AVC avc: denied { perfmon } for pid=5055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:43.995000 audit[5055]: AVC avc: denied { perfmon } for pid=5055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:43.995000 audit[5055]: AVC avc: denied { perfmon } for pid=5055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:43.995000 audit[5055]: AVC avc: denied { perfmon } for pid=5055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:43.995000 audit[5055]: AVC avc: denied { bpf } for pid=5055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:43.995000 audit[5055]: AVC avc: denied { bpf } for pid=5055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:43.995000 audit: BPF prog-id=200 op=LOAD May 17 00:50:43.995000 audit[5055]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=4627 pid=5055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:43.995000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735343238633463303962346665323066643336626364333939303439 May 17 00:50:44.015000 audit[5055]: AVC avc: denied { bpf } for pid=5055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:44.015000 audit[5055]: AVC avc: denied { bpf } for pid=5055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:44.015000 audit[5055]: AVC avc: denied { perfmon } for pid=5055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:44.015000 audit[5055]: AVC avc: denied { perfmon } for pid=5055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:44.015000 audit[5055]: AVC avc: denied { perfmon } for pid=5055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:44.015000 audit[5055]: AVC avc: denied { perfmon } for pid=5055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:44.015000 audit[5055]: AVC avc: denied { perfmon } for pid=5055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:44.015000 audit[5055]: AVC avc: denied { bpf } for pid=5055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:44.015000 audit[5055]: AVC avc: denied { bpf } for pid=5055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:44.015000 audit: BPF prog-id=201 op=LOAD May 17 00:50:44.015000 audit[5055]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=4627 pid=5055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:44.015000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735343238633463303962346665323066643336626364333939303439 May 17 00:50:44.032000 audit: BPF prog-id=201 op=UNLOAD May 17 00:50:44.032000 audit: BPF prog-id=200 op=UNLOAD May 17 00:50:44.032000 audit[5055]: AVC avc: denied { bpf } for pid=5055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:44.032000 audit[5055]: AVC avc: denied { bpf } for pid=5055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:44.032000 audit[5055]: AVC avc: denied { bpf } for pid=5055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:44.032000 audit[5055]: AVC avc: denied { perfmon } for pid=5055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:44.032000 audit[5055]: AVC avc: denied { perfmon } for pid=5055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:44.032000 audit[5055]: AVC avc: denied { perfmon } for pid=5055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:44.032000 audit[5055]: AVC avc: denied { perfmon } for pid=5055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:44.032000 audit[5055]: AVC avc: denied { perfmon } for pid=5055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:44.032000 audit[5055]: AVC avc: denied { bpf } for pid=5055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:44.032000 audit[5055]: AVC avc: denied { bpf } for pid=5055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:44.032000 audit: BPF prog-id=202 op=LOAD May 17 00:50:44.032000 audit[5055]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=4627 pid=5055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:44.032000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735343238633463303962346665323066643336626364333939303439 May 17 00:50:47.853221 env[1480]: time="2025-05-17T00:50:47.853171075Z" level=info msg="StartContainer for \"75428c4c09b4fe20fd36bcd3990495245e13100967d591c566b7f85e38200274\" returns successfully" May 17 00:50:47.854569 kubelet[2537]: E0517 00:50:47.854523 2537 kubelet.go:2627] "Housekeeping took longer than expected" err="housekeeping took too long" expected="1s" actual="2.712s" May 17 00:50:49.654806 env[1480]: time="2025-05-17T00:50:49.654730452Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:50:49.655343 kubelet[2537]: E0517 00:50:49.655308 2537 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:50:49.655637 kubelet[2537]: E0517 00:50:49.655616 2537 kuberuntime_image.go:42] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:50:49.655950 kubelet[2537]: E0517 00:50:49.655898 2537 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-vwtwv,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-78d55f7ddc-pmkbg_calico-system(85f144ac-4d39-496d-b3d5-66149a1574d7): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:50:49.656628 env[1480]: time="2025-05-17T00:50:49.656595848Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\"" May 17 00:50:49.658068 kubelet[2537]: E0517 00:50:49.658030 2537 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-pmkbg" podUID="85f144ac-4d39-496d-b3d5-66149a1574d7" May 17 00:50:49.861987 kubelet[2537]: E0517 00:50:49.861944 2537 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-pmkbg" podUID="85f144ac-4d39-496d-b3d5-66149a1574d7" May 17 00:50:49.888899 kubelet[2537]: I0517 00:50:49.888518 2537 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-647fb858cc-jtf2c" podStartSLOduration=65.850082186 podStartE2EDuration="1m26.888498825s" podCreationTimestamp="2025-05-17 00:49:23 +0000 UTC" firstStartedPulling="2025-05-17 00:50:22.403155963 +0000 UTC m=+81.395152878" lastFinishedPulling="2025-05-17 00:50:43.441572602 +0000 UTC m=+102.433569517" observedRunningTime="2025-05-17 00:50:48.890454374 +0000 UTC m=+107.882451289" watchObservedRunningTime="2025-05-17 00:50:49.888498825 +0000 UTC m=+108.880495780" May 17 00:50:49.949000 audit[5143]: NETFILTER_CFG table=filter:125 family=2 entries=14 op=nft_register_rule pid=5143 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:50:49.955549 kernel: kauditd_printk_skb: 47 callbacks suppressed May 17 00:50:49.955686 kernel: audit: type=1325 audit(1747443049.949:1271): table=filter:125 family=2 entries=14 op=nft_register_rule pid=5143 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:50:49.949000 audit[5143]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5248 a0=3 a1=ffffdf73ac60 a2=0 a3=1 items=0 ppid=2686 pid=5143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:49.998724 kernel: audit: type=1300 audit(1747443049.949:1271): arch=c00000b7 syscall=211 success=yes exit=5248 a0=3 a1=ffffdf73ac60 a2=0 a3=1 items=0 ppid=2686 pid=5143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:49.949000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:50:50.015321 kernel: audit: type=1327 audit(1747443049.949:1271): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:50:49.974000 audit[5143]: NETFILTER_CFG table=nat:126 family=2 entries=20 op=nft_register_rule pid=5143 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:50:50.032294 kernel: audit: type=1325 audit(1747443049.974:1272): table=nat:126 family=2 entries=20 op=nft_register_rule pid=5143 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:50:50.032455 kernel: audit: type=1300 audit(1747443049.974:1272): arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffdf73ac60 a2=0 a3=1 items=0 ppid=2686 pid=5143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:49.974000 audit[5143]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffdf73ac60 a2=0 a3=1 items=0 ppid=2686 pid=5143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:49.974000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:50:50.077469 kernel: audit: type=1327 audit(1747443049.974:1272): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:50:54.176340 update_engine[1468]: I0517 00:50:54.176288 1468 libcurl_http_fetcher.cc:47] Starting/Resuming transfer May 17 00:50:54.176715 update_engine[1468]: I0517 00:50:54.176498 1468 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP May 17 00:50:54.176715 update_engine[1468]: I0517 00:50:54.176678 1468 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. May 17 00:50:54.248881 update_engine[1468]: E0517 00:50:54.248835 1468 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled May 17 00:50:54.249040 update_engine[1468]: I0517 00:50:54.248953 1468 libcurl_http_fetcher.cc:283] No HTTP response, retry 2 May 17 00:50:54.885000 audit[2352]: AVC avc: denied { watch } for pid=2352 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=522516 scontext=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:50:54.885000 audit[2352]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40009a64b0 a2=fc6 a3=0 items=0 ppid=2209 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 key=(null) May 17 00:50:54.942689 kernel: audit: type=1400 audit(1747443054.885:1273): avc: denied { watch } for pid=2352 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=522516 scontext=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:50:54.942842 kernel: audit: type=1300 audit(1747443054.885:1273): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40009a64b0 a2=fc6 a3=0 items=0 ppid=2209 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 key=(null) May 17 00:50:54.885000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:50:54.972312 kernel: audit: type=1327 audit(1747443054.885:1273): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:50:54.886000 audit[2352]: AVC avc: denied { watch } for pid=2352 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=522510 scontext=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:50:54.997838 kernel: audit: type=1400 audit(1747443054.886:1274): avc: denied { watch } for pid=2352 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=522510 scontext=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:50:54.997980 kernel: audit: type=1300 audit(1747443054.886:1274): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000d4a0a0 a2=fc6 a3=0 items=0 ppid=2209 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 key=(null) May 17 00:50:54.886000 audit[2352]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000d4a0a0 a2=fc6 a3=0 items=0 ppid=2209 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 key=(null) May 17 00:50:54.886000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:50:55.057078 kernel: audit: type=1327 audit(1747443054.886:1274): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:50:56.115000 audit[2419]: AVC avc: denied { watch } for pid=2419 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=522518 scontext=system_u:system_r:svirt_lxc_net_t:s0:c703,c977 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:50:56.115000 audit[2419]: AVC avc: denied { watch } for pid=2419 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=522516 scontext=system_u:system_r:svirt_lxc_net_t:s0:c703,c977 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:50:56.175330 kernel: audit: type=1400 audit(1747443056.115:1275): avc: denied { watch } for pid=2419 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=522518 scontext=system_u:system_r:svirt_lxc_net_t:s0:c703,c977 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:50:56.175410 kernel: audit: type=1400 audit(1747443056.115:1276): avc: denied { watch } for pid=2419 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=522516 scontext=system_u:system_r:svirt_lxc_net_t:s0:c703,c977 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:50:56.115000 audit[2419]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=401378eb70 a2=fc6 a3=0 items=0 ppid=2279 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c703,c977 key=(null) May 17 00:50:56.214021 kernel: audit: type=1300 audit(1747443056.115:1275): arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=401378eb70 a2=fc6 a3=0 items=0 ppid=2279 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c703,c977 key=(null) May 17 00:50:56.115000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3334002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 00:50:56.239770 kernel: audit: type=1327 audit(1747443056.115:1275): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3334002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 00:50:56.115000 audit[2419]: AVC avc: denied { watch } for pid=2419 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=522516 scontext=system_u:system_r:svirt_lxc_net_t:s0:c703,c977 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:50:56.303754 kernel: audit: type=1400 audit(1747443056.115:1277): avc: denied { watch } for pid=2419 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=522516 scontext=system_u:system_r:svirt_lxc_net_t:s0:c703,c977 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:50:56.303850 kernel: audit: type=1300 audit(1747443056.115:1277): arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=401378eba0 a2=fc6 a3=0 items=0 ppid=2279 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c703,c977 key=(null) May 17 00:50:56.303881 kernel: audit: type=1327 audit(1747443056.115:1277): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3334002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 00:50:56.115000 audit[2419]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=401378eba0 a2=fc6 a3=0 items=0 ppid=2279 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c703,c977 key=(null) May 17 00:50:56.115000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3334002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 00:50:56.115000 audit[2419]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=74 a1=4013524960 a2=fc6 a3=0 items=0 ppid=2279 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c703,c977 key=(null) May 17 00:50:56.115000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3334002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 00:50:56.174000 audit[2419]: AVC avc: denied { watch } for pid=2419 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=522510 scontext=system_u:system_r:svirt_lxc_net_t:s0:c703,c977 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:50:56.174000 audit[2419]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=4005635f80 a2=fc6 a3=0 items=0 ppid=2279 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c703,c977 key=(null) May 17 00:50:56.174000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3334002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 00:50:56.174000 audit[2419]: AVC avc: denied { watch } for pid=2419 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=522512 scontext=system_u:system_r:svirt_lxc_net_t:s0:c703,c977 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:50:56.174000 audit[2419]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=4013524a20 a2=fc6 a3=0 items=0 ppid=2279 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c703,c977 key=(null) May 17 00:50:56.174000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3334002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 00:50:56.174000 audit[2419]: AVC avc: denied { watch } for pid=2419 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=522510 scontext=system_u:system_r:svirt_lxc_net_t:s0:c703,c977 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:50:56.174000 audit[2419]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=4005e8a020 a2=fc6 a3=0 items=0 ppid=2279 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c703,c977 key=(null) May 17 00:50:56.174000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3334002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 00:50:56.446450 env[1480]: time="2025-05-17T00:50:56.446405553Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:50:56.494180 env[1480]: time="2025-05-17T00:50:56.494113647Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0d503660232383641bf9af3b7e4ef066c0e96a8ec586f123e5b56b6a196c983d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:50:56.541961 env[1480]: time="2025-05-17T00:50:56.541915894Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:50:56.590090 env[1480]: time="2025-05-17T00:50:56.590032204Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\" returns image reference \"sha256:0d503660232383641bf9af3b7e4ef066c0e96a8ec586f123e5b56b6a196c983d\"" May 17 00:50:56.590274 env[1480]: time="2025-05-17T00:50:56.590157716Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:ad7d2e76f15777636c5d91c108d7655659b38fe8970255050ffa51223eb96ff4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:50:56.592329 env[1480]: time="2025-05-17T00:50:56.592285150Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\"" May 17 00:50:56.654176 env[1480]: time="2025-05-17T00:50:56.654135006Z" level=info msg="CreateContainer within sandbox \"3182a56ea9946ba5082e3e29fd441f6cf589a98ff0116cb3608dd30050fed381\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 17 00:50:57.045248 env[1480]: time="2025-05-17T00:50:57.045183841Z" level=info msg="CreateContainer within sandbox \"3182a56ea9946ba5082e3e29fd441f6cf589a98ff0116cb3608dd30050fed381\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"b7b6d99a9e1ffb99ae56d4bf789deafcb7ad54e4bd3fa53efef13bf5b1094c13\"" May 17 00:50:57.045996 env[1480]: time="2025-05-17T00:50:57.045965835Z" level=info msg="StartContainer for \"b7b6d99a9e1ffb99ae56d4bf789deafcb7ad54e4bd3fa53efef13bf5b1094c13\"" May 17 00:50:57.073563 systemd[1]: run-containerd-runc-k8s.io-b7b6d99a9e1ffb99ae56d4bf789deafcb7ad54e4bd3fa53efef13bf5b1094c13-runc.fcHV0f.mount: Deactivated successfully. May 17 00:50:57.085893 systemd[1]: Started cri-containerd-b7b6d99a9e1ffb99ae56d4bf789deafcb7ad54e4bd3fa53efef13bf5b1094c13.scope. May 17 00:50:57.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:57.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:57.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:57.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:57.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:57.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:57.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:57.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:57.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:57.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:57.095000 audit: BPF prog-id=203 op=LOAD May 17 00:50:57.096000 audit[5154]: AVC avc: denied { bpf } for pid=5154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:57.096000 audit[5154]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4737 pid=5154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:57.096000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237623664393961396531666662393961653536643462663738396465 May 17 00:50:57.096000 audit[5154]: AVC avc: denied { perfmon } for pid=5154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:57.096000 audit[5154]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4737 pid=5154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:57.096000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237623664393961396531666662393961653536643462663738396465 May 17 00:50:57.096000 audit[5154]: AVC avc: denied { bpf } for pid=5154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:57.096000 audit[5154]: AVC avc: denied { bpf } for pid=5154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:57.096000 audit[5154]: AVC avc: denied { bpf } for pid=5154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:57.096000 audit[5154]: AVC avc: denied { perfmon } for pid=5154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:57.096000 audit[5154]: AVC avc: denied { perfmon } for pid=5154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:57.096000 audit[5154]: AVC avc: denied { perfmon } for pid=5154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:57.096000 audit[5154]: AVC avc: denied { perfmon } for pid=5154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:57.096000 audit[5154]: AVC avc: denied { perfmon } for pid=5154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:57.096000 audit[5154]: AVC avc: denied { bpf } for pid=5154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:57.096000 audit[5154]: AVC avc: denied { bpf } for pid=5154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:57.096000 audit: BPF prog-id=204 op=LOAD May 17 00:50:57.096000 audit[5154]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4737 pid=5154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:57.096000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237623664393961396531666662393961653536643462663738396465 May 17 00:50:57.096000 audit[5154]: AVC avc: denied { bpf } for pid=5154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:57.096000 audit[5154]: AVC avc: denied { bpf } for pid=5154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:57.096000 audit[5154]: AVC avc: denied { perfmon } for pid=5154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:57.096000 audit[5154]: AVC avc: denied { perfmon } for pid=5154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:57.096000 audit[5154]: AVC avc: denied { perfmon } for pid=5154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:57.096000 audit[5154]: AVC avc: denied { perfmon } for pid=5154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:57.096000 audit[5154]: AVC avc: denied { perfmon } for pid=5154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:57.096000 audit[5154]: AVC avc: denied { bpf } for pid=5154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:57.096000 audit[5154]: AVC avc: denied { bpf } for pid=5154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:57.096000 audit: BPF prog-id=205 op=LOAD May 17 00:50:57.096000 audit[5154]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4737 pid=5154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:57.096000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237623664393961396531666662393961653536643462663738396465 May 17 00:50:57.096000 audit: BPF prog-id=205 op=UNLOAD May 17 00:50:57.096000 audit: BPF prog-id=204 op=UNLOAD May 17 00:50:57.096000 audit[5154]: AVC avc: denied { bpf } for pid=5154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:57.096000 audit[5154]: AVC avc: denied { bpf } for pid=5154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:57.096000 audit[5154]: AVC avc: denied { bpf } for pid=5154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:57.096000 audit[5154]: AVC avc: denied { perfmon } for pid=5154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:57.096000 audit[5154]: AVC avc: denied { perfmon } for pid=5154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:57.096000 audit[5154]: AVC avc: denied { perfmon } for pid=5154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:57.096000 audit[5154]: AVC avc: denied { perfmon } for pid=5154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:57.096000 audit[5154]: AVC avc: denied { perfmon } for pid=5154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:57.096000 audit[5154]: AVC avc: denied { bpf } for pid=5154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:57.096000 audit[5154]: AVC avc: denied { bpf } for pid=5154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:57.096000 audit: BPF prog-id=206 op=LOAD May 17 00:50:57.096000 audit[5154]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4737 pid=5154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:57.096000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237623664393961396531666662393961653536643462663738396465 May 17 00:50:59.798729 env[1480]: time="2025-05-17T00:50:59.798657935Z" level=info msg="StartContainer for \"b7b6d99a9e1ffb99ae56d4bf789deafcb7ad54e4bd3fa53efef13bf5b1094c13\" returns successfully" May 17 00:50:59.799371 kubelet[2537]: E0517 00:50:59.799215 2537 kubelet.go:2627] "Housekeeping took longer than expected" err="housekeeping took too long" expected="1s" actual="2.657s" May 17 00:50:59.814000 audit[5165]: AVC avc: denied { watch } for pid=5165 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_49_47.1376700025/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c273,c865 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c273,c865 tclass=file permissive=0 May 17 00:50:59.814000 audit[5165]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=40010788a0 a2=fc6 a3=0 items=0 ppid=4737 pid=5165 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c273,c865 key=(null) May 17 00:50:59.814000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:51:00.837000 audit[5188]: NETFILTER_CFG table=filter:127 family=2 entries=14 op=nft_register_rule pid=5188 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:51:00.844496 kernel: kauditd_printk_skb: 71 callbacks suppressed May 17 00:51:00.844639 kernel: audit: type=1325 audit(1747443060.837:1300): table=filter:127 family=2 entries=14 op=nft_register_rule pid=5188 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:51:00.837000 audit[5188]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5248 a0=3 a1=ffffd1321680 a2=0 a3=1 items=0 ppid=2686 pid=5188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:00.861768 kubelet[2537]: I0517 00:51:00.861715 2537 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-84c64ddb56-5dt2v" podStartSLOduration=71.128089901 podStartE2EDuration="1m42.861699536s" podCreationTimestamp="2025-05-17 00:49:18 +0000 UTC" firstStartedPulling="2025-05-17 00:50:24.857651816 +0000 UTC m=+83.849648731" lastFinishedPulling="2025-05-17 00:50:56.591261331 +0000 UTC m=+115.583258366" observedRunningTime="2025-05-17 00:51:00.823071194 +0000 UTC m=+119.815068149" watchObservedRunningTime="2025-05-17 00:51:00.861699536 +0000 UTC m=+119.853696491" May 17 00:51:00.886921 kernel: audit: type=1300 audit(1747443060.837:1300): arch=c00000b7 syscall=211 success=yes exit=5248 a0=3 a1=ffffd1321680 a2=0 a3=1 items=0 ppid=2686 pid=5188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:00.837000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:51:00.902330 kernel: audit: type=1327 audit(1747443060.837:1300): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:51:00.886000 audit[5188]: NETFILTER_CFG table=nat:128 family=2 entries=20 op=nft_register_rule pid=5188 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:51:00.917155 kernel: audit: