May 17 01:02:51.009863 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] May 17 01:02:51.009882 kernel: Linux version 5.15.182-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Fri May 16 23:24:21 -00 2025 May 17 01:02:51.009890 kernel: earlycon: pl11 at MMIO 0x00000000effec000 (options '') May 17 01:02:51.009897 kernel: printk: bootconsole [pl11] enabled May 17 01:02:51.009902 kernel: efi: EFI v2.70 by EDK II May 17 01:02:51.009908 kernel: efi: ACPI 2.0=0x3fd5f018 SMBIOS=0x3e580000 SMBIOS 3.0=0x3e560000 MEMATTR=0x3ead8b98 RNG=0x3fd5f998 MEMRESERVE=0x3763cf98 May 17 01:02:51.009914 kernel: random: crng init done May 17 01:02:51.009920 kernel: ACPI: Early table checksum verification disabled May 17 01:02:51.009925 kernel: ACPI: RSDP 0x000000003FD5F018 000024 (v02 VRTUAL) May 17 01:02:51.009931 kernel: ACPI: XSDT 0x000000003FD5FF18 00006C (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 01:02:51.009936 kernel: ACPI: FACP 0x000000003FD5FC18 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 01:02:51.009942 kernel: ACPI: DSDT 0x000000003FD41018 01DFCD (v02 MSFTVM DSDT01 00000001 INTL 20230628) May 17 01:02:51.009948 kernel: ACPI: DBG2 0x000000003FD5FB18 000072 (v00 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 01:02:51.009954 kernel: ACPI: GTDT 0x000000003FD5FD98 000060 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 01:02:51.009960 kernel: ACPI: OEM0 0x000000003FD5F098 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 01:02:51.009966 kernel: ACPI: SPCR 0x000000003FD5FA98 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 01:02:51.015515 kernel: ACPI: APIC 0x000000003FD5F818 0000FC (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 01:02:51.015526 kernel: ACPI: SRAT 0x000000003FD5F198 000234 (v03 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 01:02:51.015532 kernel: ACPI: PPTT 0x000000003FD5F418 000120 (v01 VRTUAL MICROSFT 00000000 MSFT 00000000) May 17 01:02:51.015538 kernel: ACPI: BGRT 0x000000003FD5FE98 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 01:02:51.015544 kernel: ACPI: SPCR: console: pl011,mmio32,0xeffec000,115200 May 17 01:02:51.015550 kernel: NUMA: Failed to initialise from firmware May 17 01:02:51.015556 kernel: NUMA: Faking a node at [mem 0x0000000000000000-0x00000001bfffffff] May 17 01:02:51.015562 kernel: NUMA: NODE_DATA [mem 0x1bf7f3900-0x1bf7f8fff] May 17 01:02:51.015568 kernel: Zone ranges: May 17 01:02:51.015573 kernel: DMA [mem 0x0000000000000000-0x00000000ffffffff] May 17 01:02:51.015579 kernel: DMA32 empty May 17 01:02:51.015585 kernel: Normal [mem 0x0000000100000000-0x00000001bfffffff] May 17 01:02:51.015592 kernel: Movable zone start for each node May 17 01:02:51.015598 kernel: Early memory node ranges May 17 01:02:51.015603 kernel: node 0: [mem 0x0000000000000000-0x00000000007fffff] May 17 01:02:51.015609 kernel: node 0: [mem 0x0000000000824000-0x000000003e54ffff] May 17 01:02:51.015615 kernel: node 0: [mem 0x000000003e550000-0x000000003e87ffff] May 17 01:02:51.015620 kernel: node 0: [mem 0x000000003e880000-0x000000003fc7ffff] May 17 01:02:51.015626 kernel: node 0: [mem 0x000000003fc80000-0x000000003fcfffff] May 17 01:02:51.015632 kernel: node 0: [mem 0x000000003fd00000-0x000000003fffffff] May 17 01:02:51.015637 kernel: node 0: [mem 0x0000000100000000-0x00000001bfffffff] May 17 01:02:51.015643 kernel: Initmem setup node 0 [mem 0x0000000000000000-0x00000001bfffffff] May 17 01:02:51.015649 kernel: On node 0, zone DMA: 36 pages in unavailable ranges May 17 01:02:51.015655 kernel: psci: probing for conduit method from ACPI. May 17 01:02:51.015664 kernel: psci: PSCIv1.1 detected in firmware. May 17 01:02:51.015670 kernel: psci: Using standard PSCI v0.2 function IDs May 17 01:02:51.015676 kernel: psci: MIGRATE_INFO_TYPE not supported. May 17 01:02:51.015682 kernel: psci: SMC Calling Convention v1.4 May 17 01:02:51.015688 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x0 -> Node -1 May 17 01:02:51.015696 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1 -> Node -1 May 17 01:02:51.015702 kernel: percpu: Embedded 30 pages/cpu s83032 r8192 d31656 u122880 May 17 01:02:51.015708 kernel: pcpu-alloc: s83032 r8192 d31656 u122880 alloc=30*4096 May 17 01:02:51.015715 kernel: pcpu-alloc: [0] 0 [0] 1 May 17 01:02:51.015721 kernel: Detected PIPT I-cache on CPU0 May 17 01:02:51.015727 kernel: CPU features: detected: GIC system register CPU interface May 17 01:02:51.015733 kernel: CPU features: detected: Hardware dirty bit management May 17 01:02:51.015739 kernel: CPU features: detected: Spectre-BHB May 17 01:02:51.015746 kernel: CPU features: kernel page table isolation forced ON by KASLR May 17 01:02:51.015752 kernel: CPU features: detected: Kernel page table isolation (KPTI) May 17 01:02:51.015758 kernel: CPU features: detected: ARM erratum 1418040 May 17 01:02:51.015765 kernel: CPU features: detected: ARM erratum 1542419 (kernel portion) May 17 01:02:51.015771 kernel: CPU features: detected: SSBS not fully self-synchronizing May 17 01:02:51.015777 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1032156 May 17 01:02:51.015783 kernel: Policy zone: Normal May 17 01:02:51.015791 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=2d48a3f066dcb37cd386b93b4921577cdf70daa76e7b097cf98da108968f8bb5 May 17 01:02:51.015798 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 17 01:02:51.015804 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) May 17 01:02:51.015810 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 17 01:02:51.015816 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 17 01:02:51.015822 kernel: software IO TLB: mapped [mem 0x000000003a550000-0x000000003e550000] (64MB) May 17 01:02:51.015829 kernel: Memory: 3986944K/4194160K available (9792K kernel code, 2094K rwdata, 7584K rodata, 36416K init, 777K bss, 207216K reserved, 0K cma-reserved) May 17 01:02:51.015836 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 May 17 01:02:51.015842 kernel: trace event string verifier disabled May 17 01:02:51.015848 kernel: rcu: Preemptible hierarchical RCU implementation. May 17 01:02:51.015855 kernel: rcu: RCU event tracing is enabled. May 17 01:02:51.015861 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. May 17 01:02:51.015867 kernel: Trampoline variant of Tasks RCU enabled. May 17 01:02:51.015873 kernel: Tracing variant of Tasks RCU enabled. May 17 01:02:51.015880 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 17 01:02:51.015886 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 May 17 01:02:51.015892 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 May 17 01:02:51.015898 kernel: GICv3: 960 SPIs implemented May 17 01:02:51.015905 kernel: GICv3: 0 Extended SPIs implemented May 17 01:02:51.015911 kernel: GICv3: Distributor has no Range Selector support May 17 01:02:51.015917 kernel: Root IRQ handler: gic_handle_irq May 17 01:02:51.015923 kernel: GICv3: 16 PPIs implemented May 17 01:02:51.015929 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000effee000 May 17 01:02:51.015935 kernel: ITS: No ITS available, not enabling LPIs May 17 01:02:51.015942 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 17 01:02:51.015948 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). May 17 01:02:51.015954 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns May 17 01:02:51.015961 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns May 17 01:02:51.015967 kernel: Console: colour dummy device 80x25 May 17 01:02:51.015985 kernel: printk: console [tty1] enabled May 17 01:02:51.015991 kernel: ACPI: Core revision 20210730 May 17 01:02:51.015998 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) May 17 01:02:51.016004 kernel: pid_max: default: 32768 minimum: 301 May 17 01:02:51.016011 kernel: LSM: Security Framework initializing May 17 01:02:51.016017 kernel: SELinux: Initializing. May 17 01:02:51.016024 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 17 01:02:51.016030 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 17 01:02:51.016036 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3a8030, hints 0xe, misc 0x31e1 May 17 01:02:51.016044 kernel: Hyper-V: Host Build 10.0.22477.1619-1-0 May 17 01:02:51.016050 kernel: rcu: Hierarchical SRCU implementation. May 17 01:02:51.016056 kernel: Remapping and enabling EFI services. May 17 01:02:51.016063 kernel: smp: Bringing up secondary CPUs ... May 17 01:02:51.016069 kernel: Detected PIPT I-cache on CPU1 May 17 01:02:51.016075 kernel: GICv3: CPU1: found redistributor 1 region 1:0x00000000f000e000 May 17 01:02:51.016082 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 17 01:02:51.016088 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] May 17 01:02:51.016094 kernel: smp: Brought up 1 node, 2 CPUs May 17 01:02:51.016100 kernel: SMP: Total of 2 processors activated. May 17 01:02:51.016108 kernel: CPU features: detected: 32-bit EL0 Support May 17 01:02:51.016114 kernel: CPU features: detected: Instruction cache invalidation not required for I/D coherence May 17 01:02:51.016121 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence May 17 01:02:51.016127 kernel: CPU features: detected: CRC32 instructions May 17 01:02:51.016133 kernel: CPU features: detected: RCpc load-acquire (LDAPR) May 17 01:02:51.016139 kernel: CPU features: detected: LSE atomic instructions May 17 01:02:51.016146 kernel: CPU features: detected: Privileged Access Never May 17 01:02:51.016152 kernel: CPU: All CPU(s) started at EL1 May 17 01:02:51.016158 kernel: alternatives: patching kernel code May 17 01:02:51.016166 kernel: devtmpfs: initialized May 17 01:02:51.016177 kernel: KASLR enabled May 17 01:02:51.016184 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 17 01:02:51.016191 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) May 17 01:02:51.016198 kernel: pinctrl core: initialized pinctrl subsystem May 17 01:02:51.016204 kernel: SMBIOS 3.1.0 present. May 17 01:02:51.016211 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 09/28/2024 May 17 01:02:51.016218 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 17 01:02:51.016224 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations May 17 01:02:51.016232 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations May 17 01:02:51.016239 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations May 17 01:02:51.016246 kernel: audit: initializing netlink subsys (disabled) May 17 01:02:51.016252 kernel: audit: type=2000 audit(0.088:1): state=initialized audit_enabled=0 res=1 May 17 01:02:51.016259 kernel: thermal_sys: Registered thermal governor 'step_wise' May 17 01:02:51.016266 kernel: cpuidle: using governor menu May 17 01:02:51.016272 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. May 17 01:02:51.016280 kernel: ASID allocator initialised with 32768 entries May 17 01:02:51.016286 kernel: ACPI: bus type PCI registered May 17 01:02:51.016293 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 17 01:02:51.016300 kernel: Serial: AMBA PL011 UART driver May 17 01:02:51.016306 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 17 01:02:51.016313 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages May 17 01:02:51.016319 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 17 01:02:51.016326 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages May 17 01:02:51.016332 kernel: cryptd: max_cpu_qlen set to 1000 May 17 01:02:51.016340 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) May 17 01:02:51.016347 kernel: ACPI: Added _OSI(Module Device) May 17 01:02:51.016353 kernel: ACPI: Added _OSI(Processor Device) May 17 01:02:51.016360 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 17 01:02:51.016366 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 17 01:02:51.016373 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 17 01:02:51.016379 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 17 01:02:51.016386 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 17 01:02:51.016393 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 17 01:02:51.016401 kernel: ACPI: Interpreter enabled May 17 01:02:51.016407 kernel: ACPI: Using GIC for interrupt routing May 17 01:02:51.016414 kernel: ARMH0011:00: ttyAMA0 at MMIO 0xeffec000 (irq = 12, base_baud = 0) is a SBSA May 17 01:02:51.016420 kernel: printk: console [ttyAMA0] enabled May 17 01:02:51.016427 kernel: printk: bootconsole [pl11] disabled May 17 01:02:51.016434 kernel: ARMH0011:01: ttyAMA1 at MMIO 0xeffeb000 (irq = 13, base_baud = 0) is a SBSA May 17 01:02:51.016440 kernel: iommu: Default domain type: Translated May 17 01:02:51.016447 kernel: iommu: DMA domain TLB invalidation policy: strict mode May 17 01:02:51.016453 kernel: vgaarb: loaded May 17 01:02:51.016460 kernel: pps_core: LinuxPPS API ver. 1 registered May 17 01:02:51.016468 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 17 01:02:51.016475 kernel: PTP clock support registered May 17 01:02:51.016481 kernel: Registered efivars operations May 17 01:02:51.016488 kernel: No ACPI PMU IRQ for CPU0 May 17 01:02:51.016494 kernel: No ACPI PMU IRQ for CPU1 May 17 01:02:51.016501 kernel: clocksource: Switched to clocksource arch_sys_counter May 17 01:02:51.016507 kernel: VFS: Disk quotas dquot_6.6.0 May 17 01:02:51.016514 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 17 01:02:51.016522 kernel: pnp: PnP ACPI init May 17 01:02:51.016528 kernel: pnp: PnP ACPI: found 0 devices May 17 01:02:51.016535 kernel: NET: Registered PF_INET protocol family May 17 01:02:51.016541 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) May 17 01:02:51.016548 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) May 17 01:02:51.016555 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 17 01:02:51.016562 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) May 17 01:02:51.016568 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) May 17 01:02:51.016575 kernel: TCP: Hash tables configured (established 32768 bind 32768) May 17 01:02:51.016583 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) May 17 01:02:51.016589 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) May 17 01:02:51.016596 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 17 01:02:51.016603 kernel: PCI: CLS 0 bytes, default 64 May 17 01:02:51.016609 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 1 counters available May 17 01:02:51.016616 kernel: kvm [1]: HYP mode not available May 17 01:02:51.016622 kernel: Initialise system trusted keyrings May 17 01:02:51.016629 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 May 17 01:02:51.016635 kernel: Key type asymmetric registered May 17 01:02:51.016643 kernel: Asymmetric key parser 'x509' registered May 17 01:02:51.016650 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 17 01:02:51.016656 kernel: io scheduler mq-deadline registered May 17 01:02:51.016663 kernel: io scheduler kyber registered May 17 01:02:51.016669 kernel: io scheduler bfq registered May 17 01:02:51.016676 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 17 01:02:51.016682 kernel: thunder_xcv, ver 1.0 May 17 01:02:51.016689 kernel: thunder_bgx, ver 1.0 May 17 01:02:51.016695 kernel: nicpf, ver 1.0 May 17 01:02:51.016701 kernel: nicvf, ver 1.0 May 17 01:02:51.016823 kernel: rtc-efi rtc-efi.0: registered as rtc0 May 17 01:02:51.016883 kernel: rtc-efi rtc-efi.0: setting system clock to 2025-05-17T01:02:50 UTC (1747443770) May 17 01:02:51.016892 kernel: efifb: probing for efifb May 17 01:02:51.016898 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k May 17 01:02:51.016905 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 May 17 01:02:51.016911 kernel: efifb: scrolling: redraw May 17 01:02:51.016918 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 May 17 01:02:51.016926 kernel: Console: switching to colour frame buffer device 128x48 May 17 01:02:51.016933 kernel: fb0: EFI VGA frame buffer device May 17 01:02:51.016940 kernel: SMCCC: SOC_ID: ARCH_SOC_ID not implemented, skipping .... May 17 01:02:51.016946 kernel: hid: raw HID events driver (C) Jiri Kosina May 17 01:02:51.016953 kernel: NET: Registered PF_INET6 protocol family May 17 01:02:51.016959 kernel: Segment Routing with IPv6 May 17 01:02:51.016966 kernel: In-situ OAM (IOAM) with IPv6 May 17 01:02:51.016989 kernel: NET: Registered PF_PACKET protocol family May 17 01:02:51.016996 kernel: Key type dns_resolver registered May 17 01:02:51.017002 kernel: registered taskstats version 1 May 17 01:02:51.017011 kernel: Loading compiled-in X.509 certificates May 17 01:02:51.017018 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.182-flatcar: 2fa973ae674d09a62938b8c6a2b9446b5340adb7' May 17 01:02:51.017024 kernel: Key type .fscrypt registered May 17 01:02:51.017030 kernel: Key type fscrypt-provisioning registered May 17 01:02:51.017037 kernel: ima: No TPM chip found, activating TPM-bypass! May 17 01:02:51.017044 kernel: ima: Allocated hash algorithm: sha1 May 17 01:02:51.017050 kernel: ima: No architecture policies found May 17 01:02:51.017057 kernel: clk: Disabling unused clocks May 17 01:02:51.017065 kernel: Freeing unused kernel memory: 36416K May 17 01:02:51.017071 kernel: Run /init as init process May 17 01:02:51.017078 kernel: with arguments: May 17 01:02:51.017084 kernel: /init May 17 01:02:51.017090 kernel: with environment: May 17 01:02:51.017097 kernel: HOME=/ May 17 01:02:51.017103 kernel: TERM=linux May 17 01:02:51.017109 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 17 01:02:51.017118 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 17 01:02:51.017129 systemd[1]: Detected virtualization microsoft. May 17 01:02:51.017136 systemd[1]: Detected architecture arm64. May 17 01:02:51.017143 systemd[1]: Running in initrd. May 17 01:02:51.017150 systemd[1]: No hostname configured, using default hostname. May 17 01:02:51.017157 systemd[1]: Hostname set to . May 17 01:02:51.017164 systemd[1]: Initializing machine ID from random generator. May 17 01:02:51.017171 systemd[1]: Queued start job for default target initrd.target. May 17 01:02:51.017179 systemd[1]: Started systemd-ask-password-console.path. May 17 01:02:51.017186 systemd[1]: Reached target cryptsetup.target. May 17 01:02:51.017193 systemd[1]: Reached target paths.target. May 17 01:02:51.017200 systemd[1]: Reached target slices.target. May 17 01:02:51.017207 systemd[1]: Reached target swap.target. May 17 01:02:51.017214 systemd[1]: Reached target timers.target. May 17 01:02:51.017222 systemd[1]: Listening on iscsid.socket. May 17 01:02:51.017229 systemd[1]: Listening on iscsiuio.socket. May 17 01:02:51.017237 systemd[1]: Listening on systemd-journald-audit.socket. May 17 01:02:51.017245 systemd[1]: Listening on systemd-journald-dev-log.socket. May 17 01:02:51.017252 systemd[1]: Listening on systemd-journald.socket. May 17 01:02:51.017259 systemd[1]: Listening on systemd-networkd.socket. May 17 01:02:51.017266 systemd[1]: Listening on systemd-udevd-control.socket. May 17 01:02:51.017273 systemd[1]: Listening on systemd-udevd-kernel.socket. May 17 01:02:51.017280 systemd[1]: Reached target sockets.target. May 17 01:02:51.017287 systemd[1]: Starting kmod-static-nodes.service... May 17 01:02:51.017294 systemd[1]: Finished network-cleanup.service. May 17 01:02:51.017302 systemd[1]: Starting systemd-fsck-usr.service... May 17 01:02:51.017309 systemd[1]: Starting systemd-journald.service... May 17 01:02:51.017316 systemd[1]: Starting systemd-modules-load.service... May 17 01:02:51.017323 systemd[1]: Starting systemd-resolved.service... May 17 01:02:51.017330 systemd[1]: Starting systemd-vconsole-setup.service... May 17 01:02:51.017340 systemd-journald[276]: Journal started May 17 01:02:51.017380 systemd-journald[276]: Runtime Journal (/run/log/journal/f48da15c51114a4281dac4dc1abd8e26) is 8.0M, max 78.5M, 70.5M free. May 17 01:02:50.998171 systemd-modules-load[277]: Inserted module 'overlay' May 17 01:02:51.041982 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 17 01:02:51.054778 systemd[1]: Started systemd-journald.service. May 17 01:02:51.054820 kernel: Bridge firewalling registered May 17 01:02:51.054831 kernel: audit: type=1130 audit(1747443771.053:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:02:51.053000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:02:51.054949 systemd-modules-load[277]: Inserted module 'br_netfilter' May 17 01:02:51.071322 systemd[1]: Finished kmod-static-nodes.service. May 17 01:02:51.103448 kernel: audit: type=1130 audit(1747443771.084:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:02:51.084000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:02:51.076801 systemd-resolved[278]: Positive Trust Anchors: May 17 01:02:51.076807 systemd-resolved[278]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 17 01:02:51.161286 kernel: audit: type=1130 audit(1747443771.107:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:02:51.161307 kernel: SCSI subsystem initialized May 17 01:02:51.161316 kernel: audit: type=1130 audit(1747443771.134:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:02:51.107000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:02:51.134000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:02:51.076836 systemd-resolved[278]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 17 01:02:51.078890 systemd-resolved[278]: Defaulting to hostname 'linux'. May 17 01:02:51.231220 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 17 01:02:51.231249 kernel: device-mapper: uevent: version 1.0.3 May 17 01:02:51.231258 kernel: audit: type=1130 audit(1747443771.214:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:02:51.214000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:02:51.084414 systemd[1]: Started systemd-resolved.service. May 17 01:02:51.107719 systemd[1]: Finished systemd-fsck-usr.service. May 17 01:02:51.255041 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 17 01:02:51.135090 systemd[1]: Finished systemd-vconsole-setup.service. May 17 01:02:51.215216 systemd[1]: Reached target nss-lookup.target. May 17 01:02:51.246491 systemd[1]: Starting dracut-cmdline-ask.service... May 17 01:02:51.250943 systemd-modules-load[277]: Inserted module 'dm_multipath' May 17 01:02:51.307893 kernel: audit: type=1130 audit(1747443771.282:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:02:51.282000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:02:51.255650 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 17 01:02:51.274668 systemd[1]: Finished systemd-modules-load.service. May 17 01:02:51.306000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:02:51.283290 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 17 01:02:51.308859 systemd[1]: Starting systemd-sysctl.service... May 17 01:02:51.372383 kernel: audit: type=1130 audit(1747443771.306:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:02:51.372407 kernel: audit: type=1130 audit(1747443771.347:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:02:51.347000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:02:51.334829 systemd[1]: Finished dracut-cmdline-ask.service. May 17 01:02:51.376000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:02:51.352238 systemd[1]: Starting dracut-cmdline.service... May 17 01:02:51.401623 kernel: audit: type=1130 audit(1747443771.376:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:02:51.401705 dracut-cmdline[299]: dracut-dracut-053 May 17 01:02:51.401705 dracut-cmdline[299]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=2d48a3f066dcb37cd386b93b4921577cdf70daa76e7b097cf98da108968f8bb5 May 17 01:02:51.371526 systemd[1]: Finished systemd-sysctl.service. May 17 01:02:51.461985 kernel: Loading iSCSI transport class v2.0-870. May 17 01:02:51.475993 kernel: iscsi: registered transport (tcp) May 17 01:02:51.496632 kernel: iscsi: registered transport (qla4xxx) May 17 01:02:51.496670 kernel: QLogic iSCSI HBA Driver May 17 01:02:51.525381 systemd[1]: Finished dracut-cmdline.service. May 17 01:02:51.529000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:02:51.530826 systemd[1]: Starting dracut-pre-udev.service... May 17 01:02:51.583994 kernel: raid6: neonx8 gen() 13734 MB/s May 17 01:02:51.604982 kernel: raid6: neonx8 xor() 10839 MB/s May 17 01:02:51.625989 kernel: raid6: neonx4 gen() 13480 MB/s May 17 01:02:51.645985 kernel: raid6: neonx4 xor() 11200 MB/s May 17 01:02:51.665995 kernel: raid6: neonx2 gen() 13111 MB/s May 17 01:02:51.687982 kernel: raid6: neonx2 xor() 10231 MB/s May 17 01:02:51.707986 kernel: raid6: neonx1 gen() 10532 MB/s May 17 01:02:51.727984 kernel: raid6: neonx1 xor() 8791 MB/s May 17 01:02:51.749985 kernel: raid6: int64x8 gen() 6272 MB/s May 17 01:02:51.769986 kernel: raid6: int64x8 xor() 3546 MB/s May 17 01:02:51.789984 kernel: raid6: int64x4 gen() 7202 MB/s May 17 01:02:51.811988 kernel: raid6: int64x4 xor() 3855 MB/s May 17 01:02:51.831984 kernel: raid6: int64x2 gen() 6152 MB/s May 17 01:02:51.851984 kernel: raid6: int64x2 xor() 3323 MB/s May 17 01:02:51.872982 kernel: raid6: int64x1 gen() 5047 MB/s May 17 01:02:51.897068 kernel: raid6: int64x1 xor() 2646 MB/s May 17 01:02:51.897088 kernel: raid6: using algorithm neonx8 gen() 13734 MB/s May 17 01:02:51.897104 kernel: raid6: .... xor() 10839 MB/s, rmw enabled May 17 01:02:51.901100 kernel: raid6: using neon recovery algorithm May 17 01:02:51.923029 kernel: xor: measuring software checksum speed May 17 01:02:51.923041 kernel: 8regs : 17217 MB/sec May 17 01:02:51.926740 kernel: 32regs : 20707 MB/sec May 17 01:02:51.930410 kernel: arm64_neon : 27974 MB/sec May 17 01:02:51.930420 kernel: xor: using function: arm64_neon (27974 MB/sec) May 17 01:02:51.989994 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no May 17 01:02:52.000310 systemd[1]: Finished dracut-pre-udev.service. May 17 01:02:52.004000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:02:52.007000 audit: BPF prog-id=7 op=LOAD May 17 01:02:52.007000 audit: BPF prog-id=8 op=LOAD May 17 01:02:52.008989 systemd[1]: Starting systemd-udevd.service... May 17 01:02:52.023286 systemd-udevd[475]: Using default interface naming scheme 'v252'. May 17 01:02:52.029386 systemd[1]: Started systemd-udevd.service. May 17 01:02:52.033000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:02:52.039277 systemd[1]: Starting dracut-pre-trigger.service... May 17 01:02:52.055546 dracut-pre-trigger[496]: rd.md=0: removing MD RAID activation May 17 01:02:52.088149 systemd[1]: Finished dracut-pre-trigger.service. May 17 01:02:52.092000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:02:52.093635 systemd[1]: Starting systemd-udev-trigger.service... May 17 01:02:52.141851 systemd[1]: Finished systemd-udev-trigger.service. May 17 01:02:52.149000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:02:52.189059 kernel: hv_vmbus: Vmbus version:5.3 May 17 01:02:52.195994 kernel: hv_vmbus: registering driver hid_hyperv May 17 01:02:52.213283 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input0 May 17 01:02:52.213318 kernel: hid-generic 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on May 17 01:02:52.217994 kernel: hv_vmbus: registering driver hyperv_keyboard May 17 01:02:52.239389 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/MSFT1000:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input1 May 17 01:02:52.239436 kernel: hv_vmbus: registering driver hv_netvsc May 17 01:02:52.246079 kernel: hv_vmbus: registering driver hv_storvsc May 17 01:02:52.249993 kernel: scsi host1: storvsc_host_t May 17 01:02:52.260142 kernel: scsi host0: storvsc_host_t May 17 01:02:52.260286 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 May 17 01:02:52.267019 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 May 17 01:02:52.291033 kernel: sr 0:0:0:2: [sr0] scsi-1 drive May 17 01:02:52.313298 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 May 17 01:02:52.313311 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) May 17 01:02:52.324838 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks May 17 01:02:52.324935 kernel: sd 0:0:0:0: [sda] Write Protect is off May 17 01:02:52.325031 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 May 17 01:02:52.325110 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA May 17 01:02:52.325190 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 May 17 01:02:52.325284 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 17 01:02:52.325293 kernel: sd 0:0:0:0: [sda] Attached SCSI disk May 17 01:02:52.333987 kernel: hv_netvsc 002248be-6fcd-0022-48be-6fcd002248be eth0: VF slot 1 added May 17 01:02:52.341996 kernel: hv_vmbus: registering driver hv_pci May 17 01:02:52.355991 kernel: hv_pci eea0a24e-daa5-48c1-94f2-26953b75b016: PCI VMBus probing: Using version 0x10004 May 17 01:02:52.476417 kernel: hv_pci eea0a24e-daa5-48c1-94f2-26953b75b016: PCI host bridge to bus daa5:00 May 17 01:02:52.476531 kernel: pci_bus daa5:00: root bus resource [mem 0xfc0000000-0xfc00fffff window] May 17 01:02:52.476631 kernel: pci_bus daa5:00: No busn resource found for root bus, will use [bus 00-ff] May 17 01:02:52.476711 kernel: pci daa5:00:02.0: [15b3:1018] type 00 class 0x020000 May 17 01:02:52.476814 kernel: pci daa5:00:02.0: reg 0x10: [mem 0xfc0000000-0xfc00fffff 64bit pref] May 17 01:02:52.476901 kernel: pci daa5:00:02.0: enabling Extended Tags May 17 01:02:52.477014 kernel: pci daa5:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at daa5:00:02.0 (capable of 126.016 Gb/s with 8.0 GT/s PCIe x16 link) May 17 01:02:52.477096 kernel: pci_bus daa5:00: busn_res: [bus 00-ff] end is updated to 00 May 17 01:02:52.477169 kernel: pci daa5:00:02.0: BAR 0: assigned [mem 0xfc0000000-0xfc00fffff 64bit pref] May 17 01:02:52.514008 kernel: mlx5_core daa5:00:02.0: firmware version: 16.30.1284 May 17 01:02:52.732318 kernel: mlx5_core daa5:00:02.0: MLX5E: StrdRq(1) RqSz(8) StrdSz(2048) RxCqeCmprss(0) May 17 01:02:52.732449 kernel: hv_netvsc 002248be-6fcd-0022-48be-6fcd002248be eth0: VF registering: eth1 May 17 01:02:52.732552 kernel: mlx5_core daa5:00:02.0 eth1: joined to eth0 May 17 01:02:52.741025 kernel: mlx5_core daa5:00:02.0 enP55973s1: renamed from eth1 May 17 01:02:52.790003 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (529) May 17 01:02:52.802545 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 17 01:02:52.818284 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 17 01:02:53.011917 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 17 01:02:53.080150 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 17 01:02:53.086365 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 17 01:02:53.098932 systemd[1]: Starting disk-uuid.service... May 17 01:02:53.125270 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 17 01:02:53.132990 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 17 01:02:54.143998 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 17 01:02:54.144174 disk-uuid[604]: The operation has completed successfully. May 17 01:02:54.202679 systemd[1]: disk-uuid.service: Deactivated successfully. May 17 01:02:54.206000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:02:54.206000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:02:54.202779 systemd[1]: Finished disk-uuid.service. May 17 01:02:54.212088 systemd[1]: Starting verity-setup.service... May 17 01:02:54.298146 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" May 17 01:02:54.862926 systemd[1]: Found device dev-mapper-usr.device. May 17 01:02:54.873702 systemd[1]: Mounting sysusr-usr.mount... May 17 01:02:54.881622 systemd[1]: Finished verity-setup.service. May 17 01:02:54.886000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:02:54.942001 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 17 01:02:54.942279 systemd[1]: Mounted sysusr-usr.mount. May 17 01:02:54.947028 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 17 01:02:54.947805 systemd[1]: Starting ignition-setup.service... May 17 01:02:54.955354 systemd[1]: Starting parse-ip-for-networkd.service... May 17 01:02:54.994403 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm May 17 01:02:54.994466 kernel: BTRFS info (device sda6): using free space tree May 17 01:02:54.999139 kernel: BTRFS info (device sda6): has skinny extents May 17 01:02:55.043454 systemd[1]: Finished parse-ip-for-networkd.service. May 17 01:02:55.047000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:02:55.075352 kernel: kauditd_printk_skb: 10 callbacks suppressed May 17 01:02:55.075405 kernel: audit: type=1130 audit(1747443775.047:21): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:02:55.075585 systemd[1]: Starting systemd-networkd.service... May 17 01:02:55.058000 audit: BPF prog-id=9 op=LOAD May 17 01:02:55.086014 kernel: audit: type=1334 audit(1747443775.058:22): prog-id=9 op=LOAD May 17 01:02:55.106398 systemd-networkd[842]: lo: Link UP May 17 01:02:55.110177 systemd-networkd[842]: lo: Gained carrier May 17 01:02:55.110830 systemd-networkd[842]: Enumeration completed May 17 01:02:55.119000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:02:55.111653 systemd[1]: Started systemd-networkd.service. May 17 01:02:55.152755 kernel: audit: type=1130 audit(1747443775.119:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:02:55.119923 systemd[1]: Reached target network.target. May 17 01:02:55.178107 kernel: audit: type=1130 audit(1747443775.156:24): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:02:55.156000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:02:55.139265 systemd[1]: Starting iscsiuio.service... May 17 01:02:55.181806 iscsid[850]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 17 01:02:55.181806 iscsid[850]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log May 17 01:02:55.181806 iscsid[850]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 17 01:02:55.181806 iscsid[850]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 17 01:02:55.181806 iscsid[850]: If using hardware iscsi like qla4xxx this message can be ignored. May 17 01:02:55.181806 iscsid[850]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 17 01:02:55.181806 iscsid[850]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 17 01:02:55.299298 kernel: audit: type=1130 audit(1747443775.185:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:02:55.299323 kernel: audit: type=1130 audit(1747443775.232:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:02:55.185000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:02:55.232000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:02:55.140494 systemd-networkd[842]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 17 01:02:55.148729 systemd[1]: Started iscsiuio.service. May 17 01:02:55.157784 systemd[1]: Starting iscsid.service... May 17 01:02:55.178458 systemd[1]: Started iscsid.service. May 17 01:02:55.186819 systemd[1]: Starting dracut-initqueue.service... May 17 01:02:55.331000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:02:55.214271 systemd[1]: Finished dracut-initqueue.service. May 17 01:02:55.357567 kernel: audit: type=1130 audit(1747443775.331:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:02:55.262947 systemd[1]: Reached target remote-fs-pre.target. May 17 01:02:55.286102 systemd[1]: Reached target remote-cryptsetup.target. May 17 01:02:55.292231 systemd[1]: Reached target remote-fs.target. May 17 01:02:55.310632 systemd[1]: Starting dracut-pre-mount.service... May 17 01:02:55.320533 systemd[1]: mnt-oem.mount: Deactivated successfully. May 17 01:02:55.326234 systemd[1]: Finished dracut-pre-mount.service. May 17 01:02:55.395990 kernel: mlx5_core daa5:00:02.0 enP55973s1: Link up May 17 01:02:55.435988 kernel: hv_netvsc 002248be-6fcd-0022-48be-6fcd002248be eth0: Data path switched to VF: enP55973s1 May 17 01:02:55.441552 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 01:02:55.441899 systemd-networkd[842]: enP55973s1: Link UP May 17 01:02:55.443125 systemd-networkd[842]: eth0: Link UP May 17 01:02:55.443245 