type=1325 audit(1747443060.886:1301): table=nat:128 family=2 entries=20 op=nft_register_rule pid=5188 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:51:00.917290 kernel: audit: type=1300 audit(1747443060.886:1301): arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffd1321680 a2=0 a3=1 items=0 ppid=2686 pid=5188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:00.886000 audit[5188]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffd1321680 a2=0 a3=1 items=0 ppid=2686 pid=5188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:00.886000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:51:00.960546 kernel: audit: type=1327 audit(1747443060.886:1301): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:51:01.037000 audit[5190]: NETFILTER_CFG table=filter:129 family=2 entries=13 op=nft_register_rule pid=5190 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:51:01.037000 audit[5190]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=ffffcb6bb3e0 a2=0 a3=1 items=0 ppid=2686 pid=5190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:01.084997 kernel: audit: type=1325 audit(1747443061.037:1302): table=filter:129 family=2 entries=13 op=nft_register_rule pid=5190 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:51:01.085183 kernel: audit: type=1300 audit(1747443061.037:1302): arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=ffffcb6bb3e0 a2=0 a3=1 items=0 ppid=2686 pid=5190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:01.037000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:51:01.100484 kernel: audit: type=1327 audit(1747443061.037:1302): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:51:01.102000 audit[5190]: NETFILTER_CFG table=nat:130 family=2 entries=27 op=nft_register_chain pid=5190 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:51:01.102000 audit[5190]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=9348 a0=3 a1=ffffcb6bb3e0 a2=0 a3=1 items=0 ppid=2686 pid=5190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:01.102000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:51:01.119269 kernel: audit: type=1325 audit(1747443061.102:1303): table=nat:130 family=2 entries=27 op=nft_register_chain pid=5190 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:51:02.098000 audit[2352]: AVC avc: denied { watch } for pid=2352 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=522510 scontext=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:51:02.098000 audit[2352]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000d4bdc0 a2=fc6 a3=0 items=0 ppid=2209 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 key=(null) May 17 00:51:02.098000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:51:02.099000 audit[2352]: AVC avc: denied { watch } for pid=2352 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=522510 scontext=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:51:02.099000 audit[2352]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000dcbba0 a2=fc6 a3=0 items=0 ppid=2209 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 key=(null) May 17 00:51:02.099000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:51:02.099000 audit[2352]: AVC avc: denied { watch } for pid=2352 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=522510 scontext=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:51:02.099000 audit[2352]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000dcbbc0 a2=fc6 a3=0 items=0 ppid=2209 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 key=(null) May 17 00:51:02.099000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:51:02.104000 audit[2352]: AVC avc: denied { watch } for pid=2352 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=522510 scontext=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:51:02.104000 audit[2352]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=400037c3a0 a2=fc6 a3=0 items=0 ppid=2209 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 key=(null) May 17 00:51:02.104000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:51:04.173335 update_engine[1468]: I0517 00:51:04.173280 1468 libcurl_http_fetcher.cc:47] Starting/Resuming transfer May 17 00:51:04.173716 update_engine[1468]: I0517 00:51:04.173506 1468 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP May 17 00:51:04.173716 update_engine[1468]: I0517 00:51:04.173699 1468 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. May 17 00:51:04.212950 update_engine[1468]: E0517 00:51:04.212900 1468 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled May 17 00:51:04.213115 update_engine[1468]: I0517 00:51:04.213013 1468 libcurl_http_fetcher.cc:283] No HTTP response, retry 3 May 17 00:51:05.369945 env[1480]: time="2025-05-17T00:51:05.369882689Z" level=info msg="StopPodSandbox for \"9563538b262083fde51e5f00fccc80cec92003d148de9cd91d24b213d43ef190\"" May 17 00:51:05.485723 env[1480]: 2025-05-17 00:51:05.428 [WARNING][5204] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9563538b262083fde51e5f00fccc80cec92003d148de9cd91d24b213d43ef190" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--4234abe502-k8s-calico--apiserver--84c64ddb56--5dt2v-eth0", GenerateName:"calico-apiserver-84c64ddb56-", Namespace:"calico-apiserver", SelfLink:"", UID:"da20061a-c164-4dad-aec7-b54414ff9706", ResourceVersion:"1227", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 49, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"84c64ddb56", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-4234abe502", ContainerID:"3182a56ea9946ba5082e3e29fd441f6cf589a98ff0116cb3608dd30050fed381", Pod:"calico-apiserver-84c64ddb56-5dt2v", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.86.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"caliebc373168f1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:51:05.485723 env[1480]: 2025-05-17 00:51:05.428 [INFO][5204] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="9563538b262083fde51e5f00fccc80cec92003d148de9cd91d24b213d43ef190" May 17 00:51:05.485723 env[1480]: 2025-05-17 00:51:05.428 [INFO][5204] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9563538b262083fde51e5f00fccc80cec92003d148de9cd91d24b213d43ef190" iface="eth0" netns="" May 17 00:51:05.485723 env[1480]: 2025-05-17 00:51:05.429 [INFO][5204] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="9563538b262083fde51e5f00fccc80cec92003d148de9cd91d24b213d43ef190" May 17 00:51:05.485723 env[1480]: 2025-05-17 00:51:05.429 [INFO][5204] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9563538b262083fde51e5f00fccc80cec92003d148de9cd91d24b213d43ef190" May 17 00:51:05.485723 env[1480]: 2025-05-17 00:51:05.467 [INFO][5211] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9563538b262083fde51e5f00fccc80cec92003d148de9cd91d24b213d43ef190" HandleID="k8s-pod-network.9563538b262083fde51e5f00fccc80cec92003d148de9cd91d24b213d43ef190" Workload="ci--3510.3.7--n--4234abe502-k8s-calico--apiserver--84c64ddb56--5dt2v-eth0" May 17 00:51:05.485723 env[1480]: 2025-05-17 00:51:05.467 [INFO][5211] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:51:05.485723 env[1480]: 2025-05-17 00:51:05.467 [INFO][5211] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:51:05.485723 env[1480]: 2025-05-17 00:51:05.481 [WARNING][5211] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9563538b262083fde51e5f00fccc80cec92003d148de9cd91d24b213d43ef190" HandleID="k8s-pod-network.9563538b262083fde51e5f00fccc80cec92003d148de9cd91d24b213d43ef190" Workload="ci--3510.3.7--n--4234abe502-k8s-calico--apiserver--84c64ddb56--5dt2v-eth0" May 17 00:51:05.485723 env[1480]: 2025-05-17 00:51:05.481 [INFO][5211] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9563538b262083fde51e5f00fccc80cec92003d148de9cd91d24b213d43ef190" HandleID="k8s-pod-network.9563538b262083fde51e5f00fccc80cec92003d148de9cd91d24b213d43ef190" Workload="ci--3510.3.7--n--4234abe502-k8s-calico--apiserver--84c64ddb56--5dt2v-eth0" May 17 00:51:05.485723 env[1480]: 2025-05-17 00:51:05.483 [INFO][5211] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:51:05.485723 env[1480]: 2025-05-17 00:51:05.484 [INFO][5204] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="9563538b262083fde51e5f00fccc80cec92003d148de9cd91d24b213d43ef190" May 17 00:51:05.486306 env[1480]: time="2025-05-17T00:51:05.485758840Z" level=info msg="TearDown network for sandbox \"9563538b262083fde51e5f00fccc80cec92003d148de9cd91d24b213d43ef190\" successfully" May 17 00:51:05.486306 env[1480]: time="2025-05-17T00:51:05.485791838Z" level=info msg="StopPodSandbox for \"9563538b262083fde51e5f00fccc80cec92003d148de9cd91d24b213d43ef190\" returns successfully" May 17 00:51:05.486427 env[1480]: time="2025-05-17T00:51:05.486390968Z" level=info msg="RemovePodSandbox for \"9563538b262083fde51e5f00fccc80cec92003d148de9cd91d24b213d43ef190\"" May 17 00:51:05.486476 env[1480]: time="2025-05-17T00:51:05.486434085Z" level=info msg="Forcibly stopping sandbox \"9563538b262083fde51e5f00fccc80cec92003d148de9cd91d24b213d43ef190\"" May 17 00:51:05.543679 env[1480]: time="2025-05-17T00:51:05.543620939Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:51:05.584895 env[1480]: 2025-05-17 00:51:05.545 [WARNING][5226] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9563538b262083fde51e5f00fccc80cec92003d148de9cd91d24b213d43ef190" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--4234abe502-k8s-calico--apiserver--84c64ddb56--5dt2v-eth0", GenerateName:"calico-apiserver-84c64ddb56-", Namespace:"calico-apiserver", SelfLink:"", UID:"da20061a-c164-4dad-aec7-b54414ff9706", ResourceVersion:"1227", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 49, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"84c64ddb56", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-4234abe502", ContainerID:"3182a56ea9946ba5082e3e29fd441f6cf589a98ff0116cb3608dd30050fed381", Pod:"calico-apiserver-84c64ddb56-5dt2v", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.86.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"caliebc373168f1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:51:05.584895 env[1480]: 2025-05-17 00:51:05.545 [INFO][5226] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="9563538b262083fde51e5f00fccc80cec92003d148de9cd91d24b213d43ef190" May 17 00:51:05.584895 env[1480]: 2025-05-17 00:51:05.545 [INFO][5226] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9563538b262083fde51e5f00fccc80cec92003d148de9cd91d24b213d43ef190" iface="eth0" netns="" May 17 00:51:05.584895 env[1480]: 2025-05-17 00:51:05.545 [INFO][5226] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="9563538b262083fde51e5f00fccc80cec92003d148de9cd91d24b213d43ef190" May 17 00:51:05.584895 env[1480]: 2025-05-17 00:51:05.545 [INFO][5226] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9563538b262083fde51e5f00fccc80cec92003d148de9cd91d24b213d43ef190" May 17 00:51:05.584895 env[1480]: 2025-05-17 00:51:05.571 [INFO][5233] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9563538b262083fde51e5f00fccc80cec92003d148de9cd91d24b213d43ef190" HandleID="k8s-pod-network.9563538b262083fde51e5f00fccc80cec92003d148de9cd91d24b213d43ef190" Workload="ci--3510.3.7--n--4234abe502-k8s-calico--apiserver--84c64ddb56--5dt2v-eth0" May 17 00:51:05.584895 env[1480]: 2025-05-17 00:51:05.571 [INFO][5233] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:51:05.584895 env[1480]: 2025-05-17 00:51:05.571 [INFO][5233] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:51:05.584895 env[1480]: 2025-05-17 00:51:05.580 [WARNING][5233] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9563538b262083fde51e5f00fccc80cec92003d148de9cd91d24b213d43ef190" HandleID="k8s-pod-network.9563538b262083fde51e5f00fccc80cec92003d148de9cd91d24b213d43ef190" Workload="ci--3510.3.7--n--4234abe502-k8s-calico--apiserver--84c64ddb56--5dt2v-eth0" May 17 00:51:05.584895 env[1480]: 2025-05-17 00:51:05.581 [INFO][5233] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9563538b262083fde51e5f00fccc80cec92003d148de9cd91d24b213d43ef190" HandleID="k8s-pod-network.9563538b262083fde51e5f00fccc80cec92003d148de9cd91d24b213d43ef190" Workload="ci--3510.3.7--n--4234abe502-k8s-calico--apiserver--84c64ddb56--5dt2v-eth0" May 17 00:51:05.584895 env[1480]: 2025-05-17 00:51:05.582 [INFO][5233] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:51:05.584895 env[1480]: 2025-05-17 00:51:05.583 [INFO][5226] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="9563538b262083fde51e5f00fccc80cec92003d148de9cd91d24b213d43ef190" May 17 00:51:05.585360 env[1480]: time="2025-05-17T00:51:05.584934519Z" level=info msg="TearDown network for sandbox \"9563538b262083fde51e5f00fccc80cec92003d148de9cd91d24b213d43ef190\" successfully" May 17 00:51:05.684343 env[1480]: time="2025-05-17T00:51:05.684292469Z" level=info msg="RemovePodSandbox \"9563538b262083fde51e5f00fccc80cec92003d148de9cd91d24b213d43ef190\" returns successfully" May 17 00:51:05.685183 env[1480]: time="2025-05-17T00:51:05.685138266Z" level=info msg="StopPodSandbox for \"2bf27c97334f783392bef269595031dbf8ae790b9dbf3dac41943a7c9af70091\"" May 17 00:51:05.688813 env[1480]: time="2025-05-17T00:51:05.688774561Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:0d503660232383641bf9af3b7e4ef066c0e96a8ec586f123e5b56b6a196c983d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:51:05.783989 env[1480]: 2025-05-17 00:51:05.734 [WARNING][5249] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="2bf27c97334f783392bef269595031dbf8ae790b9dbf3dac41943a7c9af70091" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--4234abe502-k8s-calico--kube--controllers--647fb858cc--jtf2c-eth0", GenerateName:"calico-kube-controllers-647fb858cc-", Namespace:"calico-system", SelfLink:"", UID:"cfe725ea-fbe7-42b1-b5de-fc1e1a86ac51", ResourceVersion:"1190", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 49, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"647fb858cc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-4234abe502", ContainerID:"3fe75f67e59eb8ceb42c25b651f0c0f61478108befbc3f1dd795a5bcf4f067b9", Pod:"calico-kube-controllers-647fb858cc-jtf2c", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.86.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali746fd20fc8f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:51:05.783989 env[1480]: 2025-05-17 00:51:05.734 [INFO][5249] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="2bf27c97334f783392bef269595031dbf8ae790b9dbf3dac41943a7c9af70091" May 17 00:51:05.783989 env[1480]: 2025-05-17 00:51:05.734 [INFO][5249] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="2bf27c97334f783392bef269595031dbf8ae790b9dbf3dac41943a7c9af70091" iface="eth0" netns="" May 17 00:51:05.783989 env[1480]: 2025-05-17 00:51:05.734 [INFO][5249] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="2bf27c97334f783392bef269595031dbf8ae790b9dbf3dac41943a7c9af70091" May 17 00:51:05.783989 env[1480]: 2025-05-17 00:51:05.734 [INFO][5249] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2bf27c97334f783392bef269595031dbf8ae790b9dbf3dac41943a7c9af70091" May 17 00:51:05.783989 env[1480]: 2025-05-17 00:51:05.767 [INFO][5256] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2bf27c97334f783392bef269595031dbf8ae790b9dbf3dac41943a7c9af70091" HandleID="k8s-pod-network.2bf27c97334f783392bef269595031dbf8ae790b9dbf3dac41943a7c9af70091" Workload="ci--3510.3.7--n--4234abe502-k8s-calico--kube--controllers--647fb858cc--jtf2c-eth0" May 17 00:51:05.783989 env[1480]: 2025-05-17 00:51:05.767 [INFO][5256] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:51:05.783989 env[1480]: 2025-05-17 00:51:05.769 [INFO][5256] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:51:05.783989 env[1480]: 2025-05-17 00:51:05.778 [WARNING][5256] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2bf27c97334f783392bef269595031dbf8ae790b9dbf3dac41943a7c9af70091" HandleID="k8s-pod-network.2bf27c97334f783392bef269595031dbf8ae790b9dbf3dac41943a7c9af70091" Workload="ci--3510.3.7--n--4234abe502-k8s-calico--kube--controllers--647fb858cc--jtf2c-eth0" May 17 00:51:05.783989 env[1480]: 2025-05-17 00:51:05.778 [INFO][5256] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2bf27c97334f783392bef269595031dbf8ae790b9dbf3dac41943a7c9af70091" HandleID="k8s-pod-network.2bf27c97334f783392bef269595031dbf8ae790b9dbf3dac41943a7c9af70091" Workload="ci--3510.3.7--n--4234abe502-k8s-calico--kube--controllers--647fb858cc--jtf2c-eth0" May 17 00:51:05.783989 env[1480]: 2025-05-17 00:51:05.781 [INFO][5256] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:51:05.783989 env[1480]: 2025-05-17 00:51:05.782 [INFO][5249] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="2bf27c97334f783392bef269595031dbf8ae790b9dbf3dac41943a7c9af70091" May 17 00:51:05.784499 env[1480]: time="2025-05-17T00:51:05.784023200Z" level=info msg="TearDown network for sandbox \"2bf27c97334f783392bef269595031dbf8ae790b9dbf3dac41943a7c9af70091\" successfully" May 17 00:51:05.784499 env[1480]: time="2025-05-17T00:51:05.784052758Z" level=info msg="StopPodSandbox for \"2bf27c97334f783392bef269595031dbf8ae790b9dbf3dac41943a7c9af70091\" returns successfully" May 17 00:51:05.785001 env[1480]: time="2025-05-17T00:51:05.784970112Z" level=info msg="RemovePodSandbox for \"2bf27c97334f783392bef269595031dbf8ae790b9dbf3dac41943a7c9af70091\"" May 17 00:51:05.785086 env[1480]: time="2025-05-17T00:51:05.785005830Z" level=info msg="Forcibly stopping sandbox \"2bf27c97334f783392bef269595031dbf8ae790b9dbf3dac41943a7c9af70091\"" May 17 00:51:05.794070 env[1480]: time="2025-05-17T00:51:05.794024652Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:51:05.841309 env[1480]: time="2025-05-17T00:51:05.841265250Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:ad7d2e76f15777636c5d91c108d7655659b38fe8970255050ffa51223eb96ff4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:51:05.842105 env[1480]: time="2025-05-17T00:51:05.841742226Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\" returns image reference \"sha256:0d503660232383641bf9af3b7e4ef066c0e96a8ec586f123e5b56b6a196c983d\"" May 17 00:51:05.844330 env[1480]: time="2025-05-17T00:51:05.844296936Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0\"" May 17 00:51:05.882183 env[1480]: 2025-05-17 00:51:05.829 [WARNING][5270] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="2bf27c97334f783392bef269595031dbf8ae790b9dbf3dac41943a7c9af70091" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--4234abe502-k8s-calico--kube--controllers--647fb858cc--jtf2c-eth0", GenerateName:"calico-kube-controllers-647fb858cc-", Namespace:"calico-system", SelfLink:"", UID:"cfe725ea-fbe7-42b1-b5de-fc1e1a86ac51", ResourceVersion:"1190", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 49, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"647fb858cc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-4234abe502", ContainerID:"3fe75f67e59eb8ceb42c25b651f0c0f61478108befbc3f1dd795a5bcf4f067b9", Pod:"calico-kube-controllers-647fb858cc-jtf2c", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.86.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali746fd20fc8f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:51:05.882183 env[1480]: 2025-05-17 00:51:05.830 [INFO][5270] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="2bf27c97334f783392bef269595031dbf8ae790b9dbf3dac41943a7c9af70091" May 17 00:51:05.882183 env[1480]: 2025-05-17 00:51:05.830 [INFO][5270] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="2bf27c97334f783392bef269595031dbf8ae790b9dbf3dac41943a7c9af70091" iface="eth0" netns="" May 17 00:51:05.882183 env[1480]: 2025-05-17 00:51:05.830 [INFO][5270] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="2bf27c97334f783392bef269595031dbf8ae790b9dbf3dac41943a7c9af70091" May 17 00:51:05.882183 env[1480]: 2025-05-17 00:51:05.830 [INFO][5270] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2bf27c97334f783392bef269595031dbf8ae790b9dbf3dac41943a7c9af70091" May 17 00:51:05.882183 env[1480]: 2025-05-17 00:51:05.866 [INFO][5277] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2bf27c97334f783392bef269595031dbf8ae790b9dbf3dac41943a7c9af70091" HandleID="k8s-pod-network.2bf27c97334f783392bef269595031dbf8ae790b9dbf3dac41943a7c9af70091" Workload="ci--3510.3.7--n--4234abe502-k8s-calico--kube--controllers--647fb858cc--jtf2c-eth0" May 17 00:51:05.882183 env[1480]: 2025-05-17 00:51:05.867 [INFO][5277] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:51:05.882183 env[1480]: 2025-05-17 00:51:05.867 [INFO][5277] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:51:05.882183 env[1480]: 2025-05-17 00:51:05.877 [WARNING][5277] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2bf27c97334f783392bef269595031dbf8ae790b9dbf3dac41943a7c9af70091" HandleID="k8s-pod-network.2bf27c97334f783392bef269595031dbf8ae790b9dbf3dac41943a7c9af70091" Workload="ci--3510.3.7--n--4234abe502-k8s-calico--kube--controllers--647fb858cc--jtf2c-eth0" May 17 00:51:05.882183 env[1480]: 2025-05-17 00:51:05.877 [INFO][5277] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2bf27c97334f783392bef269595031dbf8ae790b9dbf3dac41943a7c9af70091" HandleID="k8s-pod-network.2bf27c97334f783392bef269595031dbf8ae790b9dbf3dac41943a7c9af70091" Workload="ci--3510.3.7--n--4234abe502-k8s-calico--kube--controllers--647fb858cc--jtf2c-eth0" May 17 00:51:05.882183 env[1480]: 2025-05-17 00:51:05.879 [INFO][5277] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:51:05.882183 env[1480]: 2025-05-17 00:51:05.880 [INFO][5270] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="2bf27c97334f783392bef269595031dbf8ae790b9dbf3dac41943a7c9af70091" May 17 00:51:05.882656 env[1480]: time="2025-05-17T00:51:05.882212729Z" level=info msg="TearDown network for sandbox \"2bf27c97334f783392bef269595031dbf8ae790b9dbf3dac41943a7c9af70091\" successfully" May 17 00:51:05.936035 env[1480]: time="2025-05-17T00:51:05.935937199Z" level=info msg="CreateContainer within sandbox \"5646210db81d6961dfb04dcbdfce1e656b59480b0ab5126211bef0adcacf875b\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 17 00:51:06.006388 env[1480]: time="2025-05-17T00:51:06.006325626Z" level=info msg="RemovePodSandbox \"2bf27c97334f783392bef269595031dbf8ae790b9dbf3dac41943a7c9af70091\" returns successfully" May 17 00:51:06.007126 env[1480]: time="2025-05-17T00:51:06.007102507Z" level=info msg="StopPodSandbox for \"d73a88f26a68cb38ad153b5fa3ee8edcb210df1776ea641e21a02841b7ef2432\"" May 17 00:51:06.100119 env[1480]: 2025-05-17 00:51:06.056 [WARNING][5293] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d73a88f26a68cb38ad153b5fa3ee8edcb210df1776ea641e21a02841b7ef2432" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--4234abe502-k8s-coredns--674b8bbfcf--j679t-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"91388974-d4b7-418c-97fd-7623f7fc5ad5", ResourceVersion:"1102", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 49, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-4234abe502", ContainerID:"bc9e9c14071efdcf7e33b44031799c0b1d9688d0324fb2e75f80cbe349c01178", Pod:"coredns-674b8bbfcf-j679t", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.86.199/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali72ba905362e", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:51:06.100119 env[1480]: 2025-05-17 00:51:06.056 [INFO][5293] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="d73a88f26a68cb38ad153b5fa3ee8edcb210df1776ea641e21a02841b7ef2432" May 17 00:51:06.100119 env[1480]: 2025-05-17 00:51:06.056 [INFO][5293] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d73a88f26a68cb38ad153b5fa3ee8edcb210df1776ea641e21a02841b7ef2432" iface="eth0" netns="" May 17 00:51:06.100119 env[1480]: 2025-05-17 00:51:06.056 [INFO][5293] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="d73a88f26a68cb38ad153b5fa3ee8edcb210df1776ea641e21a02841b7ef2432" May 17 00:51:06.100119 env[1480]: 2025-05-17 00:51:06.056 [INFO][5293] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d73a88f26a68cb38ad153b5fa3ee8edcb210df1776ea641e21a02841b7ef2432" May 17 00:51:06.100119 env[1480]: 2025-05-17 00:51:06.080 [INFO][5301] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d73a88f26a68cb38ad153b5fa3ee8edcb210df1776ea641e21a02841b7ef2432" HandleID="k8s-pod-network.d73a88f26a68cb38ad153b5fa3ee8edcb210df1776ea641e21a02841b7ef2432" Workload="ci--3510.3.7--n--4234abe502-k8s-coredns--674b8bbfcf--j679t-eth0" May 17 00:51:06.100119 env[1480]: 2025-05-17 00:51:06.081 [INFO][5301] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:51:06.100119 env[1480]: 2025-05-17 00:51:06.081 [INFO][5301] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:51:06.100119 env[1480]: 2025-05-17 00:51:06.091 [WARNING][5301] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d73a88f26a68cb38ad153b5fa3ee8edcb210df1776ea641e21a02841b7ef2432" HandleID="k8s-pod-network.d73a88f26a68cb38ad153b5fa3ee8edcb210df1776ea641e21a02841b7ef2432" Workload="ci--3510.3.7--n--4234abe502-k8s-coredns--674b8bbfcf--j679t-eth0" May 17 00:51:06.100119 env[1480]: 2025-05-17 00:51:06.091 [INFO][5301] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d73a88f26a68cb38ad153b5fa3ee8edcb210df1776ea641e21a02841b7ef2432" HandleID="k8s-pod-network.d73a88f26a68cb38ad153b5fa3ee8edcb210df1776ea641e21a02841b7ef2432" Workload="ci--3510.3.7--n--4234abe502-k8s-coredns--674b8bbfcf--j679t-eth0" May 17 00:51:06.100119 env[1480]: 2025-05-17 00:51:06.097 [INFO][5301] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:51:06.100119 env[1480]: 2025-05-17 00:51:06.098 [INFO][5293] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="d73a88f26a68cb38ad153b5fa3ee8edcb210df1776ea641e21a02841b7ef2432" May 17 00:51:06.100728 env[1480]: time="2025-05-17T00:51:06.100692551Z" level=info msg="TearDown network for sandbox \"d73a88f26a68cb38ad153b5fa3ee8edcb210df1776ea641e21a02841b7ef2432\" successfully" May 17 00:51:06.100797 env[1480]: time="2025-05-17T00:51:06.100781867Z" level=info msg="StopPodSandbox for \"d73a88f26a68cb38ad153b5fa3ee8edcb210df1776ea641e21a02841b7ef2432\" returns successfully" May 17 00:51:06.101353 env[1480]: time="2025-05-17T00:51:06.101319200Z" level=info msg="RemovePodSandbox for \"d73a88f26a68cb38ad153b5fa3ee8edcb210df1776ea641e21a02841b7ef2432\"" May 17 00:51:06.101651 env[1480]: time="2025-05-17T00:51:06.101607146Z" level=info msg="Forcibly stopping sandbox \"d73a88f26a68cb38ad153b5fa3ee8edcb210df1776ea641e21a02841b7ef2432\"" May 17 00:51:06.238057 env[1480]: 2025-05-17 00:51:06.153 [WARNING][5317] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d73a88f26a68cb38ad153b5fa3ee8edcb210df1776ea641e21a02841b7ef2432" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--4234abe502-k8s-coredns--674b8bbfcf--j679t-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"91388974-d4b7-418c-97fd-7623f7fc5ad5", ResourceVersion:"1102", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 49, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-4234abe502", ContainerID:"bc9e9c14071efdcf7e33b44031799c0b1d9688d0324fb2e75f80cbe349c01178", Pod:"coredns-674b8bbfcf-j679t", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.86.199/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali72ba905362e", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:51:06.238057 env[1480]: 2025-05-17 00:51:06.153 [INFO][5317] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="d73a88f26a68cb38ad153b5fa3ee8edcb210df1776ea641e21a02841b7ef2432" May 17 00:51:06.238057 env[1480]: 2025-05-17 00:51:06.153 [INFO][5317] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d73a88f26a68cb38ad153b5fa3ee8edcb210df1776ea641e21a02841b7ef2432" iface="eth0" netns="" May 17 00:51:06.238057 env[1480]: 2025-05-17 00:51:06.153 [INFO][5317] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="d73a88f26a68cb38ad153b5fa3ee8edcb210df1776ea641e21a02841b7ef2432" May 17 00:51:06.238057 env[1480]: 2025-05-17 00:51:06.153 [INFO][5317] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d73a88f26a68cb38ad153b5fa3ee8edcb210df1776ea641e21a02841b7ef2432" May 17 00:51:06.238057 env[1480]: 2025-05-17 00:51:06.201 [INFO][5325] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d73a88f26a68cb38ad153b5fa3ee8edcb210df1776ea641e21a02841b7ef2432" HandleID="k8s-pod-network.d73a88f26a68cb38ad153b5fa3ee8edcb210df1776ea641e21a02841b7ef2432" Workload="ci--3510.3.7--n--4234abe502-k8s-coredns--674b8bbfcf--j679t-eth0" May 17 00:51:06.238057 env[1480]: 2025-05-17 00:51:06.201 [INFO][5325] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:51:06.238057 env[1480]: 2025-05-17 00:51:06.201 [INFO][5325] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:51:06.238057 env[1480]: 2025-05-17 00:51:06.232 [WARNING][5325] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d73a88f26a68cb38ad153b5fa3ee8edcb210df1776ea641e21a02841b7ef2432" HandleID="k8s-pod-network.d73a88f26a68cb38ad153b5fa3ee8edcb210df1776ea641e21a02841b7ef2432" Workload="ci--3510.3.7--n--4234abe502-k8s-coredns--674b8bbfcf--j679t-eth0" May 17 00:51:06.238057 env[1480]: 2025-05-17 00:51:06.232 [INFO][5325] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d73a88f26a68cb38ad153b5fa3ee8edcb210df1776ea641e21a02841b7ef2432" HandleID="k8s-pod-network.d73a88f26a68cb38ad153b5fa3ee8edcb210df1776ea641e21a02841b7ef2432" Workload="ci--3510.3.7--n--4234abe502-k8s-coredns--674b8bbfcf--j679t-eth0" May 17 00:51:06.238057 env[1480]: 2025-05-17 00:51:06.235 [INFO][5325] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:51:06.238057 env[1480]: 2025-05-17 00:51:06.236 [INFO][5317] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="d73a88f26a68cb38ad153b5fa3ee8edcb210df1776ea641e21a02841b7ef2432" May 17 00:51:06.238637 env[1480]: time="2025-05-17T00:51:06.238603181Z" level=info msg="TearDown network for sandbox \"d73a88f26a68cb38ad153b5fa3ee8edcb210df1776ea641e21a02841b7ef2432\" successfully" May 17 00:51:06.487954 env[1480]: time="2025-05-17T00:51:06.487899045Z" level=info msg="RemovePodSandbox \"d73a88f26a68cb38ad153b5fa3ee8edcb210df1776ea641e21a02841b7ef2432\" returns successfully" May 17 00:51:06.489083 env[1480]: time="2025-05-17T00:51:06.489003230Z" level=info msg="StopPodSandbox for \"7bf04d39c27ca92b349cae2ca88c5f3cc20bf650b9e82aa96d6c732c9127f64b\"" May 17 00:51:06.539419 env[1480]: time="2025-05-17T00:51:06.539348155Z" level=info msg="CreateContainer within sandbox \"5646210db81d6961dfb04dcbdfce1e656b59480b0ab5126211bef0adcacf875b\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"29fdde2f23b92bb7b5211789d1de47b9f51b864caae19a6161ae046ad528af86\"" May 17 00:51:06.541217 env[1480]: time="2025-05-17T00:51:06.540114677Z" level=info msg="StartContainer for \"29fdde2f23b92bb7b5211789d1de47b9f51b864caae19a6161ae046ad528af86\"" May 17 00:51:06.577584 systemd[1]: Started cri-containerd-29fdde2f23b92bb7b5211789d1de47b9f51b864caae19a6161ae046ad528af86.scope. May 17 00:51:06.587111 systemd[1]: run-containerd-runc-k8s.io-29fdde2f23b92bb7b5211789d1de47b9f51b864caae19a6161ae046ad528af86-runc.itoLbU.mount: Deactivated successfully. May 17 00:51:06.598034 env[1480]: 2025-05-17 00:51:06.529 [WARNING][5339] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7bf04d39c27ca92b349cae2ca88c5f3cc20bf650b9e82aa96d6c732c9127f64b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--4234abe502-k8s-calico--apiserver--84c64ddb56--27tsz-eth0", GenerateName:"calico-apiserver-84c64ddb56-", Namespace:"calico-apiserver", SelfLink:"", UID:"072e45c7-a564-4ff1-8f56-8086de5cb47f", ResourceVersion:"1090", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 49, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"84c64ddb56", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-4234abe502", ContainerID:"5646210db81d6961dfb04dcbdfce1e656b59480b0ab5126211bef0adcacf875b", Pod:"calico-apiserver-84c64ddb56-27tsz", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.86.200/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali5bc0762f53e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:51:06.598034 env[1480]: 2025-05-17 00:51:06.529 [INFO][5339] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="7bf04d39c27ca92b349cae2ca88c5f3cc20bf650b9e82aa96d6c732c9127f64b" May 17 00:51:06.598034 env[1480]: 2025-05-17 00:51:06.529 [INFO][5339] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7bf04d39c27ca92b349cae2ca88c5f3cc20bf650b9e82aa96d6c732c9127f64b" iface="eth0" netns="" May 17 00:51:06.598034 env[1480]: 2025-05-17 00:51:06.530 [INFO][5339] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="7bf04d39c27ca92b349cae2ca88c5f3cc20bf650b9e82aa96d6c732c9127f64b" May 17 00:51:06.598034 env[1480]: 2025-05-17 00:51:06.530 [INFO][5339] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7bf04d39c27ca92b349cae2ca88c5f3cc20bf650b9e82aa96d6c732c9127f64b" May 17 00:51:06.598034 env[1480]: 2025-05-17 00:51:06.567 [INFO][5346] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7bf04d39c27ca92b349cae2ca88c5f3cc20bf650b9e82aa96d6c732c9127f64b" HandleID="k8s-pod-network.7bf04d39c27ca92b349cae2ca88c5f3cc20bf650b9e82aa96d6c732c9127f64b" Workload="ci--3510.3.7--n--4234abe502-k8s-calico--apiserver--84c64ddb56--27tsz-eth0" May 17 00:51:06.598034 env[1480]: 2025-05-17 00:51:06.567 [INFO][5346] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:51:06.598034 env[1480]: 2025-05-17 00:51:06.568 [INFO][5346] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:51:06.598034 env[1480]: 2025-05-17 00:51:06.590 [WARNING][5346] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7bf04d39c27ca92b349cae2ca88c5f3cc20bf650b9e82aa96d6c732c9127f64b" HandleID="k8s-pod-network.7bf04d39c27ca92b349cae2ca88c5f3cc20bf650b9e82aa96d6c732c9127f64b" Workload="ci--3510.3.7--n--4234abe502-k8s-calico--apiserver--84c64ddb56--27tsz-eth0" May 17 00:51:06.598034 env[1480]: 2025-05-17 00:51:06.590 [INFO][5346] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7bf04d39c27ca92b349cae2ca88c5f3cc20bf650b9e82aa96d6c732c9127f64b" HandleID="k8s-pod-network.7bf04d39c27ca92b349cae2ca88c5f3cc20bf650b9e82aa96d6c732c9127f64b" Workload="ci--3510.3.7--n--4234abe502-k8s-calico--apiserver--84c64ddb56--27tsz-eth0" May 17 00:51:06.598034 env[1480]: 2025-05-17 00:51:06.592 [INFO][5346] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:51:06.598034 env[1480]: 2025-05-17 00:51:06.596 [INFO][5339] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="7bf04d39c27ca92b349cae2ca88c5f3cc20bf650b9e82aa96d6c732c9127f64b" May 17 00:51:06.598782 env[1480]: time="2025-05-17T00:51:06.598745107Z" level=info msg="TearDown network for sandbox \"7bf04d39c27ca92b349cae2ca88c5f3cc20bf650b9e82aa96d6c732c9127f64b\" successfully" May 17 00:51:06.599368 env[1480]: time="2025-05-17T00:51:06.599338358Z" level=info msg="StopPodSandbox for \"7bf04d39c27ca92b349cae2ca88c5f3cc20bf650b9e82aa96d6c732c9127f64b\" returns successfully" May 17 00:51:06.600214 env[1480]: time="2025-05-17T00:51:06.600177076Z" level=info msg="RemovePodSandbox for \"7bf04d39c27ca92b349cae2ca88c5f3cc20bf650b9e82aa96d6c732c9127f64b\"" May 17 00:51:06.600347 env[1480]: time="2025-05-17T00:51:06.600219234Z" level=info msg="Forcibly stopping sandbox \"7bf04d39c27ca92b349cae2ca88c5f3cc20bf650b9e82aa96d6c732c9127f64b\"" May 17 00:51:06.622309 kernel: kauditd_printk_skb: 14 callbacks suppressed May 17 00:51:06.622437 kernel: audit: type=1400 audit(1747443066.616:1308): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:06.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:06.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:06.682247 kernel: audit: type=1400 audit(1747443066.616:1309): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:06.682424 kernel: audit: type=1400 audit(1747443066.616:1310): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:06.682464 kernel: audit: type=1400 audit(1747443066.616:1311): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:06.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:06.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:06.702029 kernel: audit: type=1400 audit(1747443066.616:1312): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:06.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:06.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:06.738500 kernel: audit: type=1400 audit(1747443066.616:1313): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:06.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:06.757281 kernel: audit: type=1400 audit(1747443066.616:1314): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:06.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:06.776883 kernel: audit: type=1400 audit(1747443066.616:1315): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:06.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:06.795712 kernel: audit: type=1400 audit(1747443066.616:1316): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:06.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:06.815178 kernel: audit: type=1400 audit(1747443066.621:1317): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:06.621000 audit: BPF prog-id=207 op=LOAD May 17 00:51:06.639000 audit[5356]: AVC avc: denied { bpf } for pid=5356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:06.639000 audit[5356]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4895 pid=5356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:06.639000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239666464653266323362393262623762353231313738396431646534 May 17 00:51:06.639000 audit[5356]: AVC avc: denied { perfmon } for pid=5356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:06.639000 audit[5356]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4895 pid=5356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:06.639000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239666464653266323362393262623762353231313738396431646534 May 17 00:51:06.639000 audit[5356]: AVC avc: denied { bpf } for pid=5356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:06.639000 audit[5356]: AVC avc: denied { bpf } for pid=5356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:06.639000 audit[5356]: AVC avc: denied { bpf } for pid=5356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:06.639000 audit[5356]: AVC avc: denied { perfmon } for pid=5356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:06.639000 audit[5356]: AVC avc: denied { perfmon } for pid=5356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:06.639000 audit[5356]: AVC avc: denied { perfmon } for pid=5356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:06.639000 audit[5356]: AVC avc: denied { perfmon } for pid=5356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:06.639000 audit[5356]: AVC avc: denied { perfmon } for pid=5356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:06.639000 audit[5356]: AVC avc: denied { bpf } for pid=5356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:06.639000 audit[5356]: AVC avc: denied { bpf } for pid=5356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:06.639000 audit: BPF prog-id=208 op=LOAD May 17 00:51:06.639000 audit[5356]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4895 pid=5356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:06.639000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239666464653266323362393262623762353231313738396431646534 May 17 00:51:06.681000 audit[5356]: AVC avc: denied { bpf } for pid=5356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:06.681000 audit[5356]: AVC avc: denied { bpf } for pid=5356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:06.681000 audit[5356]: AVC avc: denied { perfmon } for pid=5356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:06.681000 audit[5356]: AVC avc: denied { perfmon } for pid=5356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:06.681000 audit[5356]: AVC avc: denied { perfmon } for pid=5356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:06.681000 audit[5356]: AVC avc: denied { perfmon } for pid=5356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:06.681000 audit[5356]: AVC avc: denied { perfmon } for pid=5356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:06.681000 audit[5356]: AVC avc: denied { bpf } for pid=5356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:06.681000 audit[5356]: AVC avc: denied { bpf } for pid=5356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:06.681000 audit: BPF prog-id=209 op=LOAD May 17 00:51:06.681000 audit[5356]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4895 pid=5356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:06.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239666464653266323362393262623762353231313738396431646534 May 17 00:51:06.705000 audit: BPF prog-id=209 op=UNLOAD May 17 00:51:06.705000 audit: BPF prog-id=208 op=UNLOAD May 17 00:51:06.705000 audit[5356]: AVC avc: denied { bpf } for pid=5356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:06.705000 audit[5356]: AVC avc: denied { bpf } for pid=5356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:06.705000 audit[5356]: AVC avc: denied { bpf } for pid=5356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:06.705000 audit[5356]: AVC avc: denied { perfmon } for pid=5356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:06.705000 audit[5356]: AVC avc: denied { perfmon } for pid=5356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:06.705000 audit[5356]: AVC avc: denied { perfmon } for pid=5356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:06.705000 audit[5356]: AVC avc: denied { perfmon } for pid=5356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:06.705000 audit[5356]: AVC avc: denied { perfmon } for pid=5356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:06.705000 audit[5356]: AVC avc: denied { bpf } for pid=5356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:06.705000 audit[5356]: AVC avc: denied { bpf } for pid=5356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:06.705000 audit: BPF prog-id=210 op=LOAD May 17 00:51:06.705000 audit[5356]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4895 pid=5356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:06.705000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239666464653266323362393262623762353231313738396431646534 May 17 00:51:06.860427 env[1480]: 2025-05-17 00:51:06.743 [WARNING][5383] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7bf04d39c27ca92b349cae2ca88c5f3cc20bf650b9e82aa96d6c732c9127f64b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--4234abe502-k8s-calico--apiserver--84c64ddb56--27tsz-eth0", GenerateName:"calico-apiserver-84c64ddb56-", Namespace:"calico-apiserver", SelfLink:"", UID:"072e45c7-a564-4ff1-8f56-8086de5cb47f", ResourceVersion:"1090", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 49, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"84c64ddb56", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-4234abe502", ContainerID:"5646210db81d6961dfb04dcbdfce1e656b59480b0ab5126211bef0adcacf875b", Pod:"calico-apiserver-84c64ddb56-27tsz", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.86.200/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali5bc0762f53e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:51:06.860427 env[1480]: 2025-05-17 00:51:06.744 [INFO][5383] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="7bf04d39c27ca92b349cae2ca88c5f3cc20bf650b9e82aa96d6c732c9127f64b" May 17 00:51:06.860427 env[1480]: 2025-05-17 00:51:06.744 [INFO][5383] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7bf04d39c27ca92b349cae2ca88c5f3cc20bf650b9e82aa96d6c732c9127f64b" iface="eth0" netns="" May 17 00:51:06.860427 env[1480]: 2025-05-17 00:51:06.744 [INFO][5383] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="7bf04d39c27ca92b349cae2ca88c5f3cc20bf650b9e82aa96d6c732c9127f64b" May 17 00:51:06.860427 env[1480]: 2025-05-17 00:51:06.744 [INFO][5383] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7bf04d39c27ca92b349cae2ca88c5f3cc20bf650b9e82aa96d6c732c9127f64b" May 17 00:51:06.860427 env[1480]: 2025-05-17 00:51:06.841 [INFO][5390] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7bf04d39c27ca92b349cae2ca88c5f3cc20bf650b9e82aa96d6c732c9127f64b" HandleID="k8s-pod-network.7bf04d39c27ca92b349cae2ca88c5f3cc20bf650b9e82aa96d6c732c9127f64b" Workload="ci--3510.3.7--n--4234abe502-k8s-calico--apiserver--84c64ddb56--27tsz-eth0" May 17 00:51:06.860427 env[1480]: 2025-05-17 00:51:06.842 [INFO][5390] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:51:06.860427 env[1480]: 2025-05-17 00:51:06.842 [INFO][5390] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:51:06.860427 env[1480]: 2025-05-17 00:51:06.851 [WARNING][5390] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7bf04d39c27ca92b349cae2ca88c5f3cc20bf650b9e82aa96d6c732c9127f64b" HandleID="k8s-pod-network.7bf04d39c27ca92b349cae2ca88c5f3cc20bf650b9e82aa96d6c732c9127f64b" Workload="ci--3510.3.7--n--4234abe502-k8s-calico--apiserver--84c64ddb56--27tsz-eth0" May 17 00:51:06.860427 env[1480]: 2025-05-17 00:51:06.851 [INFO][5390] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7bf04d39c27ca92b349cae2ca88c5f3cc20bf650b9e82aa96d6c732c9127f64b" HandleID="k8s-pod-network.7bf04d39c27ca92b349cae2ca88c5f3cc20bf650b9e82aa96d6c732c9127f64b" Workload="ci--3510.3.7--n--4234abe502-k8s-calico--apiserver--84c64ddb56--27tsz-eth0" May 17 00:51:06.860427 env[1480]: 2025-05-17 00:51:06.857 [INFO][5390] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:51:06.860427 env[1480]: 2025-05-17 00:51:06.859 [INFO][5383] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="7bf04d39c27ca92b349cae2ca88c5f3cc20bf650b9e82aa96d6c732c9127f64b" May 17 00:51:06.860892 env[1480]: time="2025-05-17T00:51:06.860458991Z" level=info msg="TearDown network for sandbox \"7bf04d39c27ca92b349cae2ca88c5f3cc20bf650b9e82aa96d6c732c9127f64b\" successfully" May 17 00:51:06.945627 env[1480]: time="2025-05-17T00:51:06.945560139Z" level=info msg="StartContainer for \"29fdde2f23b92bb7b5211789d1de47b9f51b864caae19a6161ae046ad528af86\" returns successfully" May 17 00:51:06.992731 env[1480]: time="2025-05-17T00:51:06.992676185Z" level=info msg="RemovePodSandbox \"7bf04d39c27ca92b349cae2ca88c5f3cc20bf650b9e82aa96d6c732c9127f64b\" returns successfully" May 17 00:51:06.993484 env[1480]: time="2025-05-17T00:51:06.993442467Z" level=info msg="StopPodSandbox for \"04ae499c81553f3b0dff696a50f0d2cf978d190d027573199774552478710ce6\"" May 17 00:51:07.106170 env[1480]: 2025-05-17 00:51:07.048 [WARNING][5421] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="04ae499c81553f3b0dff696a50f0d2cf978d190d027573199774552478710ce6" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--4234abe502-k8s-coredns--674b8bbfcf--cxrsr-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"c807ebf0-49df-4644-b8ed-52a104f87f64", ResourceVersion:"1118", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 49, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-4234abe502", ContainerID:"7d5e002c859f81690ff99a6e500dd76eac097f5717f4459a2c6f435d1d4c6bd7", Pod:"coredns-674b8bbfcf-cxrsr", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.86.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali62e3db04d7d", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:51:07.106170 env[1480]: 2025-05-17 00:51:07.049 [INFO][5421] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="04ae499c81553f3b0dff696a50f0d2cf978d190d027573199774552478710ce6" May 17 00:51:07.106170 env[1480]: 2025-05-17 00:51:07.049 [INFO][5421] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="04ae499c81553f3b0dff696a50f0d2cf978d190d027573199774552478710ce6" iface="eth0" netns="" May 17 00:51:07.106170 env[1480]: 2025-05-17 00:51:07.049 [INFO][5421] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="04ae499c81553f3b0dff696a50f0d2cf978d190d027573199774552478710ce6" May 17 00:51:07.106170 env[1480]: 2025-05-17 00:51:07.049 [INFO][5421] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="04ae499c81553f3b0dff696a50f0d2cf978d190d027573199774552478710ce6" May 17 00:51:07.106170 env[1480]: 2025-05-17 00:51:07.079 [INFO][5428] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="04ae499c81553f3b0dff696a50f0d2cf978d190d027573199774552478710ce6" HandleID="k8s-pod-network.04ae499c81553f3b0dff696a50f0d2cf978d190d027573199774552478710ce6" Workload="ci--3510.3.7--n--4234abe502-k8s-coredns--674b8bbfcf--cxrsr-eth0" May 17 00:51:07.106170 env[1480]: 2025-05-17 00:51:07.080 [INFO][5428] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:51:07.106170 env[1480]: 2025-05-17 00:51:07.080 [INFO][5428] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:51:07.106170 env[1480]: 2025-05-17 00:51:07.099 [WARNING][5428] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="04ae499c81553f3b0dff696a50f0d2cf978d190d027573199774552478710ce6" HandleID="k8s-pod-network.04ae499c81553f3b0dff696a50f0d2cf978d190d027573199774552478710ce6" Workload="ci--3510.3.7--n--4234abe502-k8s-coredns--674b8bbfcf--cxrsr-eth0" May 17 00:51:07.106170 env[1480]: 2025-05-17 00:51:07.099 [INFO][5428] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="04ae499c81553f3b0dff696a50f0d2cf978d190d027573199774552478710ce6" HandleID="k8s-pod-network.04ae499c81553f3b0dff696a50f0d2cf978d190d027573199774552478710ce6" Workload="ci--3510.3.7--n--4234abe502-k8s-coredns--674b8bbfcf--cxrsr-eth0" May 17 00:51:07.106170 env[1480]: 2025-05-17 00:51:07.101 [INFO][5428] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:51:07.106170 env[1480]: 2025-05-17 00:51:07.102 [INFO][5421] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="04ae499c81553f3b0dff696a50f0d2cf978d190d027573199774552478710ce6" May 17 00:51:07.106170 env[1480]: time="2025-05-17T00:51:07.103496856Z" level=info msg="TearDown network for sandbox \"04ae499c81553f3b0dff696a50f0d2cf978d190d027573199774552478710ce6\" successfully" May 17 00:51:07.106170 env[1480]: time="2025-05-17T00:51:07.103526975Z" level=info msg="StopPodSandbox for \"04ae499c81553f3b0dff696a50f0d2cf978d190d027573199774552478710ce6\" returns successfully" May 17 00:51:07.106170 env[1480]: time="2025-05-17T00:51:07.104001552Z" level=info msg="RemovePodSandbox for \"04ae499c81553f3b0dff696a50f0d2cf978d190d027573199774552478710ce6\"" May 17 00:51:07.106170 env[1480]: time="2025-05-17T00:51:07.104030550Z" level=info msg="Forcibly stopping sandbox \"04ae499c81553f3b0dff696a50f0d2cf978d190d027573199774552478710ce6\"" May 17 00:51:07.215849 env[1480]: 2025-05-17 00:51:07.159 [WARNING][5443] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="04ae499c81553f3b0dff696a50f0d2cf978d190d027573199774552478710ce6" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--4234abe502-k8s-coredns--674b8bbfcf--cxrsr-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"c807ebf0-49df-4644-b8ed-52a104f87f64", ResourceVersion:"1118", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 49, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-4234abe502", ContainerID:"7d5e002c859f81690ff99a6e500dd76eac097f5717f4459a2c6f435d1d4c6bd7", Pod:"coredns-674b8bbfcf-cxrsr", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.86.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali62e3db04d7d", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:51:07.215849 env[1480]: 2025-05-17 00:51:07.159 [INFO][5443] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="04ae499c81553f3b0dff696a50f0d2cf978d190d027573199774552478710ce6" May 17 00:51:07.215849 env[1480]: 2025-05-17 00:51:07.160 [INFO][5443] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="04ae499c81553f3b0dff696a50f0d2cf978d190d027573199774552478710ce6" iface="eth0" netns="" May 17 00:51:07.215849 env[1480]: 2025-05-17 00:51:07.160 [INFO][5443] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="04ae499c81553f3b0dff696a50f0d2cf978d190d027573199774552478710ce6" May 17 00:51:07.215849 env[1480]: 2025-05-17 00:51:07.160 [INFO][5443] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="04ae499c81553f3b0dff696a50f0d2cf978d190d027573199774552478710ce6" May 17 00:51:07.215849 env[1480]: 2025-05-17 00:51:07.194 [INFO][5451] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="04ae499c81553f3b0dff696a50f0d2cf978d190d027573199774552478710ce6" HandleID="k8s-pod-network.04ae499c81553f3b0dff696a50f0d2cf978d190d027573199774552478710ce6" Workload="ci--3510.3.7--n--4234abe502-k8s-coredns--674b8bbfcf--cxrsr-eth0" May 17 00:51:07.215849 env[1480]: 2025-05-17 00:51:07.194 [INFO][5451] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:51:07.215849 env[1480]: 2025-05-17 00:51:07.194 [INFO][5451] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:51:07.215849 env[1480]: 2025-05-17 00:51:07.210 [WARNING][5451] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="04ae499c81553f3b0dff696a50f0d2cf978d190d027573199774552478710ce6" HandleID="k8s-pod-network.04ae499c81553f3b0dff696a50f0d2cf978d190d027573199774552478710ce6" Workload="ci--3510.3.7--n--4234abe502-k8s-coredns--674b8bbfcf--cxrsr-eth0" May 17 00:51:07.215849 env[1480]: 2025-05-17 00:51:07.211 [INFO][5451] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="04ae499c81553f3b0dff696a50f0d2cf978d190d027573199774552478710ce6" HandleID="k8s-pod-network.04ae499c81553f3b0dff696a50f0d2cf978d190d027573199774552478710ce6" Workload="ci--3510.3.7--n--4234abe502-k8s-coredns--674b8bbfcf--cxrsr-eth0" May 17 00:51:07.215849 env[1480]: 2025-05-17 00:51:07.213 [INFO][5451] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:51:07.215849 env[1480]: 2025-05-17 00:51:07.214 [INFO][5443] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="04ae499c81553f3b0dff696a50f0d2cf978d190d027573199774552478710ce6" May 17 00:51:07.216339 env[1480]: time="2025-05-17T00:51:07.215875257Z" level=info msg="TearDown network for sandbox \"04ae499c81553f3b0dff696a50f0d2cf978d190d027573199774552478710ce6\" successfully" May 17 00:51:07.436522 env[1480]: time="2025-05-17T00:51:07.436467543Z" level=info msg="RemovePodSandbox \"04ae499c81553f3b0dff696a50f0d2cf978d190d027573199774552478710ce6\" returns successfully" May 17 00:51:07.437049 env[1480]: time="2025-05-17T00:51:07.437019316Z" level=info msg="StopPodSandbox for \"40f13856fce73837b8380c544d31c04049bd84a3ceeb000c4fce95e608012a25\"" May 17 00:51:07.551107 env[1480]: 2025-05-17 00:51:07.505 [WARNING][5465] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="40f13856fce73837b8380c544d31c04049bd84a3ceeb000c4fce95e608012a25" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--4234abe502-k8s-csi--node--driver--52bcs-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"463fd6d8-2e06-42b8-ade3-8bda47d821b9", ResourceVersion:"1048", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 49, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-4234abe502", ContainerID:"ef88f37ad20b41a637085c66407ec0e39064d84fb7beea9b8226d24161d3c910", Pod:"csi-node-driver-52bcs", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.86.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali911774a374b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:51:07.551107 env[1480]: 2025-05-17 00:51:07.505 [INFO][5465] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="40f13856fce73837b8380c544d31c04049bd84a3ceeb000c4fce95e608012a25" May 17 00:51:07.551107 env[1480]: 2025-05-17 00:51:07.505 [INFO][5465] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="40f13856fce73837b8380c544d31c04049bd84a3ceeb000c4fce95e608012a25" iface="eth0" netns="" May 17 00:51:07.551107 env[1480]: 2025-05-17 00:51:07.505 [INFO][5465] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="40f13856fce73837b8380c544d31c04049bd84a3ceeb000c4fce95e608012a25" May 17 00:51:07.551107 env[1480]: 2025-05-17 00:51:07.505 [INFO][5465] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="40f13856fce73837b8380c544d31c04049bd84a3ceeb000c4fce95e608012a25" May 17 00:51:07.551107 env[1480]: 2025-05-17 00:51:07.536 [INFO][5472] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="40f13856fce73837b8380c544d31c04049bd84a3ceeb000c4fce95e608012a25" HandleID="k8s-pod-network.40f13856fce73837b8380c544d31c04049bd84a3ceeb000c4fce95e608012a25" Workload="ci--3510.3.7--n--4234abe502-k8s-csi--node--driver--52bcs-eth0" May 17 00:51:07.551107 env[1480]: 2025-05-17 00:51:07.536 [INFO][5472] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:51:07.551107 env[1480]: 2025-05-17 00:51:07.536 [INFO][5472] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:51:07.551107 env[1480]: 2025-05-17 00:51:07.546 [WARNING][5472] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="40f13856fce73837b8380c544d31c04049bd84a3ceeb000c4fce95e608012a25" HandleID="k8s-pod-network.40f13856fce73837b8380c544d31c04049bd84a3ceeb000c4fce95e608012a25" Workload="ci--3510.3.7--n--4234abe502-k8s-csi--node--driver--52bcs-eth0" May 17 00:51:07.551107 env[1480]: 2025-05-17 00:51:07.546 [INFO][5472] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="40f13856fce73837b8380c544d31c04049bd84a3ceeb000c4fce95e608012a25" HandleID="k8s-pod-network.40f13856fce73837b8380c544d31c04049bd84a3ceeb000c4fce95e608012a25" Workload="ci--3510.3.7--n--4234abe502-k8s-csi--node--driver--52bcs-eth0" May 17 00:51:07.551107 env[1480]: 2025-05-17 00:51:07.548 [INFO][5472] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:51:07.551107 env[1480]: 2025-05-17 00:51:07.549 [INFO][5465] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="40f13856fce73837b8380c544d31c04049bd84a3ceeb000c4fce95e608012a25" May 17 00:51:07.551756 env[1480]: time="2025-05-17T00:51:07.551133232Z" level=info msg="TearDown network for sandbox \"40f13856fce73837b8380c544d31c04049bd84a3ceeb000c4fce95e608012a25\" successfully" May 17 00:51:07.551756 env[1480]: time="2025-05-17T00:51:07.551165750Z" level=info msg="StopPodSandbox for \"40f13856fce73837b8380c544d31c04049bd84a3ceeb000c4fce95e608012a25\" returns successfully" May 17 00:51:07.551756 env[1480]: time="2025-05-17T00:51:07.551618568Z" level=info msg="RemovePodSandbox for \"40f13856fce73837b8380c544d31c04049bd84a3ceeb000c4fce95e608012a25\"" May 17 00:51:07.551756 env[1480]: time="2025-05-17T00:51:07.551648287Z" level=info msg="Forcibly stopping sandbox \"40f13856fce73837b8380c544d31c04049bd84a3ceeb000c4fce95e608012a25\"" May 17 00:51:07.621898 systemd[1]: run-containerd-runc-k8s.io-1199e8fbc8f7a8735bd0e88aee601a4d3ea26357c725870e7083c78e967fda18-runc.uOeFRI.mount: Deactivated successfully. May 17 00:51:07.691284 env[1480]: 2025-05-17 00:51:07.598 [WARNING][5486] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="40f13856fce73837b8380c544d31c04049bd84a3ceeb000c4fce95e608012a25" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--4234abe502-k8s-csi--node--driver--52bcs-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"463fd6d8-2e06-42b8-ade3-8bda47d821b9", ResourceVersion:"1048", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 49, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-4234abe502", ContainerID:"ef88f37ad20b41a637085c66407ec0e39064d84fb7beea9b8226d24161d3c910", Pod:"csi-node-driver-52bcs", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.86.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali911774a374b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:51:07.691284 env[1480]: 2025-05-17 00:51:07.598 [INFO][5486] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="40f13856fce73837b8380c544d31c04049bd84a3ceeb000c4fce95e608012a25" May 17 00:51:07.691284 env[1480]: 2025-05-17 00:51:07.598 [INFO][5486] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="40f13856fce73837b8380c544d31c04049bd84a3ceeb000c4fce95e608012a25" iface="eth0" netns="" May 17 00:51:07.691284 env[1480]: 2025-05-17 00:51:07.598 [INFO][5486] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="40f13856fce73837b8380c544d31c04049bd84a3ceeb000c4fce95e608012a25" May 17 00:51:07.691284 env[1480]: 2025-05-17 00:51:07.598 [INFO][5486] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="40f13856fce73837b8380c544d31c04049bd84a3ceeb000c4fce95e608012a25" May 17 00:51:07.691284 env[1480]: 2025-05-17 00:51:07.676 [INFO][5499] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="40f13856fce73837b8380c544d31c04049bd84a3ceeb000c4fce95e608012a25" HandleID="k8s-pod-network.40f13856fce73837b8380c544d31c04049bd84a3ceeb000c4fce95e608012a25" Workload="ci--3510.3.7--n--4234abe502-k8s-csi--node--driver--52bcs-eth0" May 17 00:51:07.691284 env[1480]: 2025-05-17 00:51:07.676 [INFO][5499] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:51:07.691284 env[1480]: 2025-05-17 00:51:07.676 [INFO][5499] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:51:07.691284 env[1480]: 2025-05-17 00:51:07.686 [WARNING][5499] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="40f13856fce73837b8380c544d31c04049bd84a3ceeb000c4fce95e608012a25" HandleID="k8s-pod-network.40f13856fce73837b8380c544d31c04049bd84a3ceeb000c4fce95e608012a25" Workload="ci--3510.3.7--n--4234abe502-k8s-csi--node--driver--52bcs-eth0" May 17 00:51:07.691284 env[1480]: 2025-05-17 00:51:07.686 [INFO][5499] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="40f13856fce73837b8380c544d31c04049bd84a3ceeb000c4fce95e608012a25" HandleID="k8s-pod-network.40f13856fce73837b8380c544d31c04049bd84a3ceeb000c4fce95e608012a25" Workload="ci--3510.3.7--n--4234abe502-k8s-csi--node--driver--52bcs-eth0" May 17 00:51:07.691284 env[1480]: 2025-05-17 00:51:07.688 [INFO][5499] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:51:07.691284 env[1480]: 2025-05-17 00:51:07.689 [INFO][5486] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="40f13856fce73837b8380c544d31c04049bd84a3ceeb000c4fce95e608012a25" May 17 00:51:07.691724 env[1480]: time="2025-05-17T00:51:07.691271709Z" level=info msg="TearDown network for sandbox \"40f13856fce73837b8380c544d31c04049bd84a3ceeb000c4fce95e608012a25\" successfully" May 17 00:51:07.914000 audit[5518]: NETFILTER_CFG table=filter:131 family=2 entries=12 op=nft_register_rule pid=5518 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:51:07.914000 audit[5518]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=ffffc85b5ec0 a2=0 a3=1 items=0 ppid=2686 pid=5518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:07.914000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:51:07.919000 audit[5518]: NETFILTER_CFG table=nat:132 family=2 entries=30 op=nft_register_rule pid=5518 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:51:07.919000 audit[5518]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=9348 a0=3 a1=ffffc85b5ec0 a2=0 a3=1 items=0 ppid=2686 pid=5518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:07.919000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:51:07.987889 env[1480]: time="2025-05-17T00:51:07.987771388Z" level=info msg="RemovePodSandbox \"40f13856fce73837b8380c544d31c04049bd84a3ceeb000c4fce95e608012a25\" returns successfully" May 17 00:51:07.988438 env[1480]: time="2025-05-17T00:51:07.988357399Z" level=info msg="StopPodSandbox for \"b73e68c4e34ef0c667f67b5e6e4b248524b373214b07b74fbf31422ac03f7e1e\"" May 17 00:51:08.115947 env[1480]: 2025-05-17 00:51:08.062 [WARNING][5529] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="b73e68c4e34ef0c667f67b5e6e4b248524b373214b07b74fbf31422ac03f7e1e" WorkloadEndpoint="ci--3510.3.7--n--4234abe502-k8s-whisker--b77f4458b--bwdl4-eth0" May 17 00:51:08.115947 env[1480]: 2025-05-17 00:51:08.062 [INFO][5529] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="b73e68c4e34ef0c667f67b5e6e4b248524b373214b07b74fbf31422ac03f7e1e" May 17 00:51:08.115947 env[1480]: 2025-05-17 00:51:08.063 [INFO][5529] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b73e68c4e34ef0c667f67b5e6e4b248524b373214b07b74fbf31422ac03f7e1e" iface="eth0" netns="" May 17 00:51:08.115947 env[1480]: 2025-05-17 00:51:08.063 [INFO][5529] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="b73e68c4e34ef0c667f67b5e6e4b248524b373214b07b74fbf31422ac03f7e1e" May 17 00:51:08.115947 env[1480]: 2025-05-17 00:51:08.063 [INFO][5529] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b73e68c4e34ef0c667f67b5e6e4b248524b373214b07b74fbf31422ac03f7e1e" May 17 00:51:08.115947 env[1480]: 2025-05-17 00:51:08.100 [INFO][5537] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b73e68c4e34ef0c667f67b5e6e4b248524b373214b07b74fbf31422ac03f7e1e" HandleID="k8s-pod-network.b73e68c4e34ef0c667f67b5e6e4b248524b373214b07b74fbf31422ac03f7e1e" Workload="ci--3510.3.7--n--4234abe502-k8s-whisker--b77f4458b--bwdl4-eth0" May 17 00:51:08.115947 env[1480]: 2025-05-17 00:51:08.100 [INFO][5537] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:51:08.115947 env[1480]: 2025-05-17 00:51:08.100 [INFO][5537] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:51:08.115947 env[1480]: 2025-05-17 00:51:08.111 [WARNING][5537] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b73e68c4e34ef0c667f67b5e6e4b248524b373214b07b74fbf31422ac03f7e1e" HandleID="k8s-pod-network.b73e68c4e34ef0c667f67b5e6e4b248524b373214b07b74fbf31422ac03f7e1e" Workload="ci--3510.3.7--n--4234abe502-k8s-whisker--b77f4458b--bwdl4-eth0" May 17 00:51:08.115947 env[1480]: 2025-05-17 00:51:08.111 [INFO][5537] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b73e68c4e34ef0c667f67b5e6e4b248524b373214b07b74fbf31422ac03f7e1e" HandleID="k8s-pod-network.b73e68c4e34ef0c667f67b5e6e4b248524b373214b07b74fbf31422ac03f7e1e" Workload="ci--3510.3.7--n--4234abe502-k8s-whisker--b77f4458b--bwdl4-eth0" May 17 00:51:08.115947 env[1480]: 2025-05-17 00:51:08.113 [INFO][5537] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:51:08.115947 env[1480]: 2025-05-17 00:51:08.114 [INFO][5529] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="b73e68c4e34ef0c667f67b5e6e4b248524b373214b07b74fbf31422ac03f7e1e" May 17 00:51:08.116380 env[1480]: time="2025-05-17T00:51:08.115979268Z" level=info msg="TearDown network for sandbox \"b73e68c4e34ef0c667f67b5e6e4b248524b373214b07b74fbf31422ac03f7e1e\" successfully" May 17 00:51:08.116380 env[1480]: time="2025-05-17T00:51:08.116008667Z" level=info msg="StopPodSandbox for \"b73e68c4e34ef0c667f67b5e6e4b248524b373214b07b74fbf31422ac03f7e1e\" returns successfully" May 17 00:51:08.116658 env[1480]: time="2025-05-17T00:51:08.116630997Z" level=info msg="RemovePodSandbox for \"b73e68c4e34ef0c667f67b5e6e4b248524b373214b07b74fbf31422ac03f7e1e\"" May 17 00:51:08.116771 env[1480]: time="2025-05-17T00:51:08.116734312Z" level=info msg="Forcibly stopping sandbox \"b73e68c4e34ef0c667f67b5e6e4b248524b373214b07b74fbf31422ac03f7e1e\"" May 17 00:51:08.252086 env[1480]: 2025-05-17 00:51:08.196 [WARNING][5551] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="b73e68c4e34ef0c667f67b5e6e4b248524b373214b07b74fbf31422ac03f7e1e" WorkloadEndpoint="ci--3510.3.7--n--4234abe502-k8s-whisker--b77f4458b--bwdl4-eth0" May 17 00:51:08.252086 env[1480]: 2025-05-17 00:51:08.196 [INFO][5551] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="b73e68c4e34ef0c667f67b5e6e4b248524b373214b07b74fbf31422ac03f7e1e" May 17 00:51:08.252086 env[1480]: 2025-05-17 00:51:08.196 [INFO][5551] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b73e68c4e34ef0c667f67b5e6e4b248524b373214b07b74fbf31422ac03f7e1e" iface="eth0" netns="" May 17 00:51:08.252086 env[1480]: 2025-05-17 00:51:08.196 [INFO][5551] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="b73e68c4e34ef0c667f67b5e6e4b248524b373214b07b74fbf31422ac03f7e1e" May 17 00:51:08.252086 env[1480]: 2025-05-17 00:51:08.196 [INFO][5551] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b73e68c4e34ef0c667f67b5e6e4b248524b373214b07b74fbf31422ac03f7e1e" May 17 00:51:08.252086 env[1480]: 2025-05-17 00:51:08.236 [INFO][5558] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b73e68c4e34ef0c667f67b5e6e4b248524b373214b07b74fbf31422ac03f7e1e" HandleID="k8s-pod-network.b73e68c4e34ef0c667f67b5e6e4b248524b373214b07b74fbf31422ac03f7e1e" Workload="ci--3510.3.7--n--4234abe502-k8s-whisker--b77f4458b--bwdl4-eth0" May 17 00:51:08.252086 env[1480]: 2025-05-17 00:51:08.236 [INFO][5558] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:51:08.252086 env[1480]: 2025-05-17 00:51:08.236 [INFO][5558] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:51:08.252086 env[1480]: 2025-05-17 00:51:08.247 [WARNING][5558] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b73e68c4e34ef0c667f67b5e6e4b248524b373214b07b74fbf31422ac03f7e1e" HandleID="k8s-pod-network.b73e68c4e34ef0c667f67b5e6e4b248524b373214b07b74fbf31422ac03f7e1e" Workload="ci--3510.3.7--n--4234abe502-k8s-whisker--b77f4458b--bwdl4-eth0" May 17 00:51:08.252086 env[1480]: 2025-05-17 00:51:08.247 [INFO][5558] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b73e68c4e34ef0c667f67b5e6e4b248524b373214b07b74fbf31422ac03f7e1e" HandleID="k8s-pod-network.b73e68c4e34ef0c667f67b5e6e4b248524b373214b07b74fbf31422ac03f7e1e" Workload="ci--3510.3.7--n--4234abe502-k8s-whisker--b77f4458b--bwdl4-eth0" May 17 00:51:08.252086 env[1480]: 2025-05-17 00:51:08.249 [INFO][5558] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:51:08.252086 env[1480]: 2025-05-17 00:51:08.250 [INFO][5551] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="b73e68c4e34ef0c667f67b5e6e4b248524b373214b07b74fbf31422ac03f7e1e" May 17 00:51:08.253574 env[1480]: time="2025-05-17T00:51:08.253527748Z" level=info msg="TearDown network for sandbox \"b73e68c4e34ef0c667f67b5e6e4b248524b373214b07b74fbf31422ac03f7e1e\" successfully" May 17 00:51:08.292886 env[1480]: time="2025-05-17T00:51:08.292834250Z" level=info msg="RemovePodSandbox \"b73e68c4e34ef0c667f67b5e6e4b248524b373214b07b74fbf31422ac03f7e1e\" returns successfully" May 17 00:51:08.293710 env[1480]: time="2025-05-17T00:51:08.293670610Z" level=info msg="StopPodSandbox for \"962fa1fd3460a11a02ddcad1b3937654dc37673876dbde36685c6acbc4d58e93\"" May 17 00:51:08.410857 env[1480]: 2025-05-17 00:51:08.344 [WARNING][5573] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="962fa1fd3460a11a02ddcad1b3937654dc37673876dbde36685c6acbc4d58e93" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--4234abe502-k8s-goldmane--78d55f7ddc--pmkbg-eth0", GenerateName:"goldmane-78d55f7ddc-", Namespace:"calico-system", SelfLink:"", UID:"85f144ac-4d39-496d-b3d5-66149a1574d7", ResourceVersion:"1236", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 49, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"78d55f7ddc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-4234abe502", ContainerID:"8ca17f80f60f18caf2af4ec3f51c89b5e4ffb37f1647f79ed391c689ee788670", Pod:"goldmane-78d55f7ddc-pmkbg", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.86.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali5c1c43afae2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:51:08.410857 env[1480]: 2025-05-17 00:51:08.344 [INFO][5573] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="962fa1fd3460a11a02ddcad1b3937654dc37673876dbde36685c6acbc4d58e93" May 17 00:51:08.410857 env[1480]: 2025-05-17 00:51:08.344 [INFO][5573] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="962fa1fd3460a11a02ddcad1b3937654dc37673876dbde36685c6acbc4d58e93" iface="eth0" netns="" May 17 00:51:08.410857 env[1480]: 2025-05-17 00:51:08.344 [INFO][5573] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="962fa1fd3460a11a02ddcad1b3937654dc37673876dbde36685c6acbc4d58e93" May 17 00:51:08.410857 env[1480]: 2025-05-17 00:51:08.344 [INFO][5573] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="962fa1fd3460a11a02ddcad1b3937654dc37673876dbde36685c6acbc4d58e93" May 17 00:51:08.410857 env[1480]: 2025-05-17 00:51:08.388 [INFO][5580] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="962fa1fd3460a11a02ddcad1b3937654dc37673876dbde36685c6acbc4d58e93" HandleID="k8s-pod-network.962fa1fd3460a11a02ddcad1b3937654dc37673876dbde36685c6acbc4d58e93" Workload="ci--3510.3.7--n--4234abe502-k8s-goldmane--78d55f7ddc--pmkbg-eth0" May 17 00:51:08.410857 env[1480]: 2025-05-17 00:51:08.388 [INFO][5580] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:51:08.410857 env[1480]: 2025-05-17 00:51:08.388 [INFO][5580] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:51:08.410857 env[1480]: 2025-05-17 00:51:08.400 [WARNING][5580] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="962fa1fd3460a11a02ddcad1b3937654dc37673876dbde36685c6acbc4d58e93" HandleID="k8s-pod-network.962fa1fd3460a11a02ddcad1b3937654dc37673876dbde36685c6acbc4d58e93" Workload="ci--3510.3.7--n--4234abe502-k8s-goldmane--78d55f7ddc--pmkbg-eth0" May 17 00:51:08.410857 env[1480]: 2025-05-17 00:51:08.400 [INFO][5580] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="962fa1fd3460a11a02ddcad1b3937654dc37673876dbde36685c6acbc4d58e93" HandleID="k8s-pod-network.962fa1fd3460a11a02ddcad1b3937654dc37673876dbde36685c6acbc4d58e93" Workload="ci--3510.3.7--n--4234abe502-k8s-goldmane--78d55f7ddc--pmkbg-eth0" May 17 00:51:08.410857 env[1480]: 2025-05-17 00:51:08.403 [INFO][5580] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:51:08.410857 env[1480]: 2025-05-17 00:51:08.408 [INFO][5573] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="962fa1fd3460a11a02ddcad1b3937654dc37673876dbde36685c6acbc4d58e93" May 17 00:51:08.411316 env[1480]: time="2025-05-17T00:51:08.410921230Z" level=info msg="TearDown network for sandbox \"962fa1fd3460a11a02ddcad1b3937654dc37673876dbde36685c6acbc4d58e93\" successfully" May 17 00:51:08.411316 env[1480]: time="2025-05-17T00:51:08.410955548Z" level=info msg="StopPodSandbox for \"962fa1fd3460a11a02ddcad1b3937654dc37673876dbde36685c6acbc4d58e93\" returns successfully" May 17 00:51:08.412385 env[1480]: time="2025-05-17T00:51:08.412261565Z" level=info msg="RemovePodSandbox for \"962fa1fd3460a11a02ddcad1b3937654dc37673876dbde36685c6acbc4d58e93\"" May 17 00:51:08.412385 env[1480]: time="2025-05-17T00:51:08.412301363Z" level=info msg="Forcibly stopping sandbox \"962fa1fd3460a11a02ddcad1b3937654dc37673876dbde36685c6acbc4d58e93\"" May 17 00:51:08.535660 env[1480]: 2025-05-17 00:51:08.486 [WARNING][5595] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="962fa1fd3460a11a02ddcad1b3937654dc37673876dbde36685c6acbc4d58e93" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--4234abe502-k8s-goldmane--78d55f7ddc--pmkbg-eth0", GenerateName:"goldmane-78d55f7ddc-", Namespace:"calico-system", SelfLink:"", UID:"85f144ac-4d39-496d-b3d5-66149a1574d7", ResourceVersion:"1236", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 49, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"78d55f7ddc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-4234abe502", ContainerID:"8ca17f80f60f18caf2af4ec3f51c89b5e4ffb37f1647f79ed391c689ee788670", Pod:"goldmane-78d55f7ddc-pmkbg", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.86.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali5c1c43afae2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:51:08.535660 env[1480]: 2025-05-17 00:51:08.486 [INFO][5595] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="962fa1fd3460a11a02ddcad1b3937654dc37673876dbde36685c6acbc4d58e93" May 17 00:51:08.535660 env[1480]: 2025-05-17 00:51:08.486 [INFO][5595] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="962fa1fd3460a11a02ddcad1b3937654dc37673876dbde36685c6acbc4d58e93" iface="eth0" netns="" May 17 00:51:08.535660 env[1480]: 2025-05-17 00:51:08.486 [INFO][5595] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="962fa1fd3460a11a02ddcad1b3937654dc37673876dbde36685c6acbc4d58e93" May 17 00:51:08.535660 env[1480]: 2025-05-17 00:51:08.486 [INFO][5595] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="962fa1fd3460a11a02ddcad1b3937654dc37673876dbde36685c6acbc4d58e93" May 17 00:51:08.535660 env[1480]: 2025-05-17 00:51:08.511 [INFO][5603] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="962fa1fd3460a11a02ddcad1b3937654dc37673876dbde36685c6acbc4d58e93" HandleID="k8s-pod-network.962fa1fd3460a11a02ddcad1b3937654dc37673876dbde36685c6acbc4d58e93" Workload="ci--3510.3.7--n--4234abe502-k8s-goldmane--78d55f7ddc--pmkbg-eth0" May 17 00:51:08.535660 env[1480]: 2025-05-17 00:51:08.511 [INFO][5603] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:51:08.535660 env[1480]: 2025-05-17 00:51:08.512 [INFO][5603] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:51:08.535660 env[1480]: 2025-05-17 00:51:08.530 [WARNING][5603] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="962fa1fd3460a11a02ddcad1b3937654dc37673876dbde36685c6acbc4d58e93" HandleID="k8s-pod-network.962fa1fd3460a11a02ddcad1b3937654dc37673876dbde36685c6acbc4d58e93" Workload="ci--3510.3.7--n--4234abe502-k8s-goldmane--78d55f7ddc--pmkbg-eth0" May 17 00:51:08.535660 env[1480]: 2025-05-17 00:51:08.531 [INFO][5603] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="962fa1fd3460a11a02ddcad1b3937654dc37673876dbde36685c6acbc4d58e93" HandleID="k8s-pod-network.962fa1fd3460a11a02ddcad1b3937654dc37673876dbde36685c6acbc4d58e93" Workload="ci--3510.3.7--n--4234abe502-k8s-goldmane--78d55f7ddc--pmkbg-eth0" May 17 00:51:08.535660 env[1480]: 2025-05-17 00:51:08.532 [INFO][5603] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:51:08.535660 env[1480]: 2025-05-17 00:51:08.534 [INFO][5595] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="962fa1fd3460a11a02ddcad1b3937654dc37673876dbde36685c6acbc4d58e93" May 17 00:51:08.536185 env[1480]: time="2025-05-17T00:51:08.536134505Z" level=info msg="TearDown network for sandbox \"962fa1fd3460a11a02ddcad1b3937654dc37673876dbde36685c6acbc4d58e93\" successfully" May 17 00:51:08.551043 env[1480]: time="2025-05-17T00:51:08.550993748Z" level=info msg="RemovePodSandbox \"962fa1fd3460a11a02ddcad1b3937654dc37673876dbde36685c6acbc4d58e93\" returns successfully" May 17 00:51:09.281826 env[1480]: time="2025-05-17T00:51:09.281774981Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:51:09.297870 env[1480]: time="2025-05-17T00:51:09.297826699Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a5d5f2a68204ed0dbc50f8778616ee92a63c0e342d178a4620e6271484e5c8b2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:51:09.304727 env[1480]: time="2025-05-17T00:51:09.304666014Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:51:09.309807 env[1480]: time="2025-05-17T00:51:09.309762453Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:dca5c16181edde2e860463615523ce457cd9dcfca85b7cfdcd6f3ea7de6f2ac8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:51:09.310305 env[1480]: time="2025-05-17T00:51:09.310268629Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0\" returns image reference \"sha256:a5d5f2a68204ed0dbc50f8778616ee92a63c0e342d178a4620e6271484e5c8b2\"" May 17 00:51:09.312085 env[1480]: time="2025-05-17T00:51:09.312037145Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\"" May 17 00:51:09.318854 env[1480]: time="2025-05-17T00:51:09.318716108Z" level=info msg="CreateContainer within sandbox \"ef88f37ad20b41a637085c66407ec0e39064d84fb7beea9b8226d24161d3c910\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 17 00:51:09.371005 env[1480]: time="2025-05-17T00:51:09.370937790Z" level=info msg="CreateContainer within sandbox \"ef88f37ad20b41a637085c66407ec0e39064d84fb7beea9b8226d24161d3c910\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"aafa2381ee8767b31c43259de18c39b93413ae61c666aa954102c208dd763965\"" May 17 00:51:09.371809 env[1480]: time="2025-05-17T00:51:09.371770550Z" level=info msg="StartContainer for \"aafa2381ee8767b31c43259de18c39b93413ae61c666aa954102c208dd763965\"" May 17 00:51:09.393332 systemd[1]: Started cri-containerd-aafa2381ee8767b31c43259de18c39b93413ae61c666aa954102c208dd763965.scope. May 17 00:51:09.422000 audit[5617]: AVC avc: denied { perfmon } for pid=5617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:09.422000 audit[5617]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4480 pid=5617 