systemd-networkd[842]: eth0: Gained carrier May 17 01:02:55.455434 systemd-networkd[842]: enP55973s1: Gained carrier May 17 01:02:55.466053 systemd-networkd[842]: eth0: DHCPv4 address 10.200.20.11/24, gateway 10.200.20.1 acquired from 168.63.129.16 May 17 01:02:55.540387 systemd[1]: Finished ignition-setup.service. May 17 01:02:55.544000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:02:55.545855 systemd[1]: Starting ignition-fetch-offline.service... May 17 01:02:55.572738 kernel: audit: type=1130 audit(1747443775.544:28): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:02:57.180137 systemd-networkd[842]: eth0: Gained IPv6LL May 17 01:03:00.753440 ignition[870]: Ignition 2.14.0 May 17 01:03:00.756639 ignition[870]: Stage: fetch-offline May 17 01:03:00.756716 ignition[870]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 01:03:00.756745 ignition[870]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 17 01:03:00.822479 ignition[870]: no config dir at "/usr/lib/ignition/base.platform.d/azure" May 17 01:03:00.822658 ignition[870]: parsed url from cmdline: "" May 17 01:03:00.822662 ignition[870]: no config URL provided May 17 01:03:00.822667 ignition[870]: reading system config file "/usr/lib/ignition/user.ign" May 17 01:03:00.838000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:00.829327 systemd[1]: Finished ignition-fetch-offline.service. May 17 01:03:00.871144 kernel: audit: type=1130 audit(1747443780.838:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:00.822675 ignition[870]: no config at "/usr/lib/ignition/user.ign" May 17 01:03:00.859379 systemd[1]: Starting ignition-fetch.service... May 17 01:03:00.822680 ignition[870]: failed to fetch config: resource requires networking May 17 01:03:00.822783 ignition[870]: Ignition finished successfully May 17 01:03:00.873423 ignition[876]: Ignition 2.14.0 May 17 01:03:00.873429 ignition[876]: Stage: fetch May 17 01:03:00.873528 ignition[876]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 01:03:00.873552 ignition[876]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 17 01:03:00.877382 ignition[876]: no config dir at "/usr/lib/ignition/base.platform.d/azure" May 17 01:03:00.877581 ignition[876]: parsed url from cmdline: "" May 17 01:03:00.877584 ignition[876]: no config URL provided May 17 01:03:00.877592 ignition[876]: reading system config file "/usr/lib/ignition/user.ign" May 17 01:03:00.877600 ignition[876]: no config at "/usr/lib/ignition/user.ign" May 17 01:03:00.877633 ignition[876]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 May 17 01:03:00.984046 ignition[876]: GET result: OK May 17 01:03:00.984161 ignition[876]: config has been read from IMDS userdata May 17 01:03:00.984205 ignition[876]: parsing config with SHA512: 6421c6c600957eec264d5fe5e4dcaefce13c4074d356b99d02aad23babe0d04d85402111ec55954449b165db6271c2534073bdf5763f2e981d69f0fd2397fd94 May 17 01:03:00.987445 unknown[876]: fetched base config from "system" May 17 01:03:01.022049 kernel: audit: type=1130 audit(1747443780.997:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:00.997000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:00.988021 ignition[876]: fetch: fetch complete May 17 01:03:00.987452 unknown[876]: fetched base config from "system" May 17 01:03:00.988026 ignition[876]: fetch: fetch passed May 17 01:03:00.987457 unknown[876]: fetched user config from "azure" May 17 01:03:00.988079 ignition[876]: Ignition finished successfully May 17 01:03:01.042000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:00.993392 systemd[1]: Finished ignition-fetch.service. May 17 01:03:01.069226 kernel: audit: type=1130 audit(1747443781.042:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:01.028396 ignition[882]: Ignition 2.14.0 May 17 01:03:01.098075 kernel: audit: type=1130 audit(1747443781.073:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:01.073000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:00.998539 systemd[1]: Starting ignition-kargs.service... May 17 01:03:01.028403 ignition[882]: Stage: kargs May 17 01:03:01.037837 systemd[1]: Finished ignition-kargs.service. May 17 01:03:01.028514 ignition[882]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 01:03:01.043126 systemd[1]: Starting ignition-disks.service... May 17 01:03:01.028541 ignition[882]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 17 01:03:01.066319 systemd[1]: Finished ignition-disks.service. May 17 01:03:01.032012 ignition[882]: no config dir at "/usr/lib/ignition/base.platform.d/azure" May 17 01:03:01.073449 systemd[1]: Reached target initrd-root-device.target. May 17 01:03:01.033559 ignition[882]: kargs: kargs passed May 17 01:03:01.098450 systemd[1]: Reached target local-fs-pre.target. May 17 01:03:01.033610 ignition[882]: Ignition finished successfully May 17 01:03:01.107075 systemd[1]: Reached target local-fs.target. May 17 01:03:01.053367 ignition[888]: Ignition 2.14.0 May 17 01:03:01.114351 systemd[1]: Reached target sysinit.target. May 17 01:03:01.053374 ignition[888]: Stage: disks May 17 01:03:01.122540 systemd[1]: Reached target basic.target. May 17 01:03:01.053479 ignition[888]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 01:03:01.133758 systemd[1]: Starting systemd-fsck-root.service... May 17 01:03:01.053496 ignition[888]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 17 01:03:01.056288 ignition[888]: no config dir at "/usr/lib/ignition/base.platform.d/azure" May 17 01:03:01.058990 ignition[888]: disks: disks passed May 17 01:03:01.059053 ignition[888]: Ignition finished successfully May 17 01:03:01.215174 systemd-fsck[896]: ROOT: clean, 619/7326000 files, 481078/7359488 blocks May 17 01:03:01.219121 systemd[1]: Finished systemd-fsck-root.service. May 17 01:03:01.231000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:01.232390 systemd[1]: Mounting sysroot.mount... May 17 01:03:01.253046 kernel: audit: type=1130 audit(1747443781.231:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:01.272005 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 17 01:03:01.272805 systemd[1]: Mounted sysroot.mount. May 17 01:03:01.276977 systemd[1]: Reached target initrd-root-fs.target. May 17 01:03:01.334329 systemd[1]: Mounting sysroot-usr.mount... May 17 01:03:01.338882 systemd[1]: Starting flatcar-metadata-hostname.service... May 17 01:03:01.351350 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 17 01:03:01.351385 systemd[1]: Reached target ignition-diskful.target. May 17 01:03:01.366216 systemd[1]: Mounted sysroot-usr.mount. May 17 01:03:01.415158 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 17 01:03:01.420096 systemd[1]: Starting initrd-setup-root.service... May 17 01:03:01.449436 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (907) May 17 01:03:01.449478 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm May 17 01:03:01.449489 kernel: BTRFS info (device sda6): using free space tree May 17 01:03:01.458501 kernel: BTRFS info (device sda6): has skinny extents May 17 01:03:01.458767 initrd-setup-root[912]: cut: /sysroot/etc/passwd: No such file or directory May 17 01:03:01.469777 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 17 01:03:01.498513 initrd-setup-root[938]: cut: /sysroot/etc/group: No such file or directory May 17 01:03:01.540209 initrd-setup-root[946]: cut: /sysroot/etc/shadow: No such file or directory May 17 01:03:01.549469 initrd-setup-root[954]: cut: /sysroot/etc/gshadow: No such file or directory May 17 01:03:02.551077 systemd[1]: Finished initrd-setup-root.service. May 17 01:03:02.555000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:02.575581 systemd[1]: Starting ignition-mount.service... May 17 01:03:02.587404 kernel: audit: type=1130 audit(1747443782.555:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:02.584897 systemd[1]: Starting sysroot-boot.service... May 17 01:03:02.591878 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. May 17 01:03:02.591997 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. May 17 01:03:02.623005 systemd[1]: Finished sysroot-boot.service. May 17 01:03:02.627000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:02.645527 ignition[974]: INFO : Ignition 2.14.0 May 17 01:03:02.645527 ignition[974]: INFO : Stage: mount May 17 01:03:02.645527 ignition[974]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 01:03:02.645527 ignition[974]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 17 01:03:02.697777 kernel: audit: type=1130 audit(1747443782.627:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:02.697800 kernel: audit: type=1130 audit(1747443782.658:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:02.658000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:02.654296 systemd[1]: Finished ignition-mount.service. May 17 01:03:02.701804 ignition[974]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" May 17 01:03:02.701804 ignition[974]: INFO : mount: mount passed May 17 01:03:02.701804 ignition[974]: INFO : Ignition finished successfully May 17 01:03:04.235761 coreos-metadata[906]: May 17 01:03:04.235 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 May 17 01:03:04.243857 coreos-metadata[906]: May 17 01:03:04.242 INFO Fetch successful May 17 01:03:04.280780 coreos-metadata[906]: May 17 01:03:04.280 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 May 17 01:03:04.293190 coreos-metadata[906]: May 17 01:03:04.293 INFO Fetch successful May 17 01:03:04.318867 coreos-metadata[906]: May 17 01:03:04.318 INFO wrote hostname ci-3510.3.7-n-56b9a5cda4 to /sysroot/etc/hostname May 17 01:03:04.327058 systemd[1]: Finished flatcar-metadata-hostname.service. May 17 01:03:04.332000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:04.333281 systemd[1]: Starting ignition-files.service... May 17 01:03:04.360005 kernel: audit: type=1130 audit(1747443784.332:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:04.361565 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 17 01:03:04.380988 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (985) May 17 01:03:04.392877 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm May 17 01:03:04.392921 kernel: BTRFS info (device sda6): using free space tree May 17 01:03:04.392940 kernel: BTRFS info (device sda6): has skinny extents May 17 01:03:04.403819 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 17 01:03:04.419895 ignition[1004]: INFO : Ignition 2.14.0 May 17 01:03:04.423889 ignition[1004]: INFO : Stage: files May 17 01:03:04.427711 ignition[1004]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 01:03:04.427711 ignition[1004]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 17 01:03:04.447160 ignition[1004]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" May 17 01:03:04.447160 ignition[1004]: DEBUG : files: compiled without relabeling support, skipping May 17 01:03:04.447160 ignition[1004]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 17 01:03:04.447160 ignition[1004]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 17 01:03:04.577069 ignition[1004]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 17 01:03:04.584851 ignition[1004]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 17 01:03:04.584851 ignition[1004]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 17 01:03:04.584817 unknown[1004]: wrote ssh authorized keys file for user: core May 17 01:03:04.604786 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.17.0-linux-arm64.tar.gz" May 17 01:03:04.604786 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.17.0-linux-arm64.tar.gz: attempt #1 May 17 01:03:04.668274 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK May 17 01:03:04.841155 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.17.0-linux-arm64.tar.gz" May 17 01:03:04.851604 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" May 17 01:03:04.861135 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" May 17 01:03:04.861135 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" May 17 01:03:04.861135 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" May 17 01:03:04.861135 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" May 17 01:03:04.861135 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" May 17 01:03:04.861135 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" May 17 01:03:04.861135 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" May 17 01:03:04.861135 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" May 17 01:03:04.861135 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 17 01:03:04.861135 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.4-arm64.raw" May 17 01:03:04.861135 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.4-arm64.raw" May 17 01:03:04.977526 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/waagent.service" May 17 01:03:04.977526 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition May 17 01:03:04.977526 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1114058292" May 17 01:03:04.977526 ignition[1004]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1114058292": device or resource busy May 17 01:03:04.977526 ignition[1004]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1114058292", trying btrfs: device or resource busy May 17 01:03:04.977526 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1114058292" May 17 01:03:04.977526 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1114058292" May 17 01:03:04.977526 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem1114058292" May 17 01:03:04.977526 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem1114058292" May 17 01:03:04.977526 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" May 17 01:03:04.977526 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" May 17 01:03:04.977526 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(e): oem config not found in "/usr/share/oem", looking on oem partition May 17 01:03:04.977526 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(f): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem764736234" May 17 01:03:04.977526 ignition[1004]: CRITICAL : files: createFilesystemsFiles: createFiles: op(e): op(f): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem764736234": device or resource busy May 17 01:03:04.890861 systemd[1]: mnt-oem1114058292.mount: Deactivated successfully. May 17 01:03:05.135673 ignition[1004]: ERROR : files: createFilesystemsFiles: createFiles: op(e): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem764736234", trying btrfs: device or resource busy May 17 01:03:05.135673 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem764736234" May 17 01:03:05.135673 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem764736234" May 17 01:03:05.135673 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [started] unmounting "/mnt/oem764736234" May 17 01:03:05.135673 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [finished] unmounting "/mnt/oem764736234" May 17 01:03:05.135673 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" May 17 01:03:05.135673 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(12): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.4-arm64.raw" May 17 01:03:05.135673 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(12): GET https://extensions.flatcar.org/extensions/kubernetes-v1.32.4-arm64.raw: attempt #1 May 17 01:03:04.913244 systemd[1]: mnt-oem764736234.mount: Deactivated successfully. May 17 01:03:05.731500 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(12): GET result: OK May 17 01:03:05.984258 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(12): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.4-arm64.raw" May 17 01:03:05.997123 ignition[1004]: INFO : files: op(13): [started] processing unit "waagent.service" May 17 01:03:05.997123 ignition[1004]: INFO : files: op(13): [finished] processing unit "waagent.service" May 17 01:03:05.997123 ignition[1004]: INFO : files: op(14): [started] processing unit "nvidia.service" May 17 01:03:05.997123 ignition[1004]: INFO : files: op(14): [finished] processing unit "nvidia.service" May 17 01:03:05.997123 ignition[1004]: INFO : files: op(15): [started] processing unit "prepare-helm.service" May 17 01:03:05.997123 ignition[1004]: INFO : files: op(15): op(16): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 17 01:03:05.997123 ignition[1004]: INFO : files: op(15): op(16): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 17 01:03:05.997123 ignition[1004]: INFO : files: op(15): [finished] processing unit "prepare-helm.service" May 17 01:03:05.997123 ignition[1004]: INFO : files: op(17): [started] setting preset to enabled for "waagent.service" May 17 01:03:05.997123 ignition[1004]: INFO : files: op(17): [finished] setting preset to enabled for "waagent.service" May 17 01:03:05.997123 ignition[1004]: INFO : files: op(18): [started] setting preset to enabled for "nvidia.service" May 17 01:03:05.997123 ignition[1004]: INFO : files: op(18): [finished] setting preset to enabled for "nvidia.service" May 17 01:03:05.997123 ignition[1004]: INFO : files: op(19): [started] setting preset to enabled for "prepare-helm.service" May 17 01:03:05.997123 ignition[1004]: INFO : files: op(19): [finished] setting preset to enabled for "prepare-helm.service" May 17 01:03:05.997123 ignition[1004]: INFO : files: createResultFile: createFiles: op(1a): [started] writing file "/sysroot/etc/.ignition-result.json" May 17 01:03:05.997123 ignition[1004]: INFO : files: createResultFile: createFiles: op(1a): [finished] writing file "/sysroot/etc/.ignition-result.json" May 17 01:03:05.997123 ignition[1004]: INFO : files: files passed May 17 01:03:05.997123 ignition[1004]: INFO : Ignition finished successfully May 17 01:03:06.278209 kernel: audit: type=1130 audit(1747443786.007:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:06.278239 kernel: audit: type=1130 audit(1747443786.058:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:06.278258 