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:09.422000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161666132333831656538373637623331633433323539646531386333 May 17 00:51:09.422000 audit[5617]: AVC avc: denied { bpf } for pid=5617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:09.422000 audit[5617]: AVC avc: denied { bpf } for pid=5617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:09.422000 audit[5617]: AVC avc: denied { bpf } for pid=5617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:09.422000 audit[5617]: AVC avc: denied { perfmon } for pid=5617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:09.422000 audit[5617]: AVC avc: denied { perfmon } for pid=5617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:09.422000 audit[5617]: AVC avc: denied { perfmon } for pid=5617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:09.422000 audit[5617]: AVC avc: denied { perfmon } for pid=5617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:09.422000 audit[5617]: AVC avc: denied { perfmon } for pid=5617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:09.422000 audit[5617]: AVC avc: denied { bpf } for pid=5617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:09.422000 audit[5617]: AVC avc: denied { bpf } for pid=5617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:09.422000 audit: BPF prog-id=211 op=LOAD May 17 00:51:09.422000 audit[5617]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4480 pid=5617 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:09.422000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161666132333831656538373637623331633433323539646531386333 May 17 00:51:09.422000 audit[5617]: AVC avc: denied { bpf } for pid=5617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:09.422000 audit[5617]: AVC avc: denied { bpf } for pid=5617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:09.422000 audit[5617]: AVC avc: denied { perfmon } for pid=5617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:09.422000 audit[5617]: AVC avc: denied { perfmon } for pid=5617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:09.422000 audit[5617]: AVC avc: denied { perfmon } for pid=5617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:09.422000 audit[5617]: AVC avc: denied { perfmon } for pid=5617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:09.422000 audit[5617]: AVC avc: denied { perfmon } for pid=5617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:09.422000 audit[5617]: AVC avc: denied { bpf } for pid=5617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:09.422000 audit[5617]: AVC avc: denied { bpf } for pid=5617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:09.422000 audit: BPF prog-id=212 op=LOAD May 17 00:51:09.422000 audit[5617]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4480 pid=5617 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:09.422000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161666132333831656538373637623331633433323539646531386333 May 17 00:51:09.422000 audit: BPF prog-id=212 op=UNLOAD May 17 00:51:09.422000 audit: BPF prog-id=211 op=UNLOAD May 17 00:51:09.422000 audit[5617]: AVC avc: denied { bpf } for pid=5617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:09.422000 audit[5617]: AVC avc: denied { bpf } for pid=5617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:09.422000 audit[5617]: AVC avc: denied { bpf } for pid=5617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:09.422000 audit[5617]: AVC avc: denied { perfmon } for pid=5617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:09.422000 audit[5617]: AVC avc: denied { perfmon } for pid=5617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:09.422000 audit[5617]: AVC avc: denied { perfmon } for pid=5617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:09.422000 audit[5617]: AVC avc: denied { perfmon } for pid=5617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:09.422000 audit[5617]: AVC avc: denied { perfmon } for pid=5617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:09.422000 audit[5617]: AVC avc: denied { bpf } for pid=5617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:09.422000 audit[5617]: AVC avc: denied { bpf } for pid=5617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:09.422000 audit: BPF prog-id=213 op=LOAD May 17 00:51:09.422000 audit[5617]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4480 pid=5617 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:09.422000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161666132333831656538373637623331633433323539646531386333 May 17 00:51:09.450049 env[1480]: time="2025-05-17T00:51:09.450000358Z" level=info msg="StartContainer for \"aafa2381ee8767b31c43259de18c39b93413ae61c666aa954102c208dd763965\" returns successfully" May 17 00:51:09.500474 env[1480]: time="2025-05-17T00:51:09.500400567Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:51:09.505474 env[1480]: time="2025-05-17T00:51:09.505403289Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:51:09.505681 kubelet[2537]: E0517 00:51:09.505635 2537 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:51:09.505998 kubelet[2537]: E0517 00:51:09.505690 2537 kuberuntime_image.go:42] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:51:09.505998 kubelet[2537]: E0517 00:51:09.505907 2537 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-m2wqv,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-65bfcd6f48-fpglr_calico-system(f2c35a1f-88d3-4b21-9134-27f4e6567489): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:51:09.506635 env[1480]: time="2025-05-17T00:51:09.506597353Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\"" May 17 00:51:09.507092 kubelet[2537]: E0517 00:51:09.507042 2537 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-65bfcd6f48-fpglr" podUID="f2c35a1f-88d3-4b21-9134-27f4e6567489" May 17 00:51:09.683439 env[1480]: time="2025-05-17T00:51:09.683382964Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:51:09.690531 env[1480]: time="2025-05-17T00:51:09.690467708Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:51:09.691594 kubelet[2537]: E0517 00:51:09.690894 2537 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:51:09.691594 kubelet[2537]: E0517 00:51:09.690960 2537 kuberuntime_image.go:42] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:51:09.691594 kubelet[2537]: E0517 00:51:09.691529 2537 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-vwtwv,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-78d55f7ddc-pmkbg_calico-system(85f144ac-4d39-496d-b3d5-66149a1574d7): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:51:09.692778 kubelet[2537]: E0517 00:51:09.692740 2537 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-pmkbg" podUID="85f144ac-4d39-496d-b3d5-66149a1574d7" May 17 00:51:09.842082 kubelet[2537]: I0517 00:51:09.842045 2537 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:51:09.861263 kubelet[2537]: I0517 00:51:09.861186 2537 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-84c64ddb56-27tsz" podStartSLOduration=75.489834117 podStartE2EDuration="1m51.861169528s" podCreationTimestamp="2025-05-17 00:49:18 +0000 UTC" firstStartedPulling="2025-05-17 00:50:29.472439432 +0000 UTC m=+88.464436387" lastFinishedPulling="2025-05-17 00:51:05.843774843 +0000 UTC m=+124.835771798" observedRunningTime="2025-05-17 00:51:07.852754059 +0000 UTC m=+126.844751014" watchObservedRunningTime="2025-05-17 00:51:09.861169528 +0000 UTC m=+128.853166483" May 17 00:51:10.301577 kubelet[2537]: I0517 00:51:10.301543 2537 csi_plugin.go:106] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 17 00:51:10.303627 kubelet[2537]: I0517 00:51:10.303547 2537 csi_plugin.go:119] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 17 00:51:10.347294 systemd[1]: run-containerd-runc-k8s.io-aafa2381ee8767b31c43259de18c39b93413ae61c666aa954102c208dd763965-runc.bA6YJN.mount: Deactivated successfully. May 17 00:51:10.728000 audit[5369]: AVC avc: denied { watch } for pid=5369 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_49_46.804199671/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c208,c502 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c208,c502 tclass=file permissive=0 May 17 00:51:10.728000 audit[5369]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000c804a0 a2=fc6 a3=0 items=0 ppid=4895 pid=5369 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c208,c502 key=(null) May 17 00:51:10.728000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:51:10.763717 kubelet[2537]: I0517 00:51:10.763656 2537 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-52bcs" podStartSLOduration=58.052814991 podStartE2EDuration="1m47.763637204s" podCreationTimestamp="2025-05-17 00:49:23 +0000 UTC" firstStartedPulling="2025-05-17 00:50:19.600339813 +0000 UTC m=+78.592336768" lastFinishedPulling="2025-05-17 00:51:09.311162026 +0000 UTC m=+128.303158981" observedRunningTime="2025-05-17 00:51:09.862543023 +0000 UTC m=+128.854539978" watchObservedRunningTime="2025-05-17 00:51:10.763637204 +0000 UTC m=+129.755634159" May 17 00:51:10.797000 audit[5646]: NETFILTER_CFG table=filter:133 family=2 entries=12 op=nft_register_rule pid=5646 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:51:10.797000 audit[5646]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=fffff4140470 a2=0 a3=1 items=0 ppid=2686 pid=5646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:10.797000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:51:10.803000 audit[5646]: NETFILTER_CFG table=nat:134 family=2 entries=34 op=nft_register_chain pid=5646 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:51:10.803000 audit[5646]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11236 a0=3 a1=fffff4140470 a2=0 a3=1 items=0 ppid=2686 pid=5646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:10.803000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:51:14.167914 update_engine[1468]: I0517 00:51:14.167867 1468 libcurl_http_fetcher.cc:47] Starting/Resuming transfer May 17 00:51:14.168269 update_engine[1468]: I0517 00:51:14.168081 1468 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP May 17 00:51:14.168330 update_engine[1468]: I0517 00:51:14.168298 1468 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. May 17 00:51:14.205516 update_engine[1468]: E0517 00:51:14.205476 1468 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled May 17 00:51:14.205683 update_engine[1468]: I0517 00:51:14.205585 1468 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded May 17 00:51:14.205683 update_engine[1468]: I0517 00:51:14.205590 1468 omaha_request_action.cc:621] Omaha request response: May 17 00:51:14.205683 update_engine[1468]: E0517 00:51:14.205672 1468 omaha_request_action.cc:640] Omaha request network transfer failed. May 17 00:51:14.205770 update_engine[1468]: I0517 00:51:14.205684 1468 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaRequestAction action failed. Aborting processing. May 17 00:51:14.205770 update_engine[1468]: I0517 00:51:14.205687 1468 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction May 17 00:51:14.205770 update_engine[1468]: I0517 00:51:14.205690 1468 update_attempter.cc:306] Processing Done. May 17 00:51:14.205770 update_engine[1468]: E0517 00:51:14.205703 1468 update_attempter.cc:619] Update failed. May 17 00:51:14.205770 update_engine[1468]: I0517 00:51:14.205705 1468 utils.cc:600] Converting error code 2000 to kActionCodeOmahaErrorInHTTPResponse May 17 00:51:14.206216 update_engine[1468]: I0517 00:51:14.205708 1468 payload_state.cc:97] Updating payload state for error code: 37 (kActionCodeOmahaErrorInHTTPResponse) May 17 00:51:14.206216 update_engine[1468]: I0517 00:51:14.206207 1468 payload_state.cc:103] Ignoring failures until we get a valid Omaha response. May 17 00:51:14.206320 update_engine[1468]: I0517 00:51:14.206298 1468 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction May 17 00:51:14.206350 update_engine[1468]: I0517 00:51:14.206324 1468 omaha_request_action.cc:270] Posting an Omaha request to disabled May 17 00:51:14.206350 update_engine[1468]: I0517 00:51:14.206328 1468 omaha_request_action.cc:271] Request: May 17 00:51:14.206350 update_engine[1468]: May 17 00:51:14.206350 update_engine[1468]: May 17 00:51:14.206350 update_engine[1468]: May 17 00:51:14.206350 update_engine[1468]: May 17 00:51:14.206350 update_engine[1468]: May 17 00:51:14.206350 update_engine[1468]: May 17 00:51:14.206350 update_engine[1468]: I0517 00:51:14.206333 1468 libcurl_http_fetcher.cc:47] Starting/Resuming transfer May 17 00:51:14.206554 update_engine[1468]: I0517 00:51:14.206465 1468 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP May 17 00:51:14.206652 update_engine[1468]: I0517 00:51:14.206631 1468 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. May 17 00:51:14.206903 locksmithd[1551]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_REPORTING_ERROR_EVENT" NewVersion=0.0.0 NewSize=0 May 17 00:51:14.317845 update_engine[1468]: E0517 00:51:14.317798 1468 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled May 17 00:51:14.317997 update_engine[1468]: I0517 00:51:14.317930 1468 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded May 17 00:51:14.317997 update_engine[1468]: I0517 00:51:14.317938 1468 omaha_request_action.cc:621] Omaha request response: May 17 00:51:14.317997 update_engine[1468]: I0517 00:51:14.317943 1468 action_processor.cc:65] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction May 17 00:51:14.317997 update_engine[1468]: I0517 00:51:14.317946 1468 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction May 17 00:51:14.317997 update_engine[1468]: I0517 00:51:14.317948 1468 update_attempter.cc:306] Processing Done. May 17 00:51:14.317997 update_engine[1468]: I0517 00:51:14.317952 1468 update_attempter.cc:310] Error event sent. May 17 00:51:14.317997 update_engine[1468]: I0517 00:51:14.317960 1468 update_check_scheduler.cc:74] Next update check in 48m27s May 17 00:51:14.318323 locksmithd[1551]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0 May 17 00:51:19.887973 systemd[1]: run-containerd-runc-k8s.io-75428c4c09b4fe20fd36bcd3990495245e13100967d591c566b7f85e38200274-runc.pBXTzG.mount: Deactivated successfully. May 17 00:51:21.151469 kubelet[2537]: E0517 00:51:21.151288 2537 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-pmkbg" podUID="85f144ac-4d39-496d-b3d5-66149a1574d7" May 17 00:51:21.154057 env[1480]: time="2025-05-17T00:51:21.154011057Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\"" May 17 00:51:21.351567 env[1480]: time="2025-05-17T00:51:21.351496772Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:51:21.356635 env[1480]: time="2025-05-17T00:51:21.356570337Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:51:21.356879 kubelet[2537]: E0517 00:51:21.356843 2537 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:51:21.357002 kubelet[2537]: E0517 00:51:21.356984 2537 kuberuntime_image.go:42] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:51:21.357214 kubelet[2537]: E0517 00:51:21.357181 2537 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.0,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:2d789fd7d12f447a87f7555b072d9747,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-m2wqv,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-65bfcd6f48-fpglr_calico-system(f2c35a1f-88d3-4b21-9134-27f4e6567489): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:51:21.359204 kubelet[2537]: E0517 00:51:21.359150 2537 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-65bfcd6f48-fpglr" podUID="f2c35a1f-88d3-4b21-9134-27f4e6567489" May 17 00:51:33.144171 env[1480]: time="2025-05-17T00:51:33.144102128Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\"" May 17 00:51:33.355442 env[1480]: time="2025-05-17T00:51:33.355368476Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:51:33.359628 env[1480]: time="2025-05-17T00:51:33.359553826Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:51:33.359950 kubelet[2537]: E0517 00:51:33.359907 2537 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:51:33.360336 kubelet[2537]: E0517 00:51:33.360314 2537 kuberuntime_image.go:42] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:51:33.360999 kubelet[2537]: E0517 00:51:33.360941 2537 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-vwtwv,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-78d55f7ddc-pmkbg_calico-system(85f144ac-4d39-496d-b3d5-66149a1574d7): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:51:33.363264 kubelet[2537]: E0517 00:51:33.363212 2537 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-pmkbg" podUID="85f144ac-4d39-496d-b3d5-66149a1574d7" May 17 00:51:34.144965 env[1480]: time="2025-05-17T00:51:34.144712562Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\"" May 17 00:51:34.337825 env[1480]: time="2025-05-17T00:51:34.337625508Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:51:34.343123 env[1480]: time="2025-05-17T00:51:34.342986665Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:51:34.343318 kubelet[2537]: E0517 00:51:34.343243 2537 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:51:34.343318 kubelet[2537]: E0517 00:51:34.343293 2537 kuberuntime_image.go:42] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:51:34.343444 kubelet[2537]: E0517 00:51:34.343403 2537 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-m2wqv,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-65bfcd6f48-fpglr_calico-system(f2c35a1f-88d3-4b21-9134-27f4e6567489): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:51:34.344952 kubelet[2537]: E0517 00:51:34.344890 2537 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-65bfcd6f48-fpglr" podUID="f2c35a1f-88d3-4b21-9134-27f4e6567489" May 17 00:51:42.298737 systemd[1]: run-containerd-runc-k8s.io-75428c4c09b4fe20fd36bcd3990495245e13100967d591c566b7f85e38200274-runc.yTcmx2.mount: Deactivated successfully. May 17 00:51:47.143926 kubelet[2537]: E0517 00:51:47.143874 2537 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-pmkbg" podUID="85f144ac-4d39-496d-b3d5-66149a1574d7" May 17 00:51:48.145121 kubelet[2537]: E0517 00:51:48.145052 2537 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-65bfcd6f48-fpglr" podUID="f2c35a1f-88d3-4b21-9134-27f4e6567489" May 17 00:51:49.518000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.20.34:22-10.200.16.10:56356 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:51:49.519355 systemd[1]: Started sshd@7-10.200.20.34:22-10.200.16.10:56356.service. May 17 00:51:49.524761 kernel: kauditd_printk_skb: 105 callbacks suppressed May 17 00:51:49.524977 kernel: audit: type=1130 audit(1747443109.518:1337): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.20.34:22-10.200.16.10:56356 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:51:49.887021 systemd[1]: run-containerd-runc-k8s.io-75428c4c09b4fe20fd36bcd3990495245e13100967d591c566b7f85e38200274-runc.UmI5La.mount: Deactivated successfully. May 17 00:51:49.961000 audit[5745]: USER_ACCT pid=5745 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:51:49.963548 sshd[5745]: Accepted publickey for core from 10.200.16.10 port 56356 ssh2: RSA SHA256:kTalk4vvVOHJD+odK+kI4Z4CxTmNI3TSVyFiPn8PnHg May 17 00:51:49.964501 sshd[5745]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:51:49.962000 audit[5745]: CRED_ACQ pid=5745 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:51:50.012277 kernel: audit: type=1101 audit(1747443109.961:1338): pid=5745 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:51:50.012426 kernel: audit: type=1103 audit(1747443109.962:1339): pid=5745 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:51:50.030960 kernel: audit: type=1006 audit(1747443109.962:1340): pid=5745 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 May 17 00:51:49.962000 audit[5745]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc692d1c0 a2=3 a3=1 items=0 ppid=1 pid=5745 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:50.058185 kernel: audit: type=1300 audit(1747443109.962:1340): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc692d1c0 a2=3 a3=1 items=0 ppid=1 pid=5745 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:49.962000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:51:50.070606 kernel: audit: type=1327 audit(1747443109.962:1340): proctitle=737368643A20636F7265205B707269765D May 17 00:51:50.073307 systemd-logind[1466]: New session 10 of user core. May 17 00:51:50.074040 systemd[1]: Started session-10.scope. May 17 00:51:50.077000 audit[5745]: USER_START pid=5745 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:51:50.104000 audit[5770]: CRED_ACQ pid=5770 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:51:50.130520 kernel: audit: type=1105 audit(1747443110.077:1341): pid=5745 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:51:50.130666 kernel: audit: type=1103 audit(1747443110.104:1342): pid=5770 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:51:50.473474 sshd[5745]: pam_unix(sshd:session): session closed for user core May 17 00:51:50.473000 audit[5745]: USER_END pid=5745 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:51:50.478118 systemd[1]: session-10.scope: Deactivated successfully. May 17 00:51:50.479155 systemd[1]: sshd@7-10.200.20.34:22-10.200.16.10:56356.service: Deactivated successfully. May 17 00:51:50.475000 audit[5745]: CRED_DISP pid=5745 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:51:50.525581 kernel: audit: type=1106 audit(1747443110.473:1343): pid=5745 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:51:50.525734 kernel: audit: type=1104 audit(1747443110.475:1344): pid=5745 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:51:50.525796 systemd-logind[1466]: Session 10 logged out. Waiting for processes to exit. May 17 00:51:50.478000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.20.34:22-10.200.16.10:56356 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:51:50.526810 systemd-logind[1466]: Removed session 10. May 17 00:51:54.887000 audit[2352]: AVC avc: denied { watch } for pid=2352 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=522510 scontext=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:51:54.893436 kernel: kauditd_printk_skb: 1 callbacks suppressed May 17 00:51:54.893592 kernel: audit: type=1400 audit(1747443114.887:1346): avc: denied { watch } for pid=2352 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=522510 scontext=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:51:54.887000 audit[2352]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001a2e2a0 a2=fc6 a3=0 items=0 ppid=2209 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 key=(null) May 17 00:51:54.949367 kernel: audit: type=1300 audit(1747443114.887:1346): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001a2e2a0 a2=fc6 a3=0 items=0 ppid=2209 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 key=(null) May 17 00:51:54.887000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:51:54.979728 kernel: audit: type=1327 audit(1747443114.887:1346): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:51:54.887000 audit[2352]: AVC avc: denied { watch } for pid=2352 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=522516 scontext=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:51:55.004579 kernel: audit: type=1400 audit(1747443114.887:1347): avc: denied { watch } for pid=2352 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=522516 scontext=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:51:54.887000 audit[2352]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4001f6d440 a2=fc6 a3=0 items=0 ppid=2209 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 key=(null) May 17 00:51:55.040114 kernel: audit: type=1300 audit(1747443114.887:1347): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4001f6d440 a2=fc6 a3=0 items=0 ppid=2209 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 key=(null) May 17 00:51:54.887000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:51:55.068889 kernel: audit: type=1327 audit(1747443114.887:1347): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:51:55.548000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.20.34:22-10.200.16.10:56358 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:51:55.549688 systemd[1]: Started sshd@8-10.200.20.34:22-10.200.16.10:56358.service. May 17 00:51:55.575287 kernel: audit: type=1130 audit(1747443115.548:1348): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.20.34:22-10.200.16.10:56358 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:51:56.021000 audit[5783]: USER_ACCT pid=5783 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:51:56.023416 sshd[5783]: Accepted publickey for core from 10.200.16.10 port 56358 ssh2: RSA SHA256:kTalk4vvVOHJD+odK+kI4Z4CxTmNI3TSVyFiPn8PnHg May 17 00:51:56.025392 sshd[5783]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:51:56.021000 audit[5783]: CRED_ACQ pid=5783 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:51:56.076598 kernel: audit: type=1101 audit(1747443116.021:1349): pid=5783 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:51:56.076755 kernel: audit: type=1103 audit(1747443116.021:1350): pid=5783 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:51:56.080760 systemd-logind[1466]: New session 11 of user core. May 17 00:51:56.081386 systemd[1]: Started session-11.scope. May 17 00:51:56.093595 kernel: audit: type=1006 audit(1747443116.021:1351): pid=5783 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 May 17 00:51:56.021000 audit[5783]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd3995ba0 a2=3 a3=1 items=0 ppid=1 pid=5783 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:56.021000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:51:56.082000 audit[5783]: USER_START pid=5783 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:51:56.092000 audit[5785]: CRED_ACQ pid=5785 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:51:56.116000 audit[2419]: AVC avc: denied { watch } for pid=2419 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=522518 scontext=system_u:system_r:svirt_lxc_net_t:s0:c703,c977 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:51:56.116000 audit[2419]: AVC avc: denied { watch } for pid=2419 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=522516 scontext=system_u:system_r:svirt_lxc_net_t:s0:c703,c977 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:51:56.116000 