kernel: audit: type=1131 audit(1747443786.058:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:06.278268 kernel: audit: type=1130 audit(1747443786.150:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:06.278278 kernel: audit: type=1130 audit(1747443786.223:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:06.278287 kernel: audit: type=1131 audit(1747443786.249:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:06.007000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:06.058000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:06.058000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:06.150000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:06.223000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:06.249000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:06.000116 systemd[1]: Finished ignition-files.service. May 17 01:03:06.029826 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 17 01:03:06.036763 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 17 01:03:06.313910 initrd-setup-root-after-ignition[1030]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 17 01:03:06.037562 systemd[1]: Starting ignition-quench.service... May 17 01:03:06.049284 systemd[1]: ignition-quench.service: Deactivated successfully. May 17 01:03:06.338000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:06.049380 systemd[1]: Finished ignition-quench.service. May 17 01:03:06.366983 kernel: audit: type=1130 audit(1747443786.338:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:06.145458 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 17 01:03:06.151156 systemd[1]: Reached target ignition-complete.target. May 17 01:03:06.186465 systemd[1]: Starting initrd-parse-etc.service... May 17 01:03:06.210022 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 17 01:03:06.210141 systemd[1]: Finished initrd-parse-etc.service. May 17 01:03:06.250546 systemd[1]: Reached target initrd-fs.target. May 17 01:03:06.259192 systemd[1]: Reached target initrd.target. May 17 01:03:06.416000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:06.297621 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 17 01:03:06.302618 systemd[1]: Starting dracut-pre-pivot.service... May 17 01:03:06.452443 kernel: audit: type=1131 audit(1747443786.416:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:06.334726 systemd[1]: Finished dracut-pre-pivot.service. May 17 01:03:06.366310 systemd[1]: Starting initrd-cleanup.service... May 17 01:03:06.384211 systemd[1]: Stopped target nss-lookup.target. May 17 01:03:06.388616 systemd[1]: Stopped target remote-cryptsetup.target. May 17 01:03:06.399436 systemd[1]: Stopped target timers.target. May 17 01:03:06.407880 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 17 01:03:06.407945 systemd[1]: Stopped dracut-pre-pivot.service. May 17 01:03:06.438281 systemd[1]: Stopped target initrd.target. May 17 01:03:06.448472 systemd[1]: Stopped target basic.target. May 17 01:03:06.456341 systemd[1]: Stopped target ignition-complete.target. May 17 01:03:06.465403 systemd[1]: Stopped target ignition-diskful.target. May 17 01:03:06.475124 systemd[1]: Stopped target initrd-root-device.target. May 17 01:03:06.550000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:06.488656 systemd[1]: Stopped target remote-fs.target. May 17 01:03:06.496966 systemd[1]: Stopped target remote-fs-pre.target. May 17 01:03:06.584596 kernel: audit: type=1131 audit(1747443786.550:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:06.506862 systemd[1]: Stopped target sysinit.target. May 17 01:03:06.616051 kernel: audit: type=1131 audit(1747443786.589:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:06.589000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:06.515788 systemd[1]: Stopped target local-fs.target. May 17 01:03:06.621000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:06.524470 systemd[1]: Stopped target local-fs-pre.target. May 17 01:03:06.629000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:06.532794 systemd[1]: Stopped target swap.target. May 17 01:03:06.639000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:06.542122 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 17 01:03:06.542194 systemd[1]: Stopped dracut-pre-mount.service. May 17 01:03:06.671000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:06.677235 iscsid[850]: iscsid shutting down. May 17 01:03:06.572152 systemd[1]: Stopped target cryptsetup.target. May 17 01:03:06.685000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:06.689179 ignition[1043]: INFO : Ignition 2.14.0 May 17 01:03:06.689179 ignition[1043]: INFO : Stage: umount May 17 01:03:06.689179 ignition[1043]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 01:03:06.689179 ignition[1043]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 17 01:03:06.689179 ignition[1043]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" May 17 01:03:06.689179 ignition[1043]: INFO : umount: umount passed May 17 01:03:06.689179 ignition[1043]: INFO : Ignition finished successfully May 17 01:03:06.692000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:06.701000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:06.701000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:06.706000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:06.715000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:06.726000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:06.742000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:06.753000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:06.762000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:06.580474 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 17 01:03:06.580532 systemd[1]: Stopped dracut-initqueue.service. May 17 01:03:06.608598 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 17 01:03:06.608661 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 17 01:03:06.621893 systemd[1]: ignition-files.service: Deactivated successfully. May 17 01:03:06.621939 systemd[1]: Stopped ignition-files.service. May 17 01:03:06.817000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:06.629939 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. May 17 01:03:06.825000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:06.629996 systemd[1]: Stopped flatcar-metadata-hostname.service. May 17 01:03:06.640183 systemd[1]: Stopping ignition-mount.service... May 17 01:03:06.842000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:06.648033 systemd[1]: Stopping iscsid.service... May 17 01:03:06.653460 systemd[1]: Stopping sysroot-boot.service... May 17 01:03:06.666821 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 17 01:03:06.666889 systemd[1]: Stopped systemd-udev-trigger.service. May 17 01:03:06.674690 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 17 01:03:06.883000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:06.674746 systemd[1]: Stopped dracut-pre-trigger.service. May 17 01:03:06.685588 systemd[1]: iscsid.service: Deactivated successfully. May 17 01:03:06.907000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:06.685689 systemd[1]: Stopped iscsid.service. May 17 01:03:06.916000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:06.694427 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 17 01:03:06.926000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:06.694906 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 17 01:03:06.694991 systemd[1]: Finished initrd-cleanup.service. May 17 01:03:06.945000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:06.702679 systemd[1]: ignition-mount.service: Deactivated successfully. May 17 01:03:06.953000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:06.958000 audit: BPF prog-id=6 op=UNLOAD May 17 01:03:06.702758 systemd[1]: Stopped ignition-mount.service. May 17 01:03:06.707543 systemd[1]: sysroot-boot.service: Deactivated successfully. May 17 01:03:06.707616 systemd[1]: Stopped sysroot-boot.service. May 17 01:03:06.715544 systemd[1]: ignition-disks.service: Deactivated successfully. May 17 01:03:06.985000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:06.715594 systemd[1]: Stopped ignition-disks.service. May 17 01:03:06.995000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:06.726284 systemd[1]: ignition-kargs.service: Deactivated successfully. May 17 01:03:07.003000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:06.726323 systemd[1]: Stopped ignition-kargs.service. May 17 01:03:06.743254 systemd[1]: ignition-fetch.service: Deactivated successfully. May 17 01:03:07.035917 kernel: hv_netvsc 002248be-6fcd-0022-48be-6fcd002248be eth0: Data path switched from VF: enP55973s1 May 17 01:03:07.030000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:06.743287 systemd[1]: Stopped ignition-fetch.service. May 17 01:03:07.040000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:06.754031 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 17 01:03:07.049000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:06.754069 systemd[1]: Stopped ignition-fetch-offline.service. May 17 01:03:07.060000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:07.060000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:06.762839 systemd[1]: Stopped target paths.target. May 17 01:03:06.771288 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 17 01:03:06.774991 systemd[1]: Stopped systemd-ask-password-console.path. May 17 01:03:06.781697 systemd[1]: Stopped target slices.target. May 17 01:03:06.789622 systemd[1]: Stopped target sockets.target. May 17 01:03:06.799654 systemd[1]: iscsid.socket: Deactivated successfully. May 17 01:03:06.799699 systemd[1]: Closed iscsid.socket. May 17 01:03:06.808383 systemd[1]: ignition-setup.service: Deactivated successfully. May 17 01:03:06.808422 systemd[1]: Stopped ignition-setup.service. May 17 01:03:06.817382 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 17 01:03:06.817416 systemd[1]: Stopped initrd-setup-root.service. May 17 01:03:06.826924 systemd[1]: Stopping iscsiuio.service... May 17 01:03:06.834469 systemd[1]: iscsiuio.service: Deactivated successfully. May 17 01:03:06.834560 systemd[1]: Stopped iscsiuio.service. May 17 01:03:06.842595 systemd[1]: Stopped target network.target. May 17 01:03:06.850369 systemd[1]: iscsiuio.socket: Deactivated successfully. May 17 01:03:06.850407 systemd[1]: Closed iscsiuio.socket. May 17 01:03:07.139000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:06.857672 systemd[1]: Stopping systemd-networkd.service... May 17 01:03:06.865067 systemd[1]: Stopping systemd-resolved.service... May 17 01:03:06.874184 systemd-networkd[842]: eth0: DHCPv6 lease lost May 17 01:03:07.163000 audit: BPF prog-id=9 op=UNLOAD May 17 01:03:06.875381 systemd[1]: systemd-networkd.service: Deactivated successfully. May 17 01:03:06.875468 systemd[1]: Stopped systemd-networkd.service. May 17 01:03:06.884044 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 17 01:03:06.884079 systemd[1]: Closed systemd-networkd.socket. May 17 01:03:06.894998 systemd[1]: Stopping network-cleanup.service... May 17 01:03:06.902759 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 17 01:03:06.902811 systemd[1]: Stopped parse-ip-for-networkd.service. May 17 01:03:06.907730 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 17 01:03:07.216050 systemd-journald[276]: Received SIGTERM from PID 1 (systemd). May 17 01:03:06.907775 systemd[1]: Stopped systemd-sysctl.service. May 17 01:03:06.921165 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 17 01:03:06.921207 systemd[1]: Stopped systemd-modules-load.service. May 17 01:03:06.926290 systemd[1]: Stopping systemd-udevd.service... May 17 01:03:06.936497 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 17 01:03:06.937022 systemd[1]: systemd-resolved.service: Deactivated successfully. May 17 01:03:06.937120 systemd[1]: Stopped systemd-resolved.service. May 17 01:03:06.945850 systemd[1]: systemd-udevd.service: Deactivated successfully. May 17 01:03:06.945963 systemd[1]: Stopped systemd-udevd.service. May 17 01:03:06.954881 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 17 01:03:06.954919 systemd[1]: Closed systemd-udevd-control.socket. May 17 01:03:06.968525 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 17 01:03:06.968566 systemd[1]: Closed systemd-udevd-kernel.socket. May 17 01:03:06.978013 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 17 01:03:06.978057 systemd[1]: Stopped dracut-pre-udev.service. May 17 01:03:06.986132 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 17 01:03:06.986173 systemd[1]: Stopped dracut-cmdline.service. May 17 01:03:06.995386 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 17 01:03:06.995436 systemd[1]: Stopped dracut-cmdline-ask.service. May 17 01:03:07.004282 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 17 01:03:07.021534 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. May 17 01:03:07.021608 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. May 17 01:03:07.035763 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 17 01:03:07.035820 systemd[1]: Stopped kmod-static-nodes.service. May 17 01:03:07.040428 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 17 01:03:07.040466 systemd[1]: Stopped systemd-vconsole-setup.service. May 17 01:03:07.050642 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. May 17 01:03:07.051134 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 17 01:03:07.051223 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 17 01:03:07.130716 systemd[1]: network-cleanup.service: Deactivated successfully. May 17 01:03:07.130818 systemd[1]: Stopped network-cleanup.service. May 17 01:03:07.140015 systemd[1]: Reached target initrd-switch-root.target. May 17 01:03:07.148660 systemd[1]: Starting initrd-switch-root.service... May 17 01:03:07.168047 systemd[1]: Switching root. May 17 01:03:07.216913 systemd-journald[276]: Journal stopped May 17 01:03:29.320297 kernel: SELinux: Class mctp_socket not defined in policy. May 17 01:03:29.320318 kernel: SELinux: Class anon_inode not defined in policy. May 17 01:03:29.320328 kernel: SELinux: the above unknown classes and permissions will be allowed May 17 01:03:29.320338 kernel: SELinux: policy capability network_peer_controls=1 May 17 01:03:29.320346 kernel: SELinux: policy capability open_perms=1 May 17 01:03:29.320354 kernel: SELinux: policy capability extended_socket_class=1 May 17 01:03:29.320363 kernel: SELinux: policy capability always_check_network=0 May 17 01:03:29.320371 kernel: SELinux: policy capability cgroup_seclabel=1 May 17 01:03:29.320379 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 17 01:03:29.320387 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 17 01:03:29.320395 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 17 01:03:29.320405 kernel: kauditd_printk_skb: 34 callbacks suppressed May 17 01:03:29.320414 kernel: audit: type=1403 audit(1747443791.513:82): auid=4294967295 ses=4294967295 lsm=selinux res=1 May 17 01:03:29.320423 systemd[1]: Successfully loaded SELinux policy in 505.017ms. May 17 01:03:29.320434 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 56.011ms. May 17 01:03:29.320446 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 17 01:03:29.320455 systemd[1]: Detected virtualization microsoft. May 17 01:03:29.320464 systemd[1]: Detected architecture arm64. May 17 01:03:29.320473 systemd[1]: Detected first boot. May 17 01:03:29.320482 systemd[1]: Hostname set to . May 17 01:03:29.320491 systemd[1]: Initializing machine ID from random generator. May 17 01:03:29.320500 kernel: audit: type=1400 audit(1747443792.723:83): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 17 01:03:29.320511 kernel: audit: type=1400 audit(1747443792.723:84): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 17 01:03:29.320519 kernel: audit: type=1334 audit(1747443792.723:85): prog-id=10 op=LOAD May 17 01:03:29.320528 kernel: audit: type=1334 audit(1747443792.723:86): prog-id=10 op=UNLOAD May 17 01:03:29.320536 kernel: audit: type=1334 audit(1747443792.740:87): prog-id=11 op=LOAD May 17 01:03:29.320545 kernel: audit: type=1334 audit(1747443792.740:88): prog-id=11 op=UNLOAD May 17 01:03:29.320553 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 17 01:03:29.320563 kernel: audit: type=1400 audit(1747443795.725:89): avc: denied { associate } for pid=1076 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 17 01:03:29.320574 kernel: audit: type=1300 audit(1747443795.725:89): arch=c00000b7 syscall=5 success=yes exit=0 a0=400014588c a1=40000c6df8 a2=40000cd0c0 a3=32 items=0 ppid=1059 pid=1076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:03:29.320584 kernel: audit: type=1327 audit(1747443795.725:89): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 17 01:03:29.320593 systemd[1]: Populated /etc with preset unit settings. May 17 01:03:29.320602 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 01:03:29.320612 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 01:03:29.320622 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 01:03:29.320632 kernel: kauditd_printk_skb: 6 callbacks suppressed May 17 01:03:29.320640 kernel: audit: type=1334 audit(1747443808.524:91): prog-id=12 op=LOAD May 17 01:03:29.320649 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 17 01:03:29.320657 kernel: audit: type=1334 audit(1747443808.524:92): prog-id=3 op=UNLOAD May 17 01:03:29.320668 systemd[1]: Stopped initrd-switch-root.service. May 17 01:03:29.320680 kernel: audit: type=1334 audit(1747443808.524:93): prog-id=13 op=LOAD May 17 01:03:29.320688 kernel: audit: type=1334 audit(1747443808.524:94): prog-id=14 op=LOAD May 17 01:03:29.320697 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 17 01:03:29.320708 kernel: audit: type=1334 audit(1747443808.524:95): prog-id=4 op=UNLOAD May 17 01:03:29.320717 systemd[1]: Created slice system-addon\x2dconfig.slice. May 17 01:03:29.320726 kernel: audit: type=1334 audit(1747443808.524:96): prog-id=5 op=UNLOAD May 17 01:03:29.320735 kernel: audit: type=1131 audit(1747443808.525:97): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:29.320744 kernel: audit: type=1334 audit(1747443808.560:98): prog-id=12 op=UNLOAD May 17 01:03:29.320753 kernel: audit: type=1130 audit(1747443808.560:99): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:29.320762 systemd[1]: Created slice system-addon\x2drun.slice. May 17 01:03:29.320772 kernel: audit: type=1131 audit(1747443808.560:100): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:29.320782 systemd[1]: Created slice system-getty.slice. May 17 01:03:29.320792 systemd[1]: Created slice system-modprobe.slice. May 17 01:03:29.320801 systemd[1]: Created slice system-serial\x2dgetty.slice. May 17 01:03:29.320810 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 17 01:03:29.320820 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 17 01:03:29.320829 systemd[1]: Created slice user.slice. May 17 01:03:29.320838 systemd[1]: Started systemd-ask-password-console.path. May 17 01:03:29.320847 systemd[1]: Started systemd-ask-password-wall.path. May 17 01:03:29.320858 systemd[1]: Set up automount boot.automount. May 17 01:03:29.320867 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 17 01:03:29.320876 systemd[1]: Stopped target initrd-switch-root.target. May 17 01:03:29.320886 systemd[1]: Stopped target initrd-fs.target. May 17 01:03:29.320895 systemd[1]: Stopped target initrd-root-fs.target. May 17 01:03:29.320904 systemd[1]: Reached target integritysetup.target. May 17 01:03:29.320913 systemd[1]: Reached target remote-cryptsetup.target. May 17 01:03:29.320923 systemd[1]: Reached target remote-fs.target. May 17 01:03:29.320933 systemd[1]: Reached target slices.target. May 17 01:03:29.320942 systemd[1]: Reached target swap.target. May 17 01:03:29.320951 systemd[1]: Reached target torcx.target. May 17 01:03:29.320960 systemd[1]: Reached target veritysetup.target. May 17 01:03:29.320978 systemd[1]: Listening on systemd-coredump.socket. May 17 01:03:29.320990 systemd[1]: Listening on systemd-initctl.socket. May 17 01:03:29.321000 systemd[1]: Listening on systemd-networkd.socket. May 17 01:03:29.321011 systemd[1]: Listening on systemd-udevd-control.socket. May 17 01:03:29.321021 systemd[1]: Listening on systemd-udevd-kernel.socket. May 17 01:03:29.321030 systemd[1]: Listening on systemd-userdbd.socket. May 17 01:03:29.321039 systemd[1]: Mounting dev-hugepages.mount... May 17 01:03:29.321048 systemd[1]: Mounting dev-mqueue.mount... May 17 01:03:29.321057 systemd[1]: Mounting media.mount... May 17 01:03:29.321069 systemd[1]: Mounting sys-kernel-debug.mount... May 17 01:03:29.321078 systemd[1]: Mounting sys-kernel-tracing.mount... May 17 01:03:29.321087 systemd[1]: Mounting tmp.mount... May 17 01:03:29.321097 systemd[1]: Starting flatcar-tmpfiles.service... May 17 01:03:29.321106 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 01:03:29.321116 systemd[1]: Starting kmod-static-nodes.service... May 17 01:03:29.321125 systemd[1]: Starting modprobe@configfs.service... May 17 01:03:29.321134 systemd[1]: Starting modprobe@dm_mod.service... May 17 01:03:29.321143 systemd[1]: Starting modprobe@drm.service... May 17 01:03:29.321155 systemd[1]: Starting modprobe@efi_pstore.service... May 17 01:03:29.321164 systemd[1]: Starting modprobe@fuse.service... May 17 01:03:29.321173 systemd[1]: Starting modprobe@loop.service... May 17 01:03:29.321183 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 17 01:03:29.321192 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 17 01:03:29.321202 systemd[1]: Stopped systemd-fsck-root.service. May 17 01:03:29.321211 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 17 01:03:29.321221 systemd[1]: Stopped systemd-fsck-usr.service. May 17 01:03:29.321230 systemd[1]: Stopped systemd-journald.service. May 17 01:03:29.321240 kernel: loop: module loaded May 17 01:03:29.321249 systemd[1]: systemd-journald.service: Consumed 2.998s CPU time. May 17 01:03:29.321259 systemd[1]: Starting systemd-journald.service... May 17 01:03:29.321268 systemd[1]: Starting systemd-modules-load.service... May 17 01:03:29.321277 systemd[1]: Starting systemd-network-generator.service... May 17 01:03:29.321287 systemd[1]: Starting systemd-remount-fs.service... May 17 01:03:29.321295 kernel: fuse: init (API version 7.34) May 17 01:03:29.321304 systemd[1]: Starting systemd-udev-trigger.service... May 17 01:03:29.321313 systemd[1]: verity-setup.service: Deactivated successfully. May 17 01:03:29.321324 systemd[1]: Stopped verity-setup.service. May 17 01:03:29.321334 systemd[1]: Mounted dev-hugepages.mount. May 17 01:03:29.321343 systemd[1]: Mounted dev-mqueue.mount. May 17 01:03:29.321352 systemd[1]: Mounted media.mount. May 17 01:03:29.321361 systemd[1]: Mounted sys-kernel-debug.mount. May 17 01:03:29.321371 systemd[1]: Mounted sys-kernel-tracing.mount. May 17 01:03:29.321380 systemd[1]: Mounted tmp.mount. May 17 01:03:29.321389 systemd[1]: Finished flatcar-tmpfiles.service. May 17 01:03:29.321398 systemd[1]: Finished kmod-static-nodes.service. May 17 01:03:29.321412 systemd-journald[1166]: Journal started May 17 01:03:29.321450 systemd-journald[1166]: Runtime Journal (/run/log/journal/c4c8601e56c044b59b455f095c9b630f) is 8.0M, max 78.5M, 70.5M free. May 17 01:03:11.513000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 17 01:03:12.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 17 01:03:12.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 17 01:03:12.723000 audit: BPF prog-id=10 op=LOAD May 17 01:03:12.723000 audit: BPF prog-id=10 op=UNLOAD May 17 01:03:12.740000 audit: BPF prog-id=11 op=LOAD May 17 01:03:12.740000 audit: BPF prog-id=11 op=UNLOAD May 17 01:03:15.725000 audit[1076]: AVC avc: denied { associate } for pid=1076 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 17 01:03:15.725000 audit[1076]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=400014588c a1=40000c6df8 a2=40000cd0c0 a3=32 items=0 ppid=1059 pid=1076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:03:15.725000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 17 01:03:15.759000 audit[1076]: AVC avc: denied { associate } for pid=1076 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 17 01:03:15.759000 audit[1076]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=4000145965 a2=1ed a3=0 items=2 ppid=1059 pid=1076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:03:15.759000 audit: CWD cwd="/" May 17 01:03:15.759000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 01:03:15.759000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 01:03:15.759000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 17 01:03:28.524000 audit: BPF prog-id=12 op=LOAD May 17 01:03:28.524000 audit: BPF prog-id=3 op=UNLOAD May 17 01:03:28.524000 audit: BPF prog-id=13 op=LOAD May 17 01:03:28.524000 audit: BPF prog-id=14 op=LOAD May 17 01:03:28.524000 audit: BPF prog-id=4 op=UNLOAD May 17 01:03:28.524000 audit: BPF prog-id=5 op=UNLOAD May 17 01:03:28.525000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:28.560000 audit: BPF prog-id=12 op=UNLOAD May 17 01:03:28.560000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:28.560000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:29.107000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:29.123000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:29.137000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:29.137000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:29.144000 audit: BPF prog-id=15 op=LOAD May 17 01:03:29.144000 audit: BPF prog-id=16 op=LOAD May 17 01:03:29.144000 audit: BPF prog-id=17 op=LOAD May 17 01:03:29.144000 audit: BPF prog-id=13 op=UNLOAD May 17 01:03:29.144000 audit: BPF prog-id=14 op=UNLOAD May 17 01:03:29.250000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:29.317000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:29.317000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 17 01:03:29.317000 audit[1166]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=4 a1=ffffdcff70e0 a2=4000 a3=1 items=0 ppid=1 pid=1166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:03:29.317000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 17 01:03:15.679899 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2025-05-17T01:03:15Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 01:03:28.523684 systemd[1]: Queued start job for default target multi-user.target. May 17 01:03:15.680449 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2025-05-17T01:03:15Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 17 01:03:28.523697 systemd[1]: Unnecessary job was removed for dev-sda6.device. May 17 01:03:15.680468 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2025-05-17T01:03:15Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 17 01:03:28.526331 systemd[1]: systemd-journald.service: Deactivated successfully. May 17 01:03:15.680506 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2025-05-17T01:03:15Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 17 01:03:28.526644 systemd[1]: systemd-journald.service: Consumed 2.998s CPU time. May 17 01:03:15.680516 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2025-05-17T01:03:15Z" level=debug msg="skipped missing lower profile" missing profile=oem May 17 01:03:15.680545 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2025-05-17T01:03:15Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 17 01:03:15.680556 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2025-05-17T01:03:15Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 17 01:03:15.680762 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2025-05-17T01:03:15Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 17 01:03:15.680795 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2025-05-17T01:03:15Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 17 01:03:15.680807 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2025-05-17T01:03:15Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 17 01:03:15.706539 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2025-05-17T01:03:15Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 17 01:03:15.706602 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2025-05-17T01:03:15Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 17 01:03:15.706622 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2025-05-17T01:03:15Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 17 01:03:15.706636 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2025-05-17T01:03:15Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 17 01:03:15.706686 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2025-05-17T01:03:15Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 17 01:03:15.706700 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2025-05-17T01:03:15Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 17 01:03:27.039030 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2025-05-17T01:03:27Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 01:03:27.039289 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2025-05-17T01:03:27Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 01:03:27.039397 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2025-05-17T01:03:27Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 01:03:27.039560 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2025-05-17T01:03:27Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 01:03:27.039615 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2025-05-17T01:03:27Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 17 01:03:27.039676 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2025-05-17T01:03:27Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 17 01:03:29.327000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:29.338074 systemd[1]: Started systemd-journald.service. May 17 01:03:29.338000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:29.339053 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 17 01:03:29.339191 systemd[1]: Finished modprobe@configfs.service. May 17 01:03:29.343000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:29.343000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:29.344512 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 01:03:29.344634 systemd[1]: Finished modprobe@dm_mod.service. May 17 01:03:29.348000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:29.348000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:29.349511 systemd[1]: modprobe@drm.service: Deactivated successfully. May 17 01:03:29.349631 systemd[1]: Finished modprobe@drm.service. May 17 01:03:29.354000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:29.354000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:29.354994 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 01:03:29.355127 systemd[1]: Finished modprobe@efi_pstore.service. May 17 01:03:29.359000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:29.359000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:29.361061 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 17 01:03:29.361183 systemd[1]: Finished modprobe@fuse.service. May 17 01:03:29.365000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:29.365000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:29.366377 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 01:03:29.366499 systemd[1]: Finished modprobe@loop.service. May 17 01:03:29.372000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:29.372000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:29.373408 systemd[1]: Finished systemd-network-generator.service. May 17 01:03:29.378000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:29.379521 systemd[1]: Finished systemd-remount-fs.service. May 17 01:03:29.384000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:29.385796 systemd[1]: Finished systemd-modules-load.service. May 17 01:03:29.392000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:29.392921 systemd[1]: Reached target network-pre.target. May 17 01:03:29.399273 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 17 01:03:29.405289 systemd[1]: Mounting sys-kernel-config.mount... May 17 01:03:29.410174 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 17 01:03:29.462511 systemd[1]: Starting systemd-hwdb-update.service... May 17 01:03:29.468132 systemd[1]: Starting systemd-journal-flush.service... May 17 01:03:29.473105 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 01:03:29.474128 systemd[1]: Starting systemd-random-seed.service... May 17 01:03:29.478652 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 01:03:29.479666 systemd[1]: Starting systemd-sysctl.service... May 17 01:03:29.484941 systemd[1]: Starting systemd-sysusers.service... May 17 01:03:29.491134 systemd[1]: Finished systemd-udev-trigger.service. May 17 01:03:29.496000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:29.496937 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 17 01:03:29.502477 systemd[1]: Mounted sys-kernel-config.mount. May 17 01:03:29.508509 systemd[1]: Starting systemd-udev-settle.service... May 17 01:03:29.517213 udevadm[1196]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. May 17 01:03:29.537283 systemd[1]: Finished systemd-random-seed.service. May 17 01:03:29.541000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:29.542245 systemd[1]: Reached target first-boot-complete.target. May 17 01:03:29.558757 systemd-journald[1166]: Time spent on flushing to /var/log/journal/c4c8601e56c044b59b455f095c9b630f is 13.655ms for 1108 entries. May 17 01:03:29.558757 systemd-journald[1166]: System Journal (/var/log/journal/c4c8601e56c044b59b455f095c9b630f) is 8.0M, max 2.6G, 2.6G free. May 17 01:03:29.688095 systemd-journald[1166]: Received client request to flush runtime journal. May 17 01:03:29.640000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:29.635518 systemd[1]: Finished systemd-sysctl.service. May 17 01:03:29.689087 systemd[1]: Finished systemd-journal-flush.service. May 17 01:03:29.693000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:30.949959 systemd[1]: Finished systemd-sysusers.service. May 17 01:03:30.954000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:30.956173 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 17 01:03:31.566687 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 17 01:03:31.571000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:31.790674 systemd[1]: Finished systemd-hwdb-update.service. May 17 01:03:31.794000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:31.795000 audit: BPF prog-id=18 op=LOAD May 17 01:03:31.795000 audit: BPF prog-id=19 op=LOAD May 17 01:03:31.795000 audit: BPF prog-id=7 op=UNLOAD May 17 01:03:31.795000 audit: BPF prog-id=8 op=UNLOAD May 17 01:03:31.796959 systemd[1]: Starting systemd-udevd.service... May 17 01:03:31.814737 systemd-udevd[1201]: Using default interface naming scheme 'v252'. May 17 01:03:32.258527 systemd[1]: Started systemd-udevd.service. May 17 01:03:32.266000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:32.267000 audit: BPF prog-id=20 op=LOAD May 17 01:03:32.270811 systemd[1]: Starting systemd-networkd.service... May 17 01:03:32.294851 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. May 17 01:03:32.391000 audit[1206]: AVC avc: denied { confidentiality } for pid=1206 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 17 01:03:32.409113 kernel: hv_vmbus: registering driver hv_balloon May 17 01:03:32.409203 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 May 17 01:03:32.409227 kernel: hv_balloon: Memory hot add disabled on ARM64 May 17 01:03:32.391000 audit[1206]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaefd002a0 a1=aa2c a2=ffff823b24b0 a3=aaaaefc60010 items=12 ppid=1201 pid=1206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:03:32.391000 