audit[2419]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6d a1=400a7df710 a2=fc6 a3=0 items=0 ppid=2279 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c703,c977 key=(null) May 17 00:51:56.116000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3334002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 00:51:56.116000 audit[2419]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6e a1=40136d3500 a2=fc6 a3=0 items=0 ppid=2279 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c703,c977 key=(null) May 17 00:51:56.116000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3334002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 00:51:56.175000 audit[2419]: AVC avc: denied { watch } for pid=2419 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=522516 scontext=system_u:system_r:svirt_lxc_net_t:s0:c703,c977 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:51:56.175000 audit[2419]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6d a1=40136d3fb0 a2=fc6 a3=0 items=0 ppid=2279 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c703,c977 key=(null) May 17 00:51:56.175000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3334002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 00:51:56.175000 audit[2419]: AVC avc: denied { watch } for pid=2419 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=522510 scontext=system_u:system_r:svirt_lxc_net_t:s0:c703,c977 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:51:56.175000 audit[2419]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6d a1=40074ecd40 a2=fc6 a3=0 items=0 ppid=2279 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c703,c977 key=(null) May 17 00:51:56.175000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3334002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 00:51:56.175000 audit[2419]: AVC avc: denied { watch } for pid=2419 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=522510 scontext=system_u:system_r:svirt_lxc_net_t:s0:c703,c977 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:51:56.175000 audit[2419]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6d a1=40074ecd80 a2=fc6 a3=0 items=0 ppid=2279 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c703,c977 key=(null) May 17 00:51:56.175000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3334002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 00:51:56.175000 audit[2419]: AVC avc: denied { watch } for pid=2419 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=522512 scontext=system_u:system_r:svirt_lxc_net_t:s0:c703,c977 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:51:56.175000 audit[2419]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6d a1=400ab2a120 a2=fc6 a3=0 items=0 ppid=2279 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c703,c977 key=(null) May 17 00:51:56.175000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3334002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 00:51:56.449395 sshd[5783]: pam_unix(sshd:session): session closed for user core May 17 00:51:56.449000 audit[5783]: USER_END pid=5783 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:51:56.449000 audit[5783]: CRED_DISP pid=5783 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:51:56.452044 systemd-logind[1466]: Session 11 logged out. Waiting for processes to exit. May 17 00:51:56.453140 systemd[1]: session-11.scope: Deactivated successfully. May 17 00:51:56.454322 systemd-logind[1466]: Removed session 11. May 17 00:51:56.454899 systemd[1]: sshd@8-10.200.20.34:22-10.200.16.10:56358.service: Deactivated successfully. May 17 00:51:56.453000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.20.34:22-10.200.16.10:56358 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:51:59.145173 kubelet[2537]: E0517 00:51:59.145124 2537 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-65bfcd6f48-fpglr" podUID="f2c35a1f-88d3-4b21-9134-27f4e6567489" May 17 00:51:59.816000 audit[5165]: AVC avc: denied { watch } for pid=5165 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_49_47.1376700025/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c273,c865 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c273,c865 tclass=file permissive=0 May 17 00:51:59.816000 audit[5165]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4002b14860 a2=fc6 a3=0 items=0 ppid=4737 pid=5165 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c273,c865 key=(null) May 17 00:51:59.816000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:52:01.144151 kubelet[2537]: E0517 00:52:01.144114 2537 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-pmkbg" podUID="85f144ac-4d39-496d-b3d5-66149a1574d7" May 17 00:52:01.521893 systemd[1]: Started sshd@9-10.200.20.34:22-10.200.16.10:42216.service. May 17 00:52:01.520000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.20.34:22-10.200.16.10:42216 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:52:01.528275 kernel: kauditd_printk_skb: 28 callbacks suppressed May 17 00:52:01.528397 kernel: audit: type=1130 audit(1747443121.520:1364): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.20.34:22-10.200.16.10:42216 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:52:01.942000 audit[5799]: USER_ACCT pid=5799 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:01.944419 sshd[5799]: Accepted publickey for core from 10.200.16.10 port 42216 ssh2: RSA SHA256:kTalk4vvVOHJD+odK+kI4Z4CxTmNI3TSVyFiPn8PnHg May 17 00:52:01.946284 sshd[5799]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:52:01.944000 audit[5799]: CRED_ACQ pid=5799 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:01.993701 kernel: audit: type=1101 audit(1747443121.942:1365): pid=5799 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:01.993906 kernel: audit: type=1103 audit(1747443121.944:1366): pid=5799 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:01.998601 systemd[1]: Started session-12.scope. May 17 00:52:01.999816 systemd-logind[1466]: New session 12 of user core. May 17 00:52:02.009877 kernel: audit: type=1006 audit(1747443121.944:1367): pid=5799 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 May 17 00:52:01.944000 audit[5799]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffb8035e0 a2=3 a3=1 items=0 ppid=1 pid=5799 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:02.037213 kernel: audit: type=1300 audit(1747443121.944:1367): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffb8035e0 a2=3 a3=1 items=0 ppid=1 pid=5799 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:01.944000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:52:02.045704 kernel: audit: type=1327 audit(1747443121.944:1367): proctitle=737368643A20636F7265205B707269765D May 17 00:52:02.045801 kernel: audit: type=1105 audit(1747443122.010:1368): pid=5799 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:02.010000 audit[5799]: USER_START pid=5799 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:02.015000 audit[5801]: CRED_ACQ pid=5801 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:02.099277 kernel: audit: type=1103 audit(1747443122.015:1369): pid=5801 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:02.100000 audit[2352]: AVC avc: denied { watch } for pid=2352 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=522510 scontext=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:52:02.100000 audit[2352]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001d54b40 a2=fc6 a3=0 items=0 ppid=2209 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 key=(null) May 17 00:52:02.156678 kernel: audit: type=1400 audit(1747443122.100:1370): avc: denied { watch } for pid=2352 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=522510 scontext=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:52:02.156827 kernel: audit: type=1300 audit(1747443122.100:1370): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001d54b40 a2=fc6 a3=0 items=0 ppid=2209 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 key=(null) May 17 00:52:02.100000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:52:02.100000 audit[2352]: AVC avc: denied { watch } for pid=2352 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=522510 scontext=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:52:02.100000 audit[2352]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001d54b60 a2=fc6 a3=0 items=0 ppid=2209 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 key=(null) May 17 00:52:02.100000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:52:02.100000 audit[2352]: AVC avc: denied { watch } for pid=2352 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=522510 scontext=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:52:02.100000 audit[2352]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001d54b80 a2=fc6 a3=0 items=0 ppid=2209 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 key=(null) May 17 00:52:02.100000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:52:02.105000 audit[2352]: AVC avc: denied { watch } for pid=2352 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=522510 scontext=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:52:02.105000 audit[2352]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001d551e0 a2=fc6 a3=0 items=0 ppid=2209 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 key=(null) May 17 00:52:02.105000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:52:02.338014 sshd[5799]: pam_unix(sshd:session): session closed for user core May 17 00:52:02.337000 audit[5799]: USER_END pid=5799 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:02.338000 audit[5799]: CRED_DISP pid=5799 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:02.341175 systemd-logind[1466]: Session 12 logged out. Waiting for processes to exit. May 17 00:52:02.341000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.20.34:22-10.200.16.10:42216 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:52:02.342084 systemd[1]: sshd@9-10.200.20.34:22-10.200.16.10:42216.service: Deactivated successfully. May 17 00:52:02.342882 systemd[1]: session-12.scope: Deactivated successfully. May 17 00:52:02.343934 systemd-logind[1466]: Removed session 12. May 17 00:52:07.412066 systemd[1]: Started sshd@10-10.200.20.34:22-10.200.16.10:42218.service. May 17 00:52:07.441170 kernel: kauditd_printk_skb: 13 callbacks suppressed May 17 00:52:07.441293 kernel: audit: type=1130 audit(1747443127.411:1377): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.20.34:22-10.200.16.10:42218 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:52:07.411000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.20.34:22-10.200.16.10:42218 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:52:07.608866 systemd[1]: run-containerd-runc-k8s.io-1199e8fbc8f7a8735bd0e88aee601a4d3ea26357c725870e7083c78e967fda18-runc.WEsccJ.mount: Deactivated successfully. May 17 00:52:07.855000 audit[5817]: USER_ACCT pid=5817 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:07.855799 sshd[5817]: Accepted publickey for core from 10.200.16.10 port 42218 ssh2: RSA SHA256:kTalk4vvVOHJD+odK+kI4Z4CxTmNI3TSVyFiPn8PnHg May 17 00:52:07.882966 sshd[5817]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:52:07.883304 kernel: audit: type=1101 audit(1747443127.855:1378): pid=5817 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:07.882000 audit[5817]: CRED_ACQ pid=5817 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:07.921860 kernel: audit: type=1103 audit(1747443127.882:1379): pid=5817 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:07.921966 kernel: audit: type=1006 audit(1747443127.882:1380): pid=5817 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 May 17 00:52:07.882000 audit[5817]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffefd64d0 a2=3 a3=1 items=0 ppid=1 pid=5817 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:07.947563 kernel: audit: type=1300 audit(1747443127.882:1380): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffefd64d0 a2=3 a3=1 items=0 ppid=1 pid=5817 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:07.882000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:52:07.956789 kernel: audit: type=1327 audit(1747443127.882:1380): proctitle=737368643A20636F7265205B707269765D May 17 00:52:07.957404 systemd-logind[1466]: New session 13 of user core. May 17 00:52:07.957711 systemd[1]: Started session-13.scope. May 17 00:52:07.962000 audit[5817]: USER_START pid=5817 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:07.990371 kernel: audit: type=1105 audit(1747443127.962:1381): pid=5817 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:07.990000 audit[5840]: CRED_ACQ pid=5840 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:08.014320 kernel: audit: type=1103 audit(1747443127.990:1382): pid=5840 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:08.333329 sshd[5817]: pam_unix(sshd:session): session closed for user core May 17 00:52:08.333000 audit[5817]: USER_END pid=5817 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:08.334000 audit[5817]: CRED_DISP pid=5817 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:08.386243 kernel: audit: type=1106 audit(1747443128.333:1383): pid=5817 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:08.386374 kernel: audit: type=1104 audit(1747443128.334:1384): pid=5817 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:08.386734 systemd[1]: sshd@10-10.200.20.34:22-10.200.16.10:42218.service: Deactivated successfully. May 17 00:52:08.387565 systemd[1]: session-13.scope: Deactivated successfully. May 17 00:52:08.386000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.20.34:22-10.200.16.10:42218 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:52:08.388547 systemd-logind[1466]: Session 13 logged out. Waiting for processes to exit. May 17 00:52:08.389356 systemd-logind[1466]: Removed session 13. May 17 00:52:10.735000 audit[5369]: AVC avc: denied { watch } for pid=5369 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_49_46.804199671/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c208,c502 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c208,c502 tclass=file permissive=0 May 17 00:52:10.735000 audit[5369]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4002af0920 a2=fc6 a3=0 items=0 ppid=4895 pid=5369 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c208,c502 key=(null) May 17 00:52:10.735000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:52:12.143273 env[1480]: time="2025-05-17T00:52:12.143214186Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\"" May 17 00:52:12.344554 env[1480]: time="2025-05-17T00:52:12.344458892Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:52:12.349412 env[1480]: time="2025-05-17T00:52:12.349362460Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:52:12.349835 kubelet[2537]: E0517 00:52:12.349789 2537 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:52:12.350120 kubelet[2537]: E0517 00:52:12.349843 2537 kuberuntime_image.go:42] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:52:12.350120 kubelet[2537]: E0517 00:52:12.349975 2537 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.0,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:2d789fd7d12f447a87f7555b072d9747,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-m2wqv,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-65bfcd6f48-fpglr_calico-system(f2c35a1f-88d3-4b21-9134-27f4e6567489): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:52:12.351992 kubelet[2537]: E0517 00:52:12.351954 2537 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-65bfcd6f48-fpglr" podUID="f2c35a1f-88d3-4b21-9134-27f4e6567489" May 17 00:52:13.408059 systemd[1]: Started sshd@11-10.200.20.34:22-10.200.16.10:42348.service. May 17 00:52:13.441313 kernel: kauditd_printk_skb: 4 callbacks suppressed May 17 00:52:13.441435 kernel: audit: type=1130 audit(1747443133.407:1387): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.20.34:22-10.200.16.10:42348 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:52:13.407000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.20.34:22-10.200.16.10:42348 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:52:13.848000 audit[5851]: USER_ACCT pid=5851 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:13.849252 sshd[5851]: Accepted publickey for core from 10.200.16.10 port 42348 ssh2: RSA SHA256:kTalk4vvVOHJD+odK+kI4Z4CxTmNI3TSVyFiPn8PnHg May 17 00:52:13.876000 audit[5851]: CRED_ACQ pid=5851 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:13.879643 sshd[5851]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:52:13.899593 kernel: audit: type=1101 audit(1747443133.848:1388): pid=5851 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:13.899804 kernel: audit: type=1103 audit(1747443133.876:1389): pid=5851 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:13.919375 kernel: audit: type=1006 audit(1747443133.876:1390): pid=5851 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 May 17 00:52:13.876000 audit[5851]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff1efd2b0 a2=3 a3=1 items=0 ppid=1 pid=5851 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:13.945107 kernel: audit: type=1300 audit(1747443133.876:1390): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff1efd2b0 a2=3 a3=1 items=0 ppid=1 pid=5851 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:13.945201 kernel: audit: type=1327 audit(1747443133.876:1390): proctitle=737368643A20636F7265205B707269765D May 17 00:52:13.876000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:52:13.922426 systemd[1]: Started session-14.scope. May 17 00:52:13.923397 systemd-logind[1466]: New session 14 of user core. May 17 00:52:13.944000 audit[5851]: USER_START pid=5851 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:13.980985 kernel: audit: type=1105 audit(1747443133.944:1391): pid=5851 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:13.981360 kernel: audit: type=1103 audit(1747443133.944:1392): pid=5853 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:13.944000 audit[5853]: CRED_ACQ pid=5853 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:14.284602 sshd[5851]: pam_unix(sshd:session): session closed for user core May 17 00:52:14.285000 audit[5851]: USER_END pid=5851 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:14.287839 systemd-logind[1466]: Session 14 logged out. Waiting for processes to exit. May 17 00:52:14.288918 systemd[1]: session-14.scope: Deactivated successfully. May 17 00:52:14.290058 systemd-logind[1466]: Removed session 14. May 17 00:52:14.290707 systemd[1]: sshd@11-10.200.20.34:22-10.200.16.10:42348.service: Deactivated successfully. May 17 00:52:14.285000 audit[5851]: CRED_DISP pid=5851 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:14.339496 kernel: audit: type=1106 audit(1747443134.285:1393): pid=5851 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:14.339652 kernel: audit: type=1104 audit(1747443134.285:1394): pid=5851 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:14.290000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.20.34:22-10.200.16.10:42348 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:52:14.358519 systemd[1]: Started sshd@12-10.200.20.34:22-10.200.16.10:42360.service. May 17 00:52:14.358000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.20.34:22-10.200.16.10:42360 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:52:14.800689 sshd[5864]: Accepted publickey for core from 10.200.16.10 port 42360 ssh2: RSA SHA256:kTalk4vvVOHJD+odK+kI4Z4CxTmNI3TSVyFiPn8PnHg May 17 00:52:14.800000 audit[5864]: USER_ACCT pid=5864 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:14.802736 sshd[5864]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:52:14.802000 audit[5864]: CRED_ACQ pid=5864 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:14.802000 audit[5864]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdbf471a0 a2=3 a3=1 items=0 ppid=1 pid=5864 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:14.802000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:52:14.806945 systemd-logind[1466]: New session 15 of user core. May 17 00:52:14.807492 systemd[1]: Started session-15.scope. May 17 00:52:14.811000 audit[5864]: USER_START pid=5864 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:14.813000 audit[5866]: CRED_ACQ pid=5866 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:15.145615 env[1480]: time="2025-05-17T00:52:15.145502123Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\"" May 17 00:52:15.258353 sshd[5864]: pam_unix(sshd:session): session closed for user core May 17 00:52:15.259000 audit[5864]: USER_END pid=5864 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:15.260000 audit[5864]: CRED_DISP pid=5864 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:15.261964 systemd[1]: sshd@12-10.200.20.34:22-10.200.16.10:42360.service: Deactivated successfully. May 17 00:52:15.261000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.20.34:22-10.200.16.10:42360 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:52:15.262826 systemd[1]: session-15.scope: Deactivated successfully. May 17 00:52:15.263441 systemd-logind[1466]: Session 15 logged out. Waiting for processes to exit. May 17 00:52:15.264544 systemd-logind[1466]: Removed session 15. May 17 00:52:15.328547 systemd[1]: Started sshd@13-10.200.20.34:22-10.200.16.10:42362.service. May 17 00:52:15.328000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.20.34:22-10.200.16.10:42362 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:52:15.359954 env[1480]: time="2025-05-17T00:52:15.359877946Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:52:15.364140 env[1480]: time="2025-05-17T00:52:15.364088287Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:52:15.364392 kubelet[2537]: E0517 00:52:15.364347 2537 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:52:15.364709 kubelet[2537]: E0517 00:52:15.364404 2537 kuberuntime_image.go:42] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:52:15.364709 kubelet[2537]: E0517 00:52:15.364547 2537 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-vwtwv,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-78d55f7ddc-pmkbg_calico-system(85f144ac-4d39-496d-b3d5-66149a1574d7): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:52:15.366063 kubelet[2537]: E0517 00:52:15.366011 2537 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-pmkbg" podUID="85f144ac-4d39-496d-b3d5-66149a1574d7" May 17 00:52:15.744000 audit[5873]: USER_ACCT pid=5873 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:15.745211 sshd[5873]: Accepted publickey for core from 10.200.16.10 port 42362 ssh2: RSA SHA256:kTalk4vvVOHJD+odK+kI4Z4CxTmNI3TSVyFiPn8PnHg May 17 00:52:15.746674 sshd[5873]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:52:15.746000 audit[5873]: CRED_ACQ pid=5873 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:15.746000 audit[5873]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe43673c0 a2=3 a3=1 items=0 ppid=1 pid=5873 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:15.746000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:52:15.751301 systemd-logind[1466]: New session 16 of user core. May 17 00:52:15.751506 systemd[1]: Started session-16.scope. May 17 00:52:15.755000 audit[5873]: USER_START pid=5873 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:15.756000 audit[5875]: CRED_ACQ pid=5875 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:16.134924 sshd[5873]: pam_unix(sshd:session): session closed for user core May 17 00:52:16.136000 audit[5873]: USER_END pid=5873 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:16.136000 audit[5873]: CRED_DISP pid=5873 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:16.138356 systemd-logind[1466]: Session 16 logged out. Waiting for processes to exit. May 17 00:52:16.138549 systemd[1]: sshd@13-10.200.20.34:22-10.200.16.10:42362.service: Deactivated successfully. May 17 00:52:16.138000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.20.34:22-10.200.16.10:42362 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:52:16.139348 systemd[1]: session-16.scope: Deactivated successfully. May 17 00:52:16.140197 systemd-logind[1466]: Removed session 16. May 17 00:52:21.207090 systemd[1]: Started sshd@14-10.200.20.34:22-10.200.16.10:40042.service. May 17 00:52:21.207000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.20.34:22-10.200.16.10:40042 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:52:21.212343 kernel: kauditd_printk_skb: 23 callbacks suppressed May 17 00:52:21.212491 kernel: audit: type=1130 audit(1747443141.207:1414): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.20.34:22-10.200.16.10:40042 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:52:21.625000 audit[5904]: USER_ACCT pid=5904 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:21.626501 sshd[5904]: Accepted publickey for core from 10.200.16.10 port 40042 ssh2: RSA SHA256:kTalk4vvVOHJD+odK+kI4Z4CxTmNI3TSVyFiPn8PnHg May 17 00:52:21.652266 kernel: audit: type=1101 audit(1747443141.625:1415): pid=5904 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:21.652000 audit[5904]: CRED_ACQ pid=5904 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:21.653044 sshd[5904]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:52:21.694448 kernel: audit: type=1103 audit(1747443141.652:1416): pid=5904 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:21.694581 kernel: audit: type=1006 audit(1747443141.652:1417): pid=5904 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 May 17 00:52:21.652000 audit[5904]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe4324990 a2=3 a3=1 items=0 ppid=1 pid=5904 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:21.721263 kernel: audit: type=1300 audit(1747443141.652:1417): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe4324990 a2=3 a3=1 items=0 ppid=1 pid=5904 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:21.722212 systemd-logind[1466]: New session 17 of user core. May 17 00:52:21.731068 kernel: audit: type=1327 audit(1747443141.652:1417): proctitle=737368643A20636F7265205B707269765D May 17 00:52:21.652000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:52:21.731330 systemd[1]: Started session-17.scope. May 17 00:52:21.737000 audit[5904]: USER_START pid=5904 