audit: CWD cwd="/" May 17 01:03:32.391000 audit: PATH item=0 name=(null) inode=5869 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 01:03:32.391000 audit: PATH item=1 name=(null) inode=10103 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 01:03:32.391000 audit: PATH item=2 name=(null) inode=10103 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 01:03:32.391000 audit: PATH item=3 name=(null) inode=10104 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 01:03:32.391000 audit: PATH item=4 name=(null) inode=10103 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 01:03:32.391000 audit: PATH item=5 name=(null) inode=10105 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 01:03:32.391000 audit: PATH item=6 name=(null) inode=10103 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 01:03:32.391000 audit: PATH item=7 name=(null) inode=10106 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 01:03:32.391000 audit: PATH item=8 name=(null) inode=10103 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 01:03:32.391000 audit: PATH item=9 name=(null) inode=10107 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 01:03:32.391000 audit: PATH item=10 name=(null) inode=10103 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 01:03:32.391000 audit: PATH item=11 name=(null) inode=10108 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 01:03:32.391000 audit: PROCTITLE proctitle="(udev-worker)" May 17 01:03:32.419005 kernel: mousedev: PS/2 mouse device common for all mice May 17 01:03:32.637201 systemd[1]: Starting systemd-userdbd.service... May 17 01:03:32.635000 audit: BPF prog-id=21 op=LOAD May 17 01:03:32.635000 audit: BPF prog-id=22 op=LOAD May 17 01:03:32.635000 audit: BPF prog-id=23 op=LOAD May 17 01:03:32.664072 kernel: hv_vmbus: registering driver hyperv_fb May 17 01:03:32.664155 kernel: hv_utils: Registering HyperV Utility Driver May 17 01:03:32.664177 kernel: hv_vmbus: registering driver hv_utils May 17 01:03:32.670304 kernel: hyperv_fb: Synthvid Version major 3, minor 5 May 17 01:03:32.670463 kernel: hv_utils: Heartbeat IC version 3.0 May 17 01:03:32.677472 kernel: hv_utils: Shutdown IC version 3.2 May 17 01:03:32.684522 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 May 17 01:03:32.684560 kernel: hv_utils: TimeSync IC version 4.0 May 17 01:03:32.833664 kernel: Console: switching to colour dummy device 80x25 May 17 01:03:32.836958 kernel: Console: switching to colour frame buffer device 128x48 May 17 01:03:32.846700 systemd[1]: Started systemd-userdbd.service. May 17 01:03:32.850000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:33.264309 systemd-networkd[1220]: lo: Link UP May 17 01:03:33.264630 systemd-networkd[1220]: lo: Gained carrier May 17 01:03:33.265275 systemd-networkd[1220]: Enumeration completed May 17 01:03:33.265485 systemd[1]: Started systemd-networkd.service. May 17 01:03:33.268000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:33.271597 systemd[1]: Starting systemd-networkd-wait-online.service... May 17 01:03:33.332828 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 17 01:03:33.340392 systemd[1]: Finished systemd-udev-settle.service. May 17 01:03:33.343000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:33.346549 systemd[1]: Starting lvm2-activation-early.service... May 17 01:03:33.365590 systemd-networkd[1220]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 17 01:03:33.413963 kernel: mlx5_core daa5:00:02.0 enP55973s1: Link up May 17 01:03:33.439963 kernel: hv_netvsc 002248be-6fcd-0022-48be-6fcd002248be eth0: Data path switched to VF: enP55973s1 May 17 01:03:33.441215 systemd-networkd[1220]: enP55973s1: Link UP May 17 01:03:33.441568 systemd-networkd[1220]: eth0: Link UP May 17 01:03:33.441580 systemd-networkd[1220]: eth0: Gained carrier May 17 01:03:33.444619 systemd-networkd[1220]: enP55973s1: Gained carrier May 17 01:03:33.455062 systemd-networkd[1220]: eth0: DHCPv4 address 10.200.20.11/24, gateway 10.200.20.1 acquired from 168.63.129.16 May 17 01:03:33.794784 lvm[1279]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 17 01:03:33.819901 systemd[1]: Finished lvm2-activation-early.service. May 17 01:03:33.823000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:33.825161 systemd[1]: Reached target cryptsetup.target. May 17 01:03:33.828980 kernel: kauditd_printk_skb: 66 callbacks suppressed May 17 01:03:33.829036 kernel: audit: type=1130 audit(1747443813.823:150): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:33.851396 systemd[1]: Starting lvm2-activation.service... May 17 01:03:33.855837 lvm[1280]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 17 01:03:33.880864 systemd[1]: Finished lvm2-activation.service. May 17 01:03:33.883000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:33.885499 systemd[1]: Reached target local-fs-pre.target. May 17 01:03:33.901953 kernel: audit: type=1130 audit(1747443813.883:151): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:33.906717 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 17 01:03:33.906875 systemd[1]: Reached target local-fs.target. May 17 01:03:33.911419 systemd[1]: Reached target machines.target. May 17 01:03:33.917272 systemd[1]: Starting ldconfig.service... May 17 01:03:33.921488 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 01:03:33.921657 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 01:03:33.922850 systemd[1]: Starting systemd-boot-update.service... May 17 01:03:33.928107 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 17 01:03:33.934519 systemd[1]: Starting systemd-machine-id-commit.service... May 17 01:03:33.940015 systemd[1]: Starting systemd-sysext.service... May 17 01:03:34.028979 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1282 (bootctl) May 17 01:03:34.030366 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 17 01:03:34.078579 systemd[1]: Unmounting usr-share-oem.mount... May 17 01:03:34.087730 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 17 01:03:34.092000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:34.095446 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 17 01:03:34.096666 systemd[1]: Finished systemd-machine-id-commit.service. May 17 01:03:34.117632 kernel: audit: type=1130 audit(1747443814.092:152): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:34.116000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:34.136962 kernel: audit: type=1130 audit(1747443814.116:153): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:34.179411 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 17 01:03:34.179764 systemd[1]: Unmounted usr-share-oem.mount. May 17 01:03:34.279976 kernel: loop0: detected capacity change from 0 to 207008 May 17 01:03:34.391953 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 17 01:03:34.408039 kernel: loop1: detected capacity change from 0 to 207008 May 17 01:03:34.414053 (sd-sysext)[1294]: Using extensions 'kubernetes'. May 17 01:03:34.415145 (sd-sysext)[1294]: Merged extensions into '/usr'. May 17 01:03:34.431783 systemd[1]: Mounting usr-share-oem.mount... May 17 01:03:34.436680 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 01:03:34.438029 systemd[1]: Starting modprobe@dm_mod.service... May 17 01:03:34.443279 systemd[1]: Starting modprobe@efi_pstore.service... May 17 01:03:34.448437 systemd[1]: Starting modprobe@loop.service... May 17 01:03:34.453033 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 01:03:34.453165 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 01:03:34.455552 systemd[1]: Mounted usr-share-oem.mount. May 17 01:03:34.460175 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 01:03:34.460322 systemd[1]: Finished modprobe@dm_mod.service. May 17 01:03:34.463000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:34.465510 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 01:03:34.465634 systemd[1]: Finished modprobe@efi_pstore.service. May 17 01:03:34.463000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:34.501816 kernel: audit: type=1130 audit(1747443814.463:154): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:34.501888 kernel: audit: type=1131 audit(1747443814.463:155): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:34.505179 systemd-networkd[1220]: eth0: Gained IPv6LL May 17 01:03:34.505527 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 01:03:34.505649 systemd[1]: Finished modprobe@loop.service. May 17 01:03:34.503000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:34.511819 systemd[1]: Finished systemd-sysext.service. May 17 01:03:34.532322 kernel: audit: type=1130 audit(1747443814.503:156): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:34.532401 kernel: audit: type=1131 audit(1747443814.503:157): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:34.503000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:34.550052 systemd[1]: Finished systemd-networkd-wait-online.service. May 17 01:03:34.508000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:34.573470 kernel: audit: type=1130 audit(1747443814.508:158): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:34.508000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:34.575014 systemd[1]: Starting ensure-sysext.service... May 17 01:03:34.591297 kernel: audit: type=1131 audit(1747443814.508:159): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:34.527000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:34.549000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:34.595470 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 01:03:34.595559 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 01:03:34.596954 systemd[1]: Starting systemd-tmpfiles-setup.service... May 17 01:03:34.610065 systemd[1]: Reloading. May 17 01:03:34.617700 systemd-tmpfiles[1301]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 17 01:03:34.619196 systemd-fsck[1290]: fsck.fat 4.2 (2021-01-31) May 17 01:03:34.619196 systemd-fsck[1290]: /dev/sda1: 236 files, 117182/258078 clusters May 17 01:03:34.633399 systemd-tmpfiles[1301]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 17 01:03:34.647618 systemd-tmpfiles[1301]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 17 01:03:34.662283 /usr/lib/systemd/system-generators/torcx-generator[1324]: time="2025-05-17T01:03:34Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 01:03:34.662655 /usr/lib/systemd/system-generators/torcx-generator[1324]: time="2025-05-17T01:03:34Z" level=info msg="torcx already run" May 17 01:03:34.744406 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 01:03:34.744426 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 01:03:34.760443 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 01:03:34.824000 audit: BPF prog-id=24 op=LOAD May 17 01:03:34.825000 audit: BPF prog-id=25 op=LOAD May 17 01:03:34.825000 audit: BPF prog-id=18 op=UNLOAD May 17 01:03:34.825000 audit: BPF prog-id=19 op=UNLOAD May 17 01:03:34.825000 audit: BPF prog-id=26 op=LOAD May 17 01:03:34.825000 audit: BPF prog-id=20 op=UNLOAD May 17 01:03:34.826000 audit: BPF prog-id=27 op=LOAD May 17 01:03:34.826000 audit: BPF prog-id=15 op=UNLOAD May 17 01:03:34.826000 audit: BPF prog-id=28 op=LOAD May 17 01:03:34.826000 audit: BPF prog-id=29 op=LOAD May 17 01:03:34.826000 audit: BPF prog-id=16 op=UNLOAD May 17 01:03:34.826000 audit: BPF prog-id=17 op=UNLOAD May 17 01:03:34.827000 audit: BPF prog-id=30 op=LOAD May 17 01:03:34.827000 audit: BPF prog-id=21 op=UNLOAD May 17 01:03:34.827000 audit: BPF prog-id=31 op=LOAD May 17 01:03:34.827000 audit: BPF prog-id=32 op=LOAD May 17 01:03:34.827000 audit: BPF prog-id=22 op=UNLOAD May 17 01:03:34.827000 audit: BPF prog-id=23 op=UNLOAD May 17 01:03:34.837565 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 17 01:03:34.843000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:34.850230 systemd[1]: Mounting boot.mount... May 17 01:03:34.856557 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 01:03:34.857996 systemd[1]: Starting modprobe@dm_mod.service... May 17 01:03:34.863026 systemd[1]: Starting modprobe@efi_pstore.service... May 17 01:03:34.868925 systemd[1]: Starting modprobe@loop.service... May 17 01:03:34.872970 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 01:03:34.873141 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 01:03:34.875381 systemd[1]: Mounted boot.mount. May 17 01:03:34.879453 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 01:03:34.879590 systemd[1]: Finished modprobe@dm_mod.service. May 17 01:03:34.882000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:34.882000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:34.884642 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 01:03:34.884767 systemd[1]: Finished modprobe@efi_pstore.service. May 17 01:03:34.888000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:34.888000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:34.889909 systemd[1]: Finished systemd-boot-update.service. May 17 01:03:34.893000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:34.895212 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 01:03:34.895338 systemd[1]: Finished modprobe@loop.service. May 17 01:03:34.898000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:34.898000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:34.901175 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 01:03:34.902438 systemd[1]: Starting modprobe@dm_mod.service... May 17 01:03:34.908097 systemd[1]: Starting modprobe@efi_pstore.service... May 17 01:03:34.913641 systemd[1]: Starting modprobe@loop.service... May 17 01:03:34.917571 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 01:03:34.917694 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 01:03:34.918568 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 01:03:34.918709 systemd[1]: Finished modprobe@dm_mod.service. May 17 01:03:34.921000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:34.921000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:34.923699 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 01:03:34.923822 systemd[1]: Finished modprobe@efi_pstore.service. May 17 01:03:34.927000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:34.927000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:34.929051 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 01:03:34.929170 systemd[1]: Finished modprobe@loop.service. May 17 01:03:34.932000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:34.932000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:34.936000 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 01:03:34.937309 systemd[1]: Starting modprobe@dm_mod.service... May 17 01:03:34.942274 systemd[1]: Starting modprobe@drm.service... May 17 01:03:34.947153 systemd[1]: Starting modprobe@efi_pstore.service... May 17 01:03:34.952261 systemd[1]: Starting modprobe@loop.service... May 17 01:03:34.956506 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 01:03:34.956661 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 01:03:34.957739 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 01:03:34.957885 systemd[1]: Finished modprobe@dm_mod.service. May 17 01:03:34.961000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:34.961000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:34.962906 systemd[1]: modprobe@drm.service: Deactivated successfully. May 17 01:03:34.963083 systemd[1]: Finished modprobe@drm.service. May 17 01:03:34.966000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:34.966000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:34.967814 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 01:03:34.968083 systemd[1]: Finished modprobe@efi_pstore.service. May 17 01:03:34.971000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:34.971000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:34.973877 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 01:03:34.974004 systemd[1]: Finished modprobe@loop.service. May 17 01:03:34.977000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:34.977000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:34.978898 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 01:03:34.978981 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 01:03:34.979985 systemd[1]: Finished ensure-sysext.service. May 17 01:03:34.983000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:35.294656 systemd[1]: Finished systemd-tmpfiles-setup.service. May 17 01:03:35.297000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:35.301025 systemd[1]: Starting audit-rules.service... May 17 01:03:35.306695 systemd[1]: Starting clean-ca-certificates.service... May 17 01:03:35.313419 systemd[1]: Starting systemd-journal-catalog-update.service... May 17 01:03:35.317000 audit: BPF prog-id=33 op=LOAD May 17 01:03:35.320500 systemd[1]: Starting systemd-resolved.service... May 17 01:03:35.324000 audit: BPF prog-id=34 op=LOAD May 17 01:03:35.326665 systemd[1]: Starting systemd-timesyncd.service... May 17 01:03:35.331671 systemd[1]: Starting systemd-update-utmp.service... May 17 01:03:35.404000 audit[1402]: SYSTEM_BOOT pid=1402 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 17 01:03:35.408312 systemd[1]: Started systemd-timesyncd.service. May 17 01:03:35.412000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:35.414316 systemd[1]: Reached target time-set.target. May 17 01:03:35.421521 systemd[1]: Finished systemd-update-utmp.service. May 17 01:03:35.424000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:35.431831 systemd[1]: Finished clean-ca-certificates.service. May 17 01:03:35.435000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:35.437671 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 17 01:03:35.515708 systemd-resolved[1399]: Positive Trust Anchors: May 17 01:03:35.515726 systemd-resolved[1399]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 17 01:03:35.515754 systemd-resolved[1399]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 17 01:03:35.538223 systemd[1]: Finished systemd-journal-catalog-update.service. May 17 01:03:35.541000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:35.718007 systemd-resolved[1399]: Using system hostname 'ci-3510.3.7-n-56b9a5cda4'. May 17 01:03:35.719779 systemd[1]: Started systemd-resolved.service. May 17 01:03:35.722000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:03:35.724570 systemd[1]: Reached target network.target. May 17 01:03:35.728854 systemd[1]: Reached target network-online.target. May 17 01:03:35.733695 systemd[1]: Reached target nss-lookup.target. May 17 01:03:35.846000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 17 01:03:35.846000 audit[1417]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffff3c95640 a2=420 a3=0 items=0 ppid=1396 pid=1417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:03:35.846000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 17 01:03:35.848848 augenrules[1417]: No rules May 17 01:03:35.849579 systemd[1]: Finished audit-rules.service. May 17 01:03:35.929267 systemd-timesyncd[1401]: Contacted time server 102.129.185.135:123 (0.flatcar.pool.ntp.org). May 17 01:03:35.929341 systemd-timesyncd[1401]: Initial clock synchronization to Sat 2025-05-17 01:03:35.930715 UTC. May 17 01:03:47.286577 ldconfig[1281]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 17 01:03:47.297351 systemd[1]: Finished ldconfig.service. May 17 01:03:47.303428 systemd[1]: Starting systemd-update-done.service... May 17 01:03:47.352020 systemd[1]: Finished systemd-update-done.service. May 17 01:03:47.357319 systemd[1]: Reached target sysinit.target. May 17 01:03:47.361967 systemd[1]: Started motdgen.path. May 17 01:03:47.365701 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 17 01:03:47.372433 systemd[1]: Started logrotate.timer. May 17 01:03:47.376759 systemd[1]: Started mdadm.timer. May 17 01:03:47.380438 systemd[1]: Started systemd-tmpfiles-clean.timer. May 17 01:03:47.385251 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 17 01:03:47.385283 systemd[1]: Reached target paths.target. May 17 01:03:47.389714 systemd[1]: Reached target timers.target. May 17 01:03:47.394605 systemd[1]: Listening on dbus.socket. May 17 01:03:47.399763 systemd[1]: Starting docker.socket... May 17 01:03:47.463088 systemd[1]: Listening on sshd.socket. May 17 01:03:47.467472 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 01:03:47.468012 systemd[1]: Listening on docker.socket. May 17 01:03:47.472329 systemd[1]: Reached target sockets.target. May 17 01:03:47.476637 systemd[1]: Reached target basic.target. May 17 01:03:47.481265 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 17 01:03:47.481295 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 17 01:03:47.482507 systemd[1]: Starting containerd.service... May 17 01:03:47.487344 systemd[1]: Starting dbus.service... May 17 01:03:47.491666 systemd[1]: Starting enable-oem-cloudinit.service... May 17 01:03:47.497220 systemd[1]: Starting extend-filesystems.service... May 17 01:03:47.503173 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 17 01:03:47.504546 systemd[1]: Starting kubelet.service... May 17 01:03:47.509246 systemd[1]: Starting motdgen.service... May 17 01:03:47.514458 systemd[1]: Started nvidia.service. May 17 01:03:47.520016 systemd[1]: Starting prepare-helm.service... May 17 01:03:47.525661 systemd[1]: Starting ssh-key-proc-cmdline.service... May 17 01:03:47.531640 systemd[1]: Starting sshd-keygen.service... May 17 01:03:47.537665 systemd[1]: Starting systemd-logind.service... May 17 01:03:47.542012 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 01:03:47.542080 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 17 01:03:47.542491 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 17 01:03:47.543179 systemd[1]: Starting update-engine.service... May 17 01:03:47.548090 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 17 01:03:47.557591 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 17 01:03:47.558660 systemd[1]: Finished ssh-key-proc-cmdline.service. May 17 01:03:47.683472 extend-filesystems[1428]: Found loop1 May 17 01:03:47.688586 extend-filesystems[1428]: Found sda May 17 01:03:47.688586 extend-filesystems[1428]: Found sda1 May 17 01:03:47.688586 extend-filesystems[1428]: Found sda2 May 17 01:03:47.688586 extend-filesystems[1428]: Found sda3 May 17 01:03:47.688586 extend-filesystems[1428]: Found usr May 17 01:03:47.688586 extend-filesystems[1428]: Found sda4 May 17 01:03:47.688586 extend-filesystems[1428]: Found sda6 May 17 01:03:47.688586 extend-filesystems[1428]: Found sda7 May 17 01:03:47.688586 extend-filesystems[1428]: Found sda9 May 17 01:03:47.688586 extend-filesystems[1428]: Checking size of /dev/sda9 May 17 01:03:47.717155 systemd-logind[1440]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard) May 17 01:03:47.765720 jq[1427]: false May 17 01:03:47.766981 jq[1445]: true May 17 01:03:47.719419 systemd-logind[1440]: New seat seat0. May 17 01:03:47.729280 systemd[1]: motdgen.service: Deactivated successfully. May 17 01:03:47.729457 systemd[1]: Finished motdgen.service. May 17 01:03:47.797436 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 17 01:03:47.797601 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 17 01:03:47.810324 extend-filesystems[1428]: Old size kept for /dev/sda9 May 17 01:03:47.824589 extend-filesystems[1428]: Found sr0 May 17 01:03:47.833073 env[1453]: time="2025-05-17T01:03:47.820950645Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 17 01:03:47.816702 systemd[1]: extend-filesystems.service: Deactivated successfully. May 17 01:03:47.816872 systemd[1]: Finished extend-filesystems.service. May 17 01:03:47.903572 env[1453]: time="2025-05-17T01:03:47.903525531Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 17 01:03:47.903687 env[1453]: time="2025-05-17T01:03:47.903676258Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 17 01:03:47.907859 jq[1478]: true May 17 01:03:47.909981 tar[1448]: linux-arm64/LICENSE May 17 01:03:47.910279 tar[1448]: linux-arm64/helm May 17 01:03:47.917635 env[1453]: time="2025-05-17T01:03:47.917581979Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.182-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 17 01:03:47.917635 env[1453]: time="2025-05-17T01:03:47.917624382Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 17 01:03:47.917866 env[1453]: time="2025-05-17T01:03:47.917837392Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 17 01:03:47.917866 env[1453]: time="2025-05-17T01:03:47.917861393Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 17 01:03:47.917923 env[1453]: time="2025-05-17T01:03:47.917874714Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 17 01:03:47.917923 env[1453]: time="2025-05-17T01:03:47.917883834Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 17 01:03:47.918010 env[1453]: time="2025-05-17T01:03:47.917989559Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 17 01:03:47.918207 env[1453]: time="2025-05-17T01:03:47.918182369Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 17 01:03:47.918331 env[1453]: time="2025-05-17T01:03:47.918306815Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 17 01:03:47.918331 env[1453]: time="2025-05-17T01:03:47.918328096Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 17 01:03:47.918398 env[1453]: time="2025-05-17T01:03:47.918378578Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 17 01:03:47.918398 env[1453]: time="2025-05-17T01:03:47.918395219Z" level=info msg="metadata content store policy set" policy=shared May 17 01:03:47.944966 env[1453]: time="2025-05-17T01:03:47.944855396Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 17 01:03:47.944966 env[1453]: time="2025-05-17T01:03:47.944902798Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 17 01:03:47.944966 env[1453]: time="2025-05-17T01:03:47.944917239Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 17 01:03:47.945139 env[1453]: time="2025-05-17T01:03:47.944991642Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 17 01:03:47.945139 env[1453]: time="2025-05-17T01:03:47.945010123Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 17 01:03:47.945139 env[1453]: time="2025-05-17T01:03:47.945024084Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 17 01:03:47.945139 env[1453]: time="2025-05-17T01:03:47.945035684Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 17 01:03:47.945453 env[1453]: time="2025-05-17T01:03:47.945416143Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 17 01:03:47.945453 env[1453]: time="2025-05-17T01:03:47.945437744Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 17 01:03:47.945453 env[1453]: time="2025-05-17T01:03:47.945450745Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 17 01:03:47.945535 env[1453]: time="2025-05-17T01:03:47.945464025Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 17 01:03:47.945535 env[1453]: time="2025-05-17T01:03:47.945477266Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 17 01:03:47.946518 env[1453]: time="2025-05-17T01:03:47.945602232Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 17 01:03:47.946518 env[1453]: time="2025-05-17T01:03:47.945683836Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 17 01:03:47.946518 env[1453]: time="2025-05-17T01:03:47.945970730Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 17 01:03:47.946518 env[1453]: time="2025-05-17T01:03:47.945997332Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 17 01:03:47.946518 env[1453]: time="2025-05-17T01:03:47.946010452Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 17 01:03:47.946518 env[1453]: time="2025-05-17T01:03:47.946060335Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 17 01:03:47.946518 env[1453]: time="2025-05-17T01:03:47.946072975Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 17 01:03:47.946518 env[1453]: time="2025-05-17T01:03:47.946085576Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 17 01:03:47.946518 env[1453]: time="2025-05-17T01:03:47.946096656Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 17 01:03:47.946518 env[1453]: time="2025-05-17T01:03:47.946160380Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 17 01:03:47.946518 env[1453]: time="2025-05-17T01:03:47.946175060Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 17 01:03:47.946518 env[1453]: time="2025-05-17T01:03:47.946186501Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 17 01:03:47.946518 env[1453]: time="2025-05-17T01:03:47.946198741Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 17 01:03:47.946518 env[1453]: time="2025-05-17T01:03:47.946213422Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 17 01:03:47.946518 env[1453]: time="2025-05-17T01:03:47.946332228Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 17 01:03:47.946840 env[1453]: time="2025-05-17T01:03:47.946348509Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 17 01:03:47.946840 env[1453]: time="2025-05-17T01:03:47.946360109Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 17 01:03:47.946840 env[1453]: time="2025-05-17T01:03:47.946373590Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 17 01:03:47.946840 env[1453]: time="2025-05-17T01:03:47.946390031Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 17 01:03:47.946840 env[1453]: time="2025-05-17T01:03:47.946400631Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 17 01:03:47.946840 env[1453]: time="2025-05-17T01:03:47.946416792Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 17 01:03:47.946840 env[1453]: time="2025-05-17T01:03:47.946449154Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 17 01:03:47.947015 env[1453]: time="2025-05-17T01:03:47.946639843Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 17 01:03:47.947015 env[1453]: time="2025-05-17T01:03:47.946693286Z" level=info msg="Connect containerd service" May 17 01:03:47.947015 env[1453]: time="2025-05-17T01:03:47.946719447Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 17 01:03:48.054834 env[1453]: time="2025-05-17T01:03:47.947268914Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 17 01:03:48.054834 env[1453]: time="2025-05-17T01:03:47.947484884Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 17 01:03:48.054834 env[1453]: time="2025-05-17T01:03:47.947517486Z" level=info msg=serving... address=/run/containerd/containerd.sock May 17 01:03:48.054834 env[1453]: time="2025-05-17T01:03:47.947558968Z" level=info msg="containerd successfully booted in 0.127332s" May 17 01:03:48.054834 env[1453]: time="2025-05-17T01:03:47.953164723Z" level=info msg="Start subscribing containerd event" May 17 01:03:48.054834 env[1453]: time="2025-05-17T01:03:47.953207085Z" level=info msg="Start recovering state" May 17 01:03:48.054834 env[1453]: time="2025-05-17T01:03:47.953260127Z" level=info msg="Start event monitor" May 17 01:03:48.054834 env[1453]: time="2025-05-17T01:03:47.953275488Z" level=info msg="Start snapshots syncer" May 17 01:03:48.054834 env[1453]: time="2025-05-17T01:03:47.953284489Z" level=info msg="Start cni network conf syncer for default" May 17 01:03:48.054834 env[1453]: time="2025-05-17T01:03:47.953291129Z" level=info msg="Start streaming server" May 17 01:03:47.947628 systemd[1]: Started containerd.service. May 17 01:03:48.099409 systemd[1]: nvidia.service: Deactivated successfully. May 17 01:03:48.221790 dbus-daemon[1426]: [system] SELinux support is enabled May 17 01:03:48.221980 systemd[1]: Started dbus.service. May 17 01:03:48.227329 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 17 01:03:48.227347 systemd[1]: Reached target system-config.target. May 17 01:03:48.235754 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 17 01:03:48.235775 systemd[1]: Reached target user-config.target. May 17 01:03:48.243167 dbus-daemon[1426]: [system] Successfully activated service 'org.freedesktop.systemd1' May 17 01:03:48.244056 systemd[1]: Started systemd-logind.service. May 17 01:03:48.261215 bash[1518]: Updated "/home/core/.ssh/authorized_keys" May 17 01:03:48.261897 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 17 01:03:48.527043 tar[1448]: linux-arm64/README.md May 17 01:03:48.532375 systemd[1]: Finished prepare-helm.service. May 17 01:03:48.549587 systemd[1]: Started kubelet.service. May 17 01:03:48.824159 update_engine[1444]: I0517 01:03:48.809157 1444 main.cc:92] Flatcar Update Engine starting May 17 01:03:48.927297 systemd[1]: Started update-engine.service. May 17 01:03:48.928230 update_engine[1444]: I0517 01:03:48.928099 1444 update_check_scheduler.cc:74] Next update check in 9m39s May 17 01:03:48.934972 systemd[1]: Started locksmithd.service. May 17 01:03:49.035484 kubelet[1532]: E0517 01:03:49.035437 1532 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 01:03:49.037620 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 01:03:49.037737 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 01:03:50.619070 sshd_keygen[1443]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 17 01:03:50.636260 systemd[1]: Finished sshd-keygen.service. May 17 01:03:50.642516 systemd[1]: Starting issuegen.service... May 17 01:03:50.647629 systemd[1]: Started waagent.service. May 17 01:03:50.652242 systemd[1]: issuegen.service: Deactivated successfully. May 17 01:03:50.652408 systemd[1]: Finished issuegen.service. May 17 01:03:50.657820 systemd[1]: Starting systemd-user-sessions.service... May 17 01:03:50.710536 systemd[1]: Finished systemd-user-sessions.service. May 17 01:03:50.717092 systemd[1]: Started getty@tty1.service. May 17 01:03:50.722451 systemd[1]: Started serial-getty@ttyAMA0.service. May 17 01:03:50.727429 systemd[1]: Reached target getty.target. May 17 01:03:50.731667 systemd[1]: Reached target multi-user.target. May 17 01:03:50.737261 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 17 01:03:50.745473 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 17 01:03:50.745630 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 17 01:03:50.751138 systemd[1]: Startup finished in 722ms (kernel) + 19.911s (initrd) + 40.059s (userspace) = 1min 693ms. May 17 01:03:51.113046 locksmithd[1538]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 17 01:03:51.721712 login[1556]: pam_lastlog(login:session): file /var/log/lastlog is locked/write May 17 01:03:51.723538 login[1557]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) May 17 01:03:51.836958 systemd[1]: Created slice user-500.slice. May 17 01:03:51.838154 systemd[1]: Starting user-runtime-dir@500.service... May 17 01:03:51.841586 systemd-logind[1440]: New session 2 of user core. May 17 01:03:51.918481 systemd[1]: Finished user-runtime-dir@500.service. May 17 01:03:51.920156 systemd[1]: Starting user@500.service... May 17 01:03:52.010905 (systemd)[1560]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 17 01:03:52.280315 systemd[1560]: Queued start job for default target default.target. May 17 01:03:52.280797 systemd[1560]: Reached target paths.target. May 17 01:03:52.280817 systemd[1560]: Reached target sockets.target. May 17 01:03:52.280827 systemd[1560]: Reached target timers.target. May 17 01:03:52.280836 systemd[1560]: Reached target basic.target. May 17 01:03:52.280963 systemd[1]: Started user@500.service. May 17 01:03:52.281816 systemd[1]: Started session-2.scope. May 17 01:03:52.282312 systemd[1560]: Reached target default.target. May 17 01:03:52.282461 systemd[1560]: Startup finished in 265ms. May 17 01:03:52.722086 login[1556]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) May 17 01:03:52.726657 systemd[1]: Started session-1.scope. May 17 01:03:52.726967 systemd-logind[1440]: New session 1 of user core. May 17 01:03:59.200625 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 17 01:03:59.200799 systemd[1]: Stopped kubelet.service. May 17 01:03:59.202200 systemd[1]: Starting kubelet.service... May 17 01:03:59.335732 systemd[1]: Started kubelet.service. May 17 01:03:59.374830 kubelet[1584]: E0517 01:03:59.374780 1584 