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:21.766000 audit[5906]: CRED_ACQ pid=5906 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:21.789622 kernel: audit: type=1105 audit(1747443141.737:1418): pid=5904 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:21.789838 kernel: audit: type=1103 audit(1747443141.766:1419): pid=5906 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:22.093364 sshd[5904]: pam_unix(sshd:session): session closed for user core May 17 00:52:22.094000 audit[5904]: USER_END pid=5904 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:22.096816 systemd[1]: session-17.scope: Deactivated successfully. May 17 00:52:22.097504 systemd[1]: sshd@14-10.200.20.34:22-10.200.16.10:40042.service: Deactivated successfully. May 17 00:52:22.094000 audit[5904]: CRED_DISP pid=5904 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:22.147768 kernel: audit: type=1106 audit(1747443142.094:1420): pid=5904 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:22.147884 kernel: audit: type=1104 audit(1747443142.094:1421): pid=5904 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:22.147449 systemd-logind[1466]: Session 17 logged out. Waiting for processes to exit. May 17 00:52:22.094000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.20.34:22-10.200.16.10:40042 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:52:22.148804 systemd-logind[1466]: Removed session 17. May 17 00:52:25.148132 env[1480]: time="2025-05-17T00:52:25.148049810Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\"" May 17 00:52:25.330663 env[1480]: time="2025-05-17T00:52:25.330593163Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:52:25.336315 env[1480]: time="2025-05-17T00:52:25.336255260Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:52:25.336744 kubelet[2537]: E0517 00:52:25.336707 2537 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:52:25.337087 kubelet[2537]: E0517 00:52:25.337064 2537 kuberuntime_image.go:42] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:52:25.337438 kubelet[2537]: E0517 00:52:25.337389 2537 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-m2wqv,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-65bfcd6f48-fpglr_calico-system(f2c35a1f-88d3-4b21-9134-27f4e6567489): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:52:25.338864 kubelet[2537]: E0517 00:52:25.338817 2537 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-65bfcd6f48-fpglr" podUID="f2c35a1f-88d3-4b21-9134-27f4e6567489" May 17 00:52:26.143346 kubelet[2537]: E0517 00:52:26.143305 2537 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-pmkbg" podUID="85f144ac-4d39-496d-b3d5-66149a1574d7" May 17 00:52:27.193201 kernel: kauditd_printk_skb: 1 callbacks suppressed May 17 00:52:27.193366 kernel: audit: type=1130 audit(1747443147.163:1423): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.20.34:22-10.200.16.10:40058 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:52:27.163000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.20.34:22-10.200.16.10:40058 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:52:27.164301 systemd[1]: Started sshd@15-10.200.20.34:22-10.200.16.10:40058.service. May 17 00:52:27.581000 audit[5916]: USER_ACCT pid=5916 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:27.584154 sshd[5916]: Accepted publickey for core from 10.200.16.10 port 40058 ssh2: RSA SHA256:kTalk4vvVOHJD+odK+kI4Z4CxTmNI3TSVyFiPn8PnHg May 17 00:52:27.609408 sshd[5916]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:52:27.607000 audit[5916]: CRED_ACQ pid=5916 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:27.632618 kernel: audit: type=1101 audit(1747443147.581:1424): pid=5916 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:27.632766 kernel: audit: type=1103 audit(1747443147.607:1425): pid=5916 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:27.648527 kernel: audit: type=1006 audit(1747443147.607:1426): pid=5916 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 May 17 00:52:27.607000 audit[5916]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd5adba20 a2=3 a3=1 items=0 ppid=1 pid=5916 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:27.678275 kernel: audit: type=1300 audit(1747443147.607:1426): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd5adba20 a2=3 a3=1 items=0 ppid=1 pid=5916 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:27.681457 systemd[1]: Started session-18.scope. May 17 00:52:27.682679 systemd-logind[1466]: New session 18 of user core. May 17 00:52:27.607000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:52:27.696836 kernel: audit: type=1327 audit(1747443147.607:1426): proctitle=737368643A20636F7265205B707269765D May 17 00:52:27.686000 audit[5916]: USER_START pid=5916 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:27.727643 kernel: audit: type=1105 audit(1747443147.686:1427): pid=5916 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:27.687000 audit[5918]: CRED_ACQ pid=5918 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:27.757301 kernel: audit: type=1103 audit(1747443147.687:1428): pid=5918 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:28.059363 sshd[5916]: pam_unix(sshd:session): session closed for user core May 17 00:52:28.058000 audit[5916]: USER_END pid=5916 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:28.094461 systemd-logind[1466]: Session 18 logged out. Waiting for processes to exit. May 17 00:52:28.095939 systemd[1]: sshd@15-10.200.20.34:22-10.200.16.10:40058.service: Deactivated successfully. May 17 00:52:28.096753 systemd[1]: session-18.scope: Deactivated successfully. May 17 00:52:28.059000 audit[5916]: CRED_DISP pid=5916 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:28.098527 systemd-logind[1466]: Removed session 18. May 17 00:52:28.122685 kernel: audit: type=1106 audit(1747443148.058:1429): pid=5916 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:28.122814 kernel: audit: type=1104 audit(1747443148.059:1430): pid=5916 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:28.094000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.20.34:22-10.200.16.10:40058 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:52:33.135081 systemd[1]: Started sshd@16-10.200.20.34:22-10.200.16.10:39594.service. May 17 00:52:33.134000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.20.34:22-10.200.16.10:39594 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:52:33.140738 kernel: kauditd_printk_skb: 1 callbacks suppressed May 17 00:52:33.140856 kernel: audit: type=1130 audit(1747443153.134:1432): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.20.34:22-10.200.16.10:39594 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:52:33.609000 audit[5933]: USER_ACCT pid=5933 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:33.614479 sshd[5933]: Accepted publickey for core from 10.200.16.10 port 39594 ssh2: RSA SHA256:kTalk4vvVOHJD+odK+kI4Z4CxTmNI3TSVyFiPn8PnHg May 17 00:52:33.636298 kernel: audit: type=1101 audit(1747443153.609:1433): pid=5933 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:33.637056 sshd[5933]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:52:33.635000 audit[5933]: CRED_ACQ pid=5933 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:33.674892 kernel: audit: type=1103 audit(1747443153.635:1434): pid=5933 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:33.675023 kernel: audit: type=1006 audit(1747443153.635:1435): pid=5933 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 May 17 00:52:33.635000 audit[5933]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc867aeb0 a2=3 a3=1 items=0 ppid=1 pid=5933 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:33.703000 kernel: audit: type=1300 audit(1747443153.635:1435): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc867aeb0 a2=3 a3=1 items=0 ppid=1 pid=5933 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:33.679711 systemd-logind[1466]: New session 19 of user core. May 17 00:52:33.635000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:52:33.680308 systemd[1]: Started session-19.scope. May 17 00:52:33.711621 kernel: audit: type=1327 audit(1747443153.635:1435): proctitle=737368643A20636F7265205B707269765D May 17 00:52:33.682000 audit[5933]: USER_START pid=5933 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:33.739041 kernel: audit: type=1105 audit(1747443153.682:1436): pid=5933 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:33.682000 audit[5935]: CRED_ACQ pid=5935 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:33.763586 kernel: audit: type=1103 audit(1747443153.682:1437): pid=5935 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:34.023478 sshd[5933]: pam_unix(sshd:session): session closed for user core May 17 00:52:34.023000 audit[5933]: USER_END pid=5933 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:34.027130 systemd[1]: session-19.scope: Deactivated successfully. May 17 00:52:34.028028 systemd[1]: sshd@16-10.200.20.34:22-10.200.16.10:39594.service: Deactivated successfully. May 17 00:52:34.024000 audit[5933]: CRED_DISP pid=5933 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:34.052422 systemd-logind[1466]: Session 19 logged out. Waiting for processes to exit. May 17 00:52:34.078144 kernel: audit: type=1106 audit(1747443154.023:1438): pid=5933 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:34.078358 kernel: audit: type=1104 audit(1747443154.024:1439): pid=5933 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:34.027000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.20.34:22-10.200.16.10:39594 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:52:34.079766 systemd-logind[1466]: Removed session 19. May 17 00:52:37.609852 systemd[1]: run-containerd-runc-k8s.io-1199e8fbc8f7a8735bd0e88aee601a4d3ea26357c725870e7083c78e967fda18-runc.Zi3JbL.mount: Deactivated successfully. May 17 00:52:39.094001 systemd[1]: Started sshd@17-10.200.20.34:22-10.200.16.10:47348.service. May 17 00:52:39.092000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.20.34:22-10.200.16.10:47348 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:52:39.099706 kernel: kauditd_printk_skb: 1 callbacks suppressed May 17 00:52:39.099847 kernel: audit: type=1130 audit(1747443159.092:1441): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.20.34:22-10.200.16.10:47348 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:52:39.146509 kubelet[2537]: E0517 00:52:39.144850 2537 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-65bfcd6f48-fpglr" podUID="f2c35a1f-88d3-4b21-9134-27f4e6567489" May 17 00:52:39.517000 audit[5967]: USER_ACCT pid=5967 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:39.520403 sshd[5967]: Accepted publickey for core from 10.200.16.10 port 47348 ssh2: RSA SHA256:kTalk4vvVOHJD+odK+kI4Z4CxTmNI3TSVyFiPn8PnHg May 17 00:52:39.520911 sshd[5967]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:52:39.518000 audit[5967]: CRED_ACQ pid=5967 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:39.548774 systemd-logind[1466]: New session 20 of user core. May 17 00:52:39.549777 systemd[1]: Started session-20.scope. May 17 00:52:39.570014 kernel: audit: type=1101 audit(1747443159.517:1442): pid=5967 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:39.570145 kernel: audit: type=1103 audit(1747443159.518:1443): pid=5967 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:39.585248 kernel: audit: type=1006 audit(1747443159.518:1444): pid=5967 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=20 res=1 May 17 00:52:39.518000 audit[5967]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe66cefd0 a2=3 a3=1 items=0 ppid=1 pid=5967 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:39.611310 kernel: audit: type=1300 audit(1747443159.518:1444): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe66cefd0 a2=3 a3=1 items=0 ppid=1 pid=5967 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:39.518000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:52:39.619793 kernel: audit: type=1327 audit(1747443159.518:1444): proctitle=737368643A20636F7265205B707269765D May 17 00:52:39.554000 audit[5967]: USER_START pid=5967 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:39.558000 audit[5969]: CRED_ACQ pid=5969 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:39.674335 kernel: audit: type=1105 audit(1747443159.554:1445): pid=5967 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:39.674464 kernel: audit: type=1103 audit(1747443159.558:1446): pid=5969 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:39.907440 sshd[5967]: pam_unix(sshd:session): session closed for user core May 17 00:52:39.907000 audit[5967]: USER_END pid=5967 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:39.911138 systemd-logind[1466]: Session 20 logged out. Waiting for processes to exit. May 17 00:52:39.912539 systemd[1]: session-20.scope: Deactivated successfully. May 17 00:52:39.914009 systemd-logind[1466]: Removed session 20. May 17 00:52:39.914751 systemd[1]: sshd@17-10.200.20.34:22-10.200.16.10:47348.service: Deactivated successfully. May 17 00:52:39.907000 audit[5967]: CRED_DISP pid=5967 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:39.967869 kernel: audit: type=1106 audit(1747443159.907:1447): pid=5967 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:39.968023 kernel: audit: type=1104 audit(1747443159.907:1448): pid=5967 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:39.913000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.20.34:22-10.200.16.10:47348 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:52:39.983604 systemd[1]: Started sshd@18-10.200.20.34:22-10.200.16.10:47354.service. May 17 00:52:39.982000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.20.34:22-10.200.16.10:47354 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:52:40.143425 kubelet[2537]: E0517 00:52:40.143361 2537 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-pmkbg" podUID="85f144ac-4d39-496d-b3d5-66149a1574d7" May 17 00:52:40.436000 audit[5979]: USER_ACCT pid=5979 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:40.437985 sshd[5979]: Accepted publickey for core from 10.200.16.10 port 47354 ssh2: RSA SHA256:kTalk4vvVOHJD+odK+kI4Z4CxTmNI3TSVyFiPn8PnHg May 17 00:52:40.437000 audit[5979]: CRED_ACQ pid=5979 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:40.438000 audit[5979]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc8633c90 a2=3 a3=1 items=0 ppid=1 pid=5979 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:40.438000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:52:40.439604 sshd[5979]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:52:40.444165 systemd[1]: Started session-21.scope. May 17 00:52:40.445178 systemd-logind[1466]: New session 21 of user core. May 17 00:52:40.450000 audit[5979]: USER_START pid=5979 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:40.451000 audit[5981]: CRED_ACQ pid=5981 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:40.955335 sshd[5979]: pam_unix(sshd:session): session closed for user core May 17 00:52:40.955000 audit[5979]: USER_END pid=5979 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:40.955000 audit[5979]: CRED_DISP pid=5979 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:40.957942 systemd-logind[1466]: Session 21 logged out. Waiting for processes to exit. May 17 00:52:40.958255 systemd[1]: sshd@18-10.200.20.34:22-10.200.16.10:47354.service: Deactivated successfully. May 17 00:52:40.959057 systemd[1]: session-21.scope: Deactivated successfully. May 17 00:52:40.957000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.20.34:22-10.200.16.10:47354 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:52:40.960028 systemd-logind[1466]: Removed session 21. May 17 00:52:41.026270 systemd[1]: Started sshd@19-10.200.20.34:22-10.200.16.10:47362.service. May 17 00:52:41.029000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.20.34:22-10.200.16.10:47362 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:52:41.444521 sshd[5988]: Accepted publickey for core from 10.200.16.10 port 47362 ssh2: RSA SHA256:kTalk4vvVOHJD+odK+kI4Z4CxTmNI3TSVyFiPn8PnHg May 17 00:52:41.443000 audit[5988]: USER_ACCT pid=5988 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:41.444000 audit[5988]: CRED_ACQ pid=5988 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:41.444000 audit[5988]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdc5cf330 a2=3 a3=1 items=0 ppid=1 pid=5988 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:41.444000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:52:41.446252 sshd[5988]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:52:41.450683 systemd-logind[1466]: New session 22 of user core. May 17 00:52:41.451287 systemd[1]: Started session-22.scope. May 17 00:52:41.454000 audit[5988]: USER_START pid=5988 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:41.455000 audit[5990]: CRED_ACQ pid=5990 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:42.301000 systemd[1]: run-containerd-runc-k8s.io-75428c4c09b4fe20fd36bcd3990495245e13100967d591c566b7f85e38200274-runc.j5aWaJ.mount: Deactivated successfully. May 17 00:52:42.627000 audit[6022]: NETFILTER_CFG table=filter:135 family=2 entries=24 op=nft_register_rule pid=6022 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:52:42.627000 audit[6022]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=13432 a0=3 a1=fffffd78e2a0 a2=0 a3=1 items=0 ppid=2686 pid=6022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:42.627000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:52:42.632000 audit[6022]: NETFILTER_CFG table=nat:136 family=2 entries=22 op=nft_register_rule pid=6022 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:52:42.632000 audit[6022]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=fffffd78e2a0 a2=0 a3=1 items=0 ppid=2686 pid=6022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:42.632000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:52:42.654000 audit[6024]: NETFILTER_CFG table=filter:137 family=2 entries=36 op=nft_register_rule pid=6024 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:52:42.654000 audit[6024]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=13432 a0=3 a1=ffffc2184e10 a2=0 a3=1 items=0 ppid=2686 pid=6024 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:42.654000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:52:42.657000 audit[6024]: NETFILTER_CFG table=nat:138 family=2 entries=22 op=nft_register_rule pid=6024 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:52:42.657000 audit[6024]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffc2184e10 a2=0 a3=1 items=0 ppid=2686 pid=6024 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:42.657000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:52:42.718967 sshd[5988]: pam_unix(sshd:session): session closed for user core May 17 00:52:42.718000 audit[5988]: USER_END pid=5988 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:42.718000 audit[5988]: CRED_DISP pid=5988 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:42.721826 systemd[1]: sshd@19-10.200.20.34:22-10.200.16.10:47362.service: Deactivated successfully. May 17 00:52:42.720000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.20.34:22-10.200.16.10:47362 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:52:42.722676 systemd[1]: session-22.scope: Deactivated successfully. May 17 00:52:42.723459 systemd-logind[1466]: Session 22 logged out. Waiting for processes to exit. May 17 00:52:42.724691 systemd-logind[1466]: Removed session 22. May 17 00:52:42.786000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.20.34:22-10.200.16.10:47364 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:52:42.787301 systemd[1]: Started sshd@20-10.200.20.34:22-10.200.16.10:47364.service. May 17 00:52:43.199607 sshd[6027]: Accepted publickey for core from 10.200.16.10 port 47364 ssh2: RSA SHA256:kTalk4vvVOHJD+odK+kI4Z4CxTmNI3TSVyFiPn8PnHg May 17 00:52:43.198000 audit[6027]: USER_ACCT pid=6027 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:43.200976 sshd[6027]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:52:43.199000 audit[6027]: CRED_ACQ pid=6027 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:43.199000 audit[6027]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffca77c600 a2=3 a3=1 items=0 ppid=1 pid=6027 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:43.199000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:52:43.206350 systemd[1]: Started session-23.scope. May 17 00:52:43.206767 systemd-logind[1466]: New session 23 of user core. May 17 00:52:43.210000 audit[6027]: USER_START pid=6027 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:43.211000 audit[6029]: CRED_ACQ pid=6029 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:43.690164 sshd[6027]: pam_unix(sshd:session): session closed for user core May 17 00:52:43.690000 audit[6027]: USER_END pid=6027 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:43.690000 audit[6027]: CRED_DISP pid=6027 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:43.692962 systemd-logind[1466]: Session 23 logged out. Waiting for processes to exit. May 17 00:52:43.693151 systemd[1]: sshd@20-10.200.20.34:22-10.200.16.10:47364.service: Deactivated successfully. May 17 00:52:43.692000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.20.34:22-10.200.16.10:47364 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:52:43.693939 systemd[1]: session-23.scope: Deactivated successfully. May 17 00:52:43.694607 systemd-logind[1466]: Removed session 23. May 17 00:52:43.764699 systemd[1]: Started sshd@21-10.200.20.34:22-10.200.16.10:47380.service. May 17 00:52:43.763000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.20.34:22-10.200.16.10:47380 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:52:44.206000 audit[6036]: USER_ACCT pid=6036 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:44.209355 sshd[6036]: Accepted publickey for core from 10.200.16.10 port 47380 ssh2: RSA SHA256:kTalk4vvVOHJD+odK+kI4Z4CxTmNI3TSVyFiPn8PnHg May 17 00:52:44.211273 sshd[6036]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:52:44.213332 kernel: kauditd_printk_skb: 47 callbacks suppressed May 17 00:52:44.213434 kernel: audit: type=1101 audit(1747443164.206:1482): pid=6036 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:44.209000 audit[6036]: CRED_ACQ pid=6036 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:44.263843 kernel: audit: type=1103 audit(1747443164.209:1483): pid=6036 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:44.279418 kernel: audit: type=1006 audit(1747443164.209:1484): pid=6036 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 May 17 00:52:44.209000 audit[6036]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff5abce10 a2=3 a3=1 items=0 ppid=1 pid=6036 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:44.209000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:52:44.319097 kernel: audit: type=1300 audit(1747443164.209:1484): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff5abce10 a2=3 a3=1 items=0 ppid=1 pid=6036 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:44.319260 kernel: audit: type=1327 audit(1747443164.209:1484): proctitle=737368643A20636F7265205B707269765D May 17 00:52:44.321983 systemd[1]: Started session-24.scope. May 17 00:52:44.322368 systemd-logind[1466]: New session 24 of user core. May 17 00:52:44.326000 audit[6036]: USER_START pid=6036 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:44.327000 audit[6038]: CRED_ACQ pid=6038 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:44.377583 kernel: audit: type=1105 audit(1747443164.326:1485): pid=6036 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:44.377693 kernel: audit: type=1103 audit(1747443164.327:1486): pid=6038 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:44.654384 sshd[6036]: pam_unix(sshd:session): session closed for user core May 17 00:52:44.654000 audit[6036]: USER_END pid=6036 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:44.657551 systemd[1]: session-24.scope: Deactivated successfully. May 17 00:52:44.658115 systemd[1]: sshd@21-10.200.20.34:22-10.200.16.10:47380.service: Deactivated successfully. May 17 00:52:44.654000 audit[6036]: CRED_DISP pid=6036 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:44.687516 systemd-logind[1466]: Session 24 logged out. Waiting for processes to exit. May 17 00:52:44.688618 systemd-logind[1466]: Removed session 24. May 17 00:52:44.710117 kernel: audit: type=1106 audit(1747443164.654:1487): pid=6036 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:44.710332 kernel: audit: type=1104 audit(1747443164.654:1488): pid=6036 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:44.710371 kernel: audit: type=1131 audit(1747443164.657:1489): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.20.34:22-10.200.16.10:47380 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:52:44.657000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.20.34:22-10.200.16.10:47380 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:52:49.359000 audit[6048]: NETFILTER_CFG table=filter:139 family=2 entries=24 op=nft_register_rule pid=6048 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:52:49.359000 audit[6048]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=ffffff541710 a2=0 a3=1 items=0 ppid=2686 pid=6048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:49.408613 kernel: audit: type=1325 audit(1747443169.359:1490): table=filter:139 family=2 entries=24 op=nft_register_rule pid=6048 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:52:49.408768 kernel: audit: type=1300 audit(1747443169.359:1490): arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=ffffff541710 a2=0 a3=1 items=0 ppid=2686 pid=6048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:49.359000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:52:49.423084 kernel: audit: type=1327 audit(1747443169.359:1490): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:52:49.424000 audit[6048]: NETFILTER_CFG table=nat:140 family=2 entries=106 op=nft_register_chain pid=6048 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:52:49.442777 kernel: audit: type=1325 audit(1747443169.424:1491): table=nat:140 family=2 entries=106 op=nft_register_chain pid=6048 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:52:49.442899 kernel: audit: type=1300 audit(1747443169.424:1491): arch=c00000b7 syscall=211 success=yes exit=49452 a0=3 a1=ffffff541710 a2=0 a3=1 items=0 ppid=2686 pid=6048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:49.424000 audit[6048]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=49452 a0=3 a1=ffffff541710 a2=0 a3=1 items=0 ppid=2686 pid=6048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:49.424000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:52:49.486163 kernel: audit: type=1327 audit(1747443169.424:1491): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:52:49.726137 systemd[1]: Started sshd@22-10.200.20.34:22-10.200.16.10:57112.service. May 17 00:52:49.725000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.20.34:22-10.200.16.10:57112 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:52:49.750280 kernel: audit: type=1130 audit(1747443169.725:1492): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.20.34:22-10.200.16.10:57112 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:52:49.890553 systemd[1]: run-containerd-runc-k8s.io-75428c4c09b4fe20fd36bcd3990495245e13100967d591c566b7f85e38200274-runc.ueWwlC.mount: Deactivated successfully. May 17 00:52:50.143000 audit[6056]: USER_ACCT pid=6056 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:50.144796 sshd[6056]: Accepted publickey for core from 10.200.16.10 port 57112 ssh2: RSA SHA256:kTalk4vvVOHJD+odK+kI4Z4CxTmNI3TSVyFiPn8PnHg May 17 00:52:50.147063 sshd[6056]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:52:50.145000 audit[6056]: CRED_ACQ pid=6056 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:50.193439 kernel: audit: type=1101 audit(1747443170.143:1493): pid=6056 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:50.193585 kernel: audit: type=1103 audit(1747443170.145:1494): pid=6056 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:50.209177 kernel: audit: type=1006 audit(1747443170.145:1495): pid=6056 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 May 17 00:52:50.145000 audit[6056]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff785aeb0 a2=3 a3=1 items=0 ppid=1 pid=6056 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:50.145000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:52:50.212852 systemd[1]: Started session-25.scope. May 17 00:52:50.213966 systemd-logind[1466]: New session 25 of user core. May 17 00:52:50.217000 audit[6056]: USER_START pid=6056 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:50.219000 audit[6078]: CRED_ACQ pid=6078 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:50.535867 sshd[6056]: pam_unix(sshd:session): session closed for user core May 17 00:52:50.535000 audit[6056]: USER_END pid=6056 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:50.536000 audit[6056]: CRED_DISP pid=6056 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:50.539605 systemd[1]: sshd@22-10.200.20.34:22-10.200.16.10:57112.service: Deactivated successfully. May 17 00:52:50.538000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.20.34:22-10.200.16.10:57112 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:52:50.540451 systemd[1]: session-25.scope: Deactivated successfully. May 17 00:52:50.540593 systemd-logind[1466]: Session 25 logged out. Waiting for processes to exit. May 17 00:52:50.541583 systemd-logind[1466]: Removed session 25. May 17 00:52:51.144734 kubelet[2537]: E0517 00:52:51.144686 2537 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-65bfcd6f48-fpglr" podUID="f2c35a1f-88d3-4b21-9134-27f4e6567489" May 17 00:52:54.888000 audit[2352]: AVC avc: denied { watch } for pid=2352 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=522510 scontext=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:52:54.894228 kernel: kauditd_printk_skb: 7 callbacks suppressed May 17 00:52:54.894346 kernel: audit: type=1400 audit(1747443174.888:1501): avc: denied { watch } for pid=2352 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=522510 scontext=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:52:54.888000 audit[2352]: AVC avc: denied { watch } for pid=2352 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=522516 scontext=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:52:54.941865 kernel: audit: type=1400 audit(1747443174.888:1502): avc: denied { watch } for pid=2352 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=522516 scontext=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:52:54.942005 kernel: audit: type=1300 audit(1747443174.888:1502): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000aa9890 a2=fc6 a3=0 items=0 ppid=2209 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 key=(null) May 17 00:52:54.888000 audit[2352]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000aa9890 a2=fc6 a3=0 items=0 ppid=2209 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 key=(null) May 17 00:52:54.888000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:52:54.999083 kernel: audit: type=1327 audit(1747443174.888:1502): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:52:54.888000 audit[2352]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002aa1da0 a2=fc6 a3=0 items=0 ppid=2209 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 key=(null) May 17 00:52:55.033035 kernel: audit: type=1300 audit(1747443174.888:1501): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002aa1da0 a2=fc6 a3=0 items=0 ppid=2209 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 key=(null) May 17 00:52:54.888000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:52:55.059357 kernel: audit: type=1327 audit(1747443174.888:1501): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:52:55.145901 kubelet[2537]: E0517 00:52:55.143395 2537 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-pmkbg" podUID="85f144ac-4d39-496d-b3d5-66149a1574d7" May 17 00:52:55.610607 systemd[1]: Started sshd@23-10.200.20.34:22-10.200.16.10:57124.service. May 17 00:52:55.609000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.20.34:22-10.200.16.10:57124 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:52:55.643280 kernel: audit: type=1130 audit(1747443175.609:1503): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.20.34:22-10.200.16.10:57124 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:52:56.055000 audit[6088]: USER_ACCT pid=6088 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:56.062514 sshd[6088]: Accepted publickey for core from 10.200.16.10 port 57124 ssh2: RSA SHA256:kTalk4vvVOHJD+odK+kI4Z4CxTmNI3TSVyFiPn8PnHg May 17 00:52:56.064642 sshd[6088]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:52:56.061000 audit[6088]: CRED_ACQ pid=6088 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:56.110051 kernel: audit: type=1101 audit(1747443176.055:1504): pid=6088 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:56.110203 kernel: audit: type=1103 audit(1747443176.061:1505): pid=6088 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:56.126989 kernel: audit: type=1006 audit(1747443176.061:1506): pid=6088 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 May 17 00:52:56.061000 audit[6088]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdeace010 a2=3 a3=1 items=0 ppid=1 pid=6088 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:56.061000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:52:56.116000 audit[2419]: AVC avc: denied { watch } for pid=2419 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=522518 scontext=system_u:system_r:svirt_lxc_net_t:s0:c703,c977 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:52:56.116000 audit[2419]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7d a1=40049f0d20 a2=fc6 a3=0 items=0 ppid=2279 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c703,c977 key=(null) May 17 00:52:56.116000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3334002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 00:52:56.116000 audit[2419]: AVC avc: denied { watch } for pid=2419 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=522516 scontext=system_u:system_r:svirt_lxc_net_t:s0:c703,c977 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:52:56.116000 audit[2419]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7d a1=40049f0db0 a2=fc6 a3=0 items=0 ppid=2279 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c703,c977 key=(null) May 17 00:52:56.116000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3334002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 00:52:56.129311 systemd-logind[1466]: New session 26 of user core. May 17 00:52:56.130058 systemd[1]: Started session-26.scope. May 17 00:52:56.134000 audit[6088]: USER_START pid=6088 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:56.136000 audit[6090]: CRED_ACQ pid=6090 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:56.178000 audit[2419]: AVC avc: denied { watch } for pid=2419 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=522516 scontext=system_u:system_r:svirt_lxc_net_t:s0:c703,c977 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:52:56.178000 audit[2419]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7d a1=40136d20f0 a2=fc6 a3=0 items=0 ppid=2279 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c703,c977 key=(null) May 17 00:52:56.178000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3334002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 00:52:56.179000 audit[2419]: AVC avc: denied { watch } for pid=2419 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=522510 scontext=system_u:system_r:svirt_lxc_net_t:s0:c703,c977 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:52:56.179000 audit[2419]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7d a1=4005310560 a2=fc6 a3=0 items=0 ppid=2279 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c703,c977 key=(null) May 17 00:52:56.179000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3334002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 00:52:56.179000 audit[2419]: AVC avc: denied { watch } for pid=2419 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=522510 scontext=system_u:system_r:svirt_lxc_net_t:s0:c703,c977 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:52:56.179000 audit[2419]: AVC avc: denied { watch } for pid=2419 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=522512 scontext=system_u:system_r:svirt_lxc_net_t:s0:c703,c977 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:52:56.179000 audit[2419]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7e a1=4007eb9740 a2=fc6 a3=0 items=0 ppid=2279 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c703,c977 key=(null) May 17 00:52:56.179000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3334002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 00:52:56.179000 audit[2419]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7d a1=4005310580 a2=fc6 a3=0 items=0 ppid=2279 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c703,c977 key=(null) May 17 00:52:56.179000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3334002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 00:52:56.494306 sshd[6088]: pam_unix(sshd:session): session closed for user core May 17 00:52:56.494000 audit[6088]: USER_END pid=6088 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:56.495000 audit[6088]: CRED_DISP pid=6088 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:52:56.497912 systemd[1]: sshd@23-10.200.20.34:22-10.200.16.10:57124.service: Deactivated successfully. May 17 00:52:56.498755 systemd[1]: session-26.scope: Deactivated successfully. May 17 00:52:56.496000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.20.34:22-10.200.16.10:57124 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:52:56.499662 systemd-logind[1466]: Session 26 logged out. Waiting for processes to exit. May 17 00:52:56.500514 systemd-logind[1466]: Removed session 26. May 17 00:52:59.816000 audit[5165]: AVC avc: denied { watch } for pid=5165 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_49_47.1376700025/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c273,c865 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c273,c865 tclass=file permissive=0 May 17 00:52:59.816000 audit[5165]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4001f10080 a2=fc6 a3=0 items=0 ppid=4737 pid=5165 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c273,c865 key=(null) May 17 00:52:59.816000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:53:01.570322 systemd[1]: Started sshd@24-10.200.20.34:22-10.200.16.10:50254.service. May 17 00:53:01.569000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.20.34:22-10.200.16.10:50254 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:01.575590 kernel: kauditd_printk_skb: 28 callbacks suppressed May 17 00:53:01.575728 kernel: audit: type=1130 audit(1747443181.569:1519): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.20.34:22-10.200.16.10:50254 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:02.016000 audit[6102]: USER_ACCT pid=6102 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:53:02.019022 sshd[6102]: Accepted publickey for core from 10.200.16.10 port 50254 ssh2: RSA SHA256:kTalk4vvVOHJD+odK+kI4Z4CxTmNI3TSVyFiPn8PnHg May 17 00:53:02.019885 sshd[6102]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:53:02.018000 audit[6102]: CRED_ACQ pid=6102 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:53:02.047765 systemd[1]: Started session-27.scope. May 17 00:53:02.048978 systemd-logind[1466]: New session 27 of user core. May 17 00:53:02.070420 kernel: audit: type=1101 audit(1747443182.016:1520): pid=6102 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:53:02.070752 kernel: audit: type=1103 audit(1747443182.018:1521): pid=6102 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:53:02.090782 kernel: audit: type=1006 audit(1747443182.018:1522): pid=6102 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 May 17 00:53:02.090934 kernel: audit: type=1300 audit(1747443182.018:1522): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe804bb00 a2=3 a3=1 items=0 ppid=1 pid=6102 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:53:02.018000 audit[6102]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe804bb00 a2=3 a3=1 items=0 ppid=1 pid=6102 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:53:02.018000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:53:02.130270 kernel: audit: type=1327 audit(1747443182.018:1522): proctitle=737368643A20636F7265205B707269765D May 17 00:53:02.130478 kernel: audit: type=1105 audit(1747443182.053:1523): pid=6102 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:53:02.053000 audit[6102]: USER_START pid=6102 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:53:02.055000 audit[6104]: CRED_ACQ pid=6104 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:53:02.185374 kernel: audit: type=1103 audit(1747443182.055:1524): pid=6104 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:53:02.119000 audit[2352]: AVC avc: denied { watch } for pid=2352 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=522510 scontext=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:53:02.211534 kernel: audit: type=1400 audit(1747443182.119:1525): avc: denied { watch } for pid=2352 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=522510 scontext=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:53:02.119000 audit[2352]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002e52b80 a2=fc6 a3=0 items=0 ppid=2209 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 key=(null) May 17 00:53:02.246290 kernel: audit: type=1300 audit(1747443182.119:1525): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002e52b80 a2=fc6 a3=0 items=0 ppid=2209 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 key=(null) May 17 00:53:02.119000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:53:02.119000 audit[2352]: AVC avc: denied { watch } for pid=2352 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=522510 scontext=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:53:02.119000 audit[2352]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4002d7eaa0 a2=fc6 a3=0 items=0 ppid=2209 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 key=(null) May 17 00:53:02.119000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:53:02.119000 audit[2352]: AVC avc: denied { watch } for pid=2352 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=522510 scontext=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:53:02.119000 audit[2352]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002e52ba0 a2=fc6 a3=0 items=0 ppid=2209 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 key=(null) May 17 00:53:02.119000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:53:02.119000 audit[2352]: AVC avc: denied { watch } for pid=2352 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=522510 scontext=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:53:02.119000 audit[2352]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4002e52bc0 a2=fc6 a3=0 items=0 ppid=2209 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c240,c1008 key=(null) May 17 00:53:02.119000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:53:02.410342 sshd[6102]: pam_unix(sshd:session): session closed for user core May 17 00:53:02.410000 audit[6102]: USER_END pid=6102 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:53:02.410000 audit[6102]: CRED_DISP pid=6102 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:53:02.413000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.20.34:22-10.200.16.10:50254 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:02.414537 systemd[1]: sshd@24-10.200.20.34:22-10.200.16.10:50254.service: Deactivated successfully. May 17 00:53:02.415381 systemd[1]: session-27.scope: Deactivated successfully. May 17 00:53:02.416174 systemd-logind[1466]: Session 27 logged out. Waiting for processes to exit. May 17 00:53:02.417063 systemd-logind[1466]: Removed session 27. May 17 00:53:03.144451 kubelet[2537]: E0517 00:53:03.144410 2537 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-65bfcd6f48-fpglr" podUID="f2c35a1f-88d3-4b21-9134-27f4e6567489" May 17 00:53:06.144158 kubelet[2537]: E0517 00:53:06.144109 2537 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-pmkbg" podUID="85f144ac-4d39-496d-b3d5-66149a1574d7" May 17 00:53:07.486827 systemd[1]: Started sshd@25-10.200.20.34:22-10.200.16.10:50268.service. May 17 00:53:07.485000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.20.34:22-10.200.16.10:50268 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:07.495265 kernel: kauditd_printk_skb: 13 callbacks suppressed May 17 00:53:07.495393 kernel: audit: type=1130 audit(1747443187.485:1532): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.20.34:22-10.200.16.10:50268 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:07.942000 audit[6118]: USER_ACCT pid=6118 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:53:07.943638 sshd[6118]: Accepted publickey for core from 10.200.16.10 port 50268 ssh2: RSA SHA256:kTalk4vvVOHJD+odK+kI4Z4CxTmNI3TSVyFiPn8PnHg May 17 00:53:07.946128 sshd[6118]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:53:07.942000 audit[6118]: CRED_ACQ pid=6118 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:53:07.995676 kernel: audit: type=1101 audit(1747443187.942:1533): pid=6118 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:53:07.995838 kernel: audit: type=1103 audit(1747443187.942:1534): pid=6118 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:53:08.012740 kernel: audit: type=1006 audit(1747443187.942:1535): pid=6118 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=28 res=1 May 17 00:53:07.942000 audit[6118]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc7427510 a2=3 a3=1 items=0 ppid=1 pid=6118 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:53:08.019412 systemd-logind[1466]: New session 28 of user core. May 17 00:53:08.020071 systemd[1]: Started session-28.scope. May 17 00:53:08.042527 kernel: audit: type=1300 audit(1747443187.942:1535): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc7427510 a2=3 a3=1 items=0 ppid=1 pid=6118 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:53:07.942000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:53:08.054438 kernel: audit: type=1327 audit(1747443187.942:1535): proctitle=737368643A20636F7265205B707269765D May 17 00:53:08.042000 audit[6118]: USER_START pid=6118 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:53:08.086103 kernel: audit: type=1105 audit(1747443188.042:1536): pid=6118 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:53:08.053000 audit[6142]: CRED_ACQ pid=6142 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:53:08.111482 kernel: audit: type=1103 audit(1747443188.053:1537): pid=6142 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:53:08.416131 sshd[6118]: pam_unix(sshd:session): session closed for user core May 17 00:53:08.416000 audit[6118]: USER_END pid=6118 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:53:08.419940 systemd-logind[1466]: Session 28 logged out. Waiting for processes to exit. May 17 00:53:08.421083 systemd[1]: session-28.scope: Deactivated successfully. May 17 00:53:08.422288 systemd-logind[1466]: Removed session 28. May 17 00:53:08.422951 systemd[1]: sshd@25-10.200.20.34:22-10.200.16.10:50268.service: Deactivated successfully. May 17 00:53:08.416000 audit[6118]: CRED_DISP pid=6118 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:53:08.481787 kernel: audit: type=1106 audit(1747443188.416:1538): pid=6118 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:53:08.481932 kernel: audit: type=1104 audit(1747443188.416:1539): pid=6118 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:53:08.421000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.20.34:22-10.200.16.10:50268 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:10.735000 audit[5369]: AVC avc: denied { watch } for pid=5369 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_49_46.804199671/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c208,c502 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c208,c502 tclass=file permissive=0 May 17 00:53:10.735000 audit[5369]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=40007db480 a2=fc6 a3=0 items=0 ppid=4895 pid=5369 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c208,c502 key=(null) May 17 00:53:10.735000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:53:13.485579 systemd[1]: Started sshd@26-10.200.20.34:22-10.200.16.10:40708.service. May 17 00:53:13.514615 kernel: kauditd_printk_skb: 4 callbacks suppressed May 17 00:53:13.514741 kernel: audit: type=1130 audit(1747443193.484:1542): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.200.20.34:22-10.200.16.10:40708 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:13.484000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.200.20.34:22-10.200.16.10:40708 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:13.900000 audit[6152]: USER_ACCT pid=6152 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:53:13.903012 sshd[6152]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:53:13.903874 sshd[6152]: Accepted publickey for core from 10.200.16.10 port 40708 ssh2: RSA SHA256:kTalk4vvVOHJD+odK+kI4Z4CxTmNI3TSVyFiPn8PnHg May 17 00:53:13.901000 audit[6152]: CRED_ACQ pid=6152 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:53:13.955378 kernel: audit: type=1101 audit(1747443193.900:1543): pid=6152 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:53:13.955535 kernel: audit: type=1103 audit(1747443193.901:1544): pid=6152 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:53:13.972069 kernel: audit: type=1006 audit(1747443193.901:1545): pid=6152 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=29 res=1 May 17 00:53:13.901000 audit[6152]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcda0e890 a2=3 a3=1 items=0 ppid=1 pid=6152 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:53:13.976449 systemd-logind[1466]: New session 29 of user core. May 17 00:53:14.001351 systemd[1]: Started session-29.scope. May 17 00:53:13.901000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:53:14.012056 kernel: audit: type=1300 audit(1747443193.901:1545): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcda0e890 a2=3 a3=1 items=0 ppid=1 pid=6152 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:53:14.012160 kernel: audit: type=1327 audit(1747443193.901:1545): proctitle=737368643A20636F7265205B707269765D May 17 00:53:14.012000 audit[6152]: USER_START pid=6152 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:53:14.012000 audit[6154]: CRED_ACQ pid=6154 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:53:14.067883 kernel: audit: type=1105 audit(1747443194.012:1546): pid=6152 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:53:14.067993 kernel: audit: type=1103 audit(1747443194.012:1547): pid=6154 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:53:14.348519 sshd[6152]: pam_unix(sshd:session): session closed for user core May 17 00:53:14.348000 audit[6152]: USER_END pid=6152 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:53:14.351657 systemd-logind[1466]: Session 29 logged out. Waiting for processes to exit. May 17 00:53:14.353863 systemd[1]: sshd@26-10.200.20.34:22-10.200.16.10:40708.service: Deactivated successfully. May 17 00:53:14.355308 systemd[1]: session-29.scope: Deactivated successfully. May 17 00:53:14.356431 systemd-logind[1466]: Removed session 29. May 17 00:53:14.348000 audit[6152]: CRED_DISP pid=6152 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:53:14.403599 kernel: audit: type=1106 audit(1747443194.348:1548): pid=6152 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:53:14.403718 kernel: audit: type=1104 audit(1747443194.348:1549): pid=6152 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:53:14.352000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.200.20.34:22-10.200.16.10:40708 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:16.144627 kubelet[2537]: E0517 00:53:16.144581 2537 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-65bfcd6f48-fpglr" podUID="f2c35a1f-88d3-4b21-9134-27f4e6567489" May 17 00:53:18.143428 kubelet[2537]: E0517 00:53:18.143384 2537 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-pmkbg" podUID="85f144ac-4d39-496d-b3d5-66149a1574d7"