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 01:03:59.378823 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 01:03:59.378960 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 01:04:02.475155 waagent[1554]: 2025-05-17T01:04:02.475045Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 May 17 01:04:02.482406 waagent[1554]: 2025-05-17T01:04:02.482323Z INFO Daemon Daemon OS: flatcar 3510.3.7 May 17 01:04:02.487492 waagent[1554]: 2025-05-17T01:04:02.487423Z INFO Daemon Daemon Python: 3.9.16 May 17 01:04:02.493130 waagent[1554]: 2025-05-17T01:04:02.493040Z INFO Daemon Daemon Run daemon May 17 01:04:02.497615 waagent[1554]: 2025-05-17T01:04:02.497535Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.7' May 17 01:04:02.515082 waagent[1554]: 2025-05-17T01:04:02.514914Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. May 17 01:04:02.530858 waagent[1554]: 2025-05-17T01:04:02.530711Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' May 17 01:04:02.541135 waagent[1554]: 2025-05-17T01:04:02.541041Z INFO Daemon Daemon cloud-init is enabled: False May 17 01:04:02.546551 waagent[1554]: 2025-05-17T01:04:02.546460Z INFO Daemon Daemon Using waagent for provisioning May 17 01:04:02.552570 waagent[1554]: 2025-05-17T01:04:02.552492Z INFO Daemon Daemon Activate resource disk May 17 01:04:02.557522 waagent[1554]: 2025-05-17T01:04:02.557446Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb May 17 01:04:02.572441 waagent[1554]: 2025-05-17T01:04:02.572352Z INFO Daemon Daemon Found device: None May 17 01:04:02.577464 waagent[1554]: 2025-05-17T01:04:02.577386Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology May 17 01:04:02.586306 waagent[1554]: 2025-05-17T01:04:02.586228Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 May 17 01:04:02.598902 waagent[1554]: 2025-05-17T01:04:02.598828Z INFO Daemon Daemon Clean protocol and wireserver endpoint May 17 01:04:02.604980 waagent[1554]: 2025-05-17T01:04:02.604888Z INFO Daemon Daemon Running default provisioning handler May 17 01:04:02.618658 waagent[1554]: 2025-05-17T01:04:02.618518Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. May 17 01:04:02.634121 waagent[1554]: 2025-05-17T01:04:02.633925Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' May 17 01:04:02.644179 waagent[1554]: 2025-05-17T01:04:02.644091Z INFO Daemon Daemon cloud-init is enabled: False May 17 01:04:02.649322 waagent[1554]: 2025-05-17T01:04:02.649245Z INFO Daemon Daemon Copying ovf-env.xml May 17 01:04:02.864398 waagent[1554]: 2025-05-17T01:04:02.861688Z INFO Daemon Daemon Successfully mounted dvd May 17 01:04:02.994464 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. May 17 01:04:03.059947 waagent[1554]: 2025-05-17T01:04:03.059771Z INFO Daemon Daemon Detect protocol endpoint May 17 01:04:03.066704 waagent[1554]: 2025-05-17T01:04:03.066604Z INFO Daemon Daemon Clean protocol and wireserver endpoint May 17 01:04:03.073178 waagent[1554]: 2025-05-17T01:04:03.073086Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler May 17 01:04:03.081058 waagent[1554]: 2025-05-17T01:04:03.080974Z INFO Daemon Daemon Test for route to 168.63.129.16 May 17 01:04:03.087335 waagent[1554]: 2025-05-17T01:04:03.087259Z INFO Daemon Daemon Route to 168.63.129.16 exists May 17 01:04:03.092865 waagent[1554]: 2025-05-17T01:04:03.092790Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 May 17 01:04:03.284042 waagent[1554]: 2025-05-17T01:04:03.283929Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 May 17 01:04:03.292050 waagent[1554]: 2025-05-17T01:04:03.291994Z INFO Daemon Daemon Wire protocol version:2012-11-30 May 17 01:04:03.297745 waagent[1554]: 2025-05-17T01:04:03.297666Z INFO Daemon Daemon Server preferred version:2015-04-05 May 17 01:04:03.890072 waagent[1554]: 2025-05-17T01:04:03.889906Z INFO Daemon Daemon Initializing goal state during protocol detection May 17 01:04:03.905525 waagent[1554]: 2025-05-17T01:04:03.905437Z INFO Daemon Daemon Forcing an update of the goal state.. May 17 01:04:03.911798 waagent[1554]: 2025-05-17T01:04:03.911700Z INFO Daemon Daemon Fetching goal state [incarnation 1] May 17 01:04:04.004542 waagent[1554]: 2025-05-17T01:04:04.004400Z INFO Daemon Daemon Found private key matching thumbprint 43F5A468D3C176BC69BA4D5571DF0AE417C82FA0 May 17 01:04:04.013820 waagent[1554]: 2025-05-17T01:04:04.013721Z INFO Daemon Daemon Certificate with thumbprint 72125E8D4941471C1AC159CB0ACC58396FD6BEA9 has no matching private key. May 17 01:04:04.023787 waagent[1554]: 2025-05-17T01:04:04.023679Z INFO Daemon Daemon Fetch goal state completed May 17 01:04:04.078790 waagent[1554]: 2025-05-17T01:04:04.078724Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: 89df54f4-dfcd-4e1c-9c6b-b150dd3a496a New eTag: 14050717007102976064] May 17 01:04:04.090154 waagent[1554]: 2025-05-17T01:04:04.090055Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob May 17 01:04:04.106618 waagent[1554]: 2025-05-17T01:04:04.106536Z INFO Daemon Daemon Starting provisioning May 17 01:04:04.112085 waagent[1554]: 2025-05-17T01:04:04.111978Z INFO Daemon Daemon Handle ovf-env.xml. May 17 01:04:04.117183 waagent[1554]: 2025-05-17T01:04:04.117095Z INFO Daemon Daemon Set hostname [ci-3510.3.7-n-56b9a5cda4] May 17 01:04:04.270763 waagent[1554]: 2025-05-17T01:04:04.270589Z INFO Daemon Daemon Publish hostname [ci-3510.3.7-n-56b9a5cda4] May 17 01:04:04.279675 waagent[1554]: 2025-05-17T01:04:04.279546Z INFO Daemon Daemon Examine /proc/net/route for primary interface May 17 01:04:04.287622 waagent[1554]: 2025-05-17T01:04:04.287513Z INFO Daemon Daemon Primary interface is [eth0] May 17 01:04:04.305506 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. May 17 01:04:04.305694 systemd[1]: Stopped systemd-networkd-wait-online.service. May 17 01:04:04.305752 systemd[1]: Stopping systemd-networkd-wait-online.service... May 17 01:04:04.306033 systemd[1]: Stopping systemd-networkd.service... May 17 01:04:04.310999 systemd-networkd[1220]: eth0: DHCPv6 lease lost May 17 01:04:04.312326 systemd[1]: systemd-networkd.service: Deactivated successfully. May 17 01:04:04.312498 systemd[1]: Stopped systemd-networkd.service. May 17 01:04:04.314707 systemd[1]: Starting systemd-networkd.service... May 17 01:04:04.342993 systemd-networkd[1616]: enP55973s1: Link UP May 17 01:04:04.343006 systemd-networkd[1616]: enP55973s1: Gained carrier May 17 01:04:04.343856 systemd-networkd[1616]: eth0: Link UP May 17 01:04:04.343867 systemd-networkd[1616]: eth0: Gained carrier May 17 01:04:04.344204 systemd-networkd[1616]: lo: Link UP May 17 01:04:04.344214 systemd-networkd[1616]: lo: Gained carrier May 17 01:04:04.344437 systemd-networkd[1616]: eth0: Gained IPv6LL May 17 01:04:04.344646 systemd-networkd[1616]: Enumeration completed May 17 01:04:04.345057 systemd[1]: Started systemd-networkd.service. May 17 01:04:04.346446 waagent[1554]: 2025-05-17T01:04:04.346292Z INFO Daemon Daemon Create user account if not exists May 17 01:04:04.346825 systemd[1]: Starting systemd-networkd-wait-online.service... May 17 01:04:04.355233 waagent[1554]: 2025-05-17T01:04:04.355126Z INFO Daemon Daemon User core already exists, skip useradd May 17 01:04:04.356177 systemd-networkd[1616]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 17 01:04:04.361689 waagent[1554]: 2025-05-17T01:04:04.361588Z INFO Daemon Daemon Configure sudoer May 17 01:04:04.367062 waagent[1554]: 2025-05-17T01:04:04.366971Z INFO Daemon Daemon Configure sshd May 17 01:04:04.371583 waagent[1554]: 2025-05-17T01:04:04.371506Z INFO Daemon Daemon Deploy ssh public key. May 17 01:04:04.382074 systemd-networkd[1616]: eth0: DHCPv4 address 10.200.20.11/24, gateway 10.200.20.1 acquired from 168.63.129.16 May 17 01:04:04.386086 systemd[1]: Finished systemd-networkd-wait-online.service. May 17 01:04:05.629637 waagent[1554]: 2025-05-17T01:04:05.629557Z INFO Daemon Daemon Provisioning complete May 17 01:04:05.650156 waagent[1554]: 2025-05-17T01:04:05.650086Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping May 17 01:04:05.656597 waagent[1554]: 2025-05-17T01:04:05.656528Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. May 17 01:04:05.667470 waagent[1554]: 2025-05-17T01:04:05.667401Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent May 17 01:04:05.968830 waagent[1625]: 2025-05-17T01:04:05.968737Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent May 17 01:04:05.969993 waagent[1625]: 2025-05-17T01:04:05.969919Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file May 17 01:04:05.970245 waagent[1625]: 2025-05-17T01:04:05.970194Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 May 17 01:04:05.982567 waagent[1625]: 2025-05-17T01:04:05.982499Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. May 17 01:04:05.982835 waagent[1625]: 2025-05-17T01:04:05.982786Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] May 17 01:04:06.053044 waagent[1625]: 2025-05-17T01:04:06.052891Z INFO ExtHandler ExtHandler Found private key matching thumbprint 43F5A468D3C176BC69BA4D5571DF0AE417C82FA0 May 17 01:04:06.053418 waagent[1625]: 2025-05-17T01:04:06.053364Z INFO ExtHandler ExtHandler Certificate with thumbprint 72125E8D4941471C1AC159CB0ACC58396FD6BEA9 has no matching private key. May 17 01:04:06.053739 waagent[1625]: 2025-05-17T01:04:06.053689Z INFO ExtHandler ExtHandler Fetch goal state completed May 17 01:04:06.068506 waagent[1625]: 2025-05-17T01:04:06.068454Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: 77ee7b88-abbf-4f3d-b06f-4f75113fd2f6 New eTag: 14050717007102976064] May 17 01:04:06.069199 waagent[1625]: 2025-05-17T01:04:06.069141Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob May 17 01:04:06.228051 waagent[1625]: 2025-05-17T01:04:06.227842Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.7; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; May 17 01:04:06.263855 waagent[1625]: 2025-05-17T01:04:06.263756Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1625 May 17 01:04:06.267720 waagent[1625]: 2025-05-17T01:04:06.267654Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.7', '', 'Flatcar Container Linux by Kinvolk'] May 17 01:04:06.269118 waagent[1625]: 2025-05-17T01:04:06.269057Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules May 17 01:04:06.490441 waagent[1625]: 2025-05-17T01:04:06.490330Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service May 17 01:04:06.490793 waagent[1625]: 2025-05-17T01:04:06.490731Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup May 17 01:04:06.498550 waagent[1625]: 2025-05-17T01:04:06.498482Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now May 17 01:04:06.499073 waagent[1625]: 2025-05-17T01:04:06.499012Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' May 17 01:04:06.500246 waagent[1625]: 2025-05-17T01:04:06.500180Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] May 17 01:04:06.501603 waagent[1625]: 2025-05-17T01:04:06.501529Z INFO ExtHandler ExtHandler Starting env monitor service. May 17 01:04:06.502021 waagent[1625]: 2025-05-17T01:04:06.501954Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file May 17 01:04:06.502480 waagent[1625]: 2025-05-17T01:04:06.502410Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 May 17 01:04:06.503210 waagent[1625]: 2025-05-17T01:04:06.503150Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. May 17 01:04:06.503615 waagent[1625]: 2025-05-17T01:04:06.503560Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: May 17 01:04:06.503615 waagent[1625]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT May 17 01:04:06.503615 waagent[1625]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 May 17 01:04:06.503615 waagent[1625]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 May 17 01:04:06.503615 waagent[1625]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 May 17 01:04:06.503615 waagent[1625]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 May 17 01:04:06.503615 waagent[1625]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 May 17 01:04:06.506074 waagent[1625]: 2025-05-17T01:04:06.505890Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. May 17 01:04:06.507030 waagent[1625]: 2025-05-17T01:04:06.506962Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file May 17 01:04:06.507318 waagent[1625]: 2025-05-17T01:04:06.507264Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 May 17 01:04:06.507991 waagent[1625]: 2025-05-17T01:04:06.507900Z INFO EnvHandler ExtHandler Configure routes May 17 01:04:06.508237 waagent[1625]: 2025-05-17T01:04:06.508187Z INFO EnvHandler ExtHandler Gateway:None May 17 01:04:06.508441 waagent[1625]: 2025-05-17T01:04:06.508395Z INFO EnvHandler ExtHandler Routes:None May 17 01:04:06.509235 waagent[1625]: 2025-05-17T01:04:06.509162Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread May 17 01:04:06.509326 waagent[1625]: 2025-05-17T01:04:06.509276Z INFO ExtHandler ExtHandler Start Extension Telemetry service. May 17 01:04:06.510164 waagent[1625]: 2025-05-17T01:04:06.510030Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True May 17 01:04:06.510253 waagent[1625]: 2025-05-17T01:04:06.510174Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. May 17 01:04:06.510904 waagent[1625]: 2025-05-17T01:04:06.510834Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread May 17 01:04:06.522943 waagent[1625]: 2025-05-17T01:04:06.522865Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) May 17 01:04:06.523629 waagent[1625]: 2025-05-17T01:04:06.523568Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required May 17 01:04:06.524644 waagent[1625]: 2025-05-17T01:04:06.524576Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' May 17 01:04:06.574579 waagent[1625]: 2025-05-17T01:04:06.574514Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. May 17 01:04:06.601312 waagent[1625]: 2025-05-17T01:04:06.601231Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1616' May 17 01:04:06.792258 waagent[1625]: 2025-05-17T01:04:06.792077Z INFO MonitorHandler ExtHandler Network interfaces: May 17 01:04:06.792258 waagent[1625]: Executing ['ip', '-a', '-o', 'link']: May 17 01:04:06.792258 waagent[1625]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 May 17 01:04:06.792258 waagent[1625]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:be:6f:cd brd ff:ff:ff:ff:ff:ff May 17 01:04:06.792258 waagent[1625]: 3: enP55973s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:be:6f:cd brd ff:ff:ff:ff:ff:ff\ altname enP55973p0s2 May 17 01:04:06.792258 waagent[1625]: Executing ['ip', '-4', '-a', '-o', 'address']: May 17 01:04:06.792258 waagent[1625]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever May 17 01:04:06.792258 waagent[1625]: 2: eth0 inet 10.200.20.11/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever May 17 01:04:06.792258 waagent[1625]: Executing ['ip', '-6', '-a', '-o', 'address']: May 17 01:04:06.792258 waagent[1625]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever May 17 01:04:06.792258 waagent[1625]: 2: eth0 inet6 fe80::222:48ff:febe:6fcd/64 scope link \ valid_lft forever preferred_lft forever May 17 01:04:06.834013 waagent[1625]: 2025-05-17T01:04:06.833949Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.13.1.1 -- exiting May 17 01:04:07.672089 waagent[1554]: 2025-05-17T01:04:07.671907Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running May 17 01:04:07.676708 waagent[1554]: 2025-05-17T01:04:07.676653Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.13.1.1 to be the latest agent May 17 01:04:08.950681 waagent[1657]: 2025-05-17T01:04:08.950582Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.13.1.1) May 17 01:04:08.952437 waagent[1657]: 2025-05-17T01:04:08.952375Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.7 May 17 01:04:08.952695 waagent[1657]: 2025-05-17T01:04:08.952643Z INFO ExtHandler ExtHandler Python: 3.9.16 May 17 01:04:08.952909 waagent[1657]: 2025-05-17T01:04:08.952861Z INFO ExtHandler ExtHandler CPU Arch: aarch64 May 17 01:04:08.967481 waagent[1657]: 2025-05-17T01:04:08.967375Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.7; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; Arch: aarch64; systemd: True; systemd_version: systemd 252 (252); LISDrivers: Absent; logrotate: logrotate 3.20.1; May 17 01:04:08.968100 waagent[1657]: 2025-05-17T01:04:08.968039Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file May 17 01:04:08.968366 waagent[1657]: 2025-05-17T01:04:08.968315Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 May 17 01:04:08.968679 waagent[1657]: 2025-05-17T01:04:08.968625Z INFO ExtHandler ExtHandler Initializing the goal state... May 17 01:04:08.982344 waagent[1657]: 2025-05-17T01:04:08.982271Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] May 17 01:04:08.994386 waagent[1657]: 2025-05-17T01:04:08.994328Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.164 May 17 01:04:08.995554 waagent[1657]: 2025-05-17T01:04:08.995487Z INFO ExtHandler May 17 01:04:08.995818 waagent[1657]: 2025-05-17T01:04:08.995765Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: ac4d7b70-5255-4198-98ac-46e6a0e61ce8 eTag: 14050717007102976064 source: Fabric] May 17 01:04:08.996719 waagent[1657]: 2025-05-17T01:04:08.996653Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. May 17 01:04:08.998188 waagent[1657]: 2025-05-17T01:04:08.998119Z INFO ExtHandler May 17 01:04:08.998453 waagent[1657]: 2025-05-17T01:04:08.998399Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] May 17 01:04:09.005636 waagent[1657]: 2025-05-17T01:04:09.005582Z INFO ExtHandler ExtHandler Downloading artifacts profile blob May 17 01:04:09.006257 waagent[1657]: 2025-05-17T01:04:09.006202Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required May 17 01:04:09.025892 waagent[1657]: 2025-05-17T01:04:09.025825Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. May 17 01:04:09.105848 waagent[1657]: 2025-05-17T01:04:09.105716Z INFO ExtHandler Downloaded certificate {'thumbprint': '72125E8D4941471C1AC159CB0ACC58396FD6BEA9', 'hasPrivateKey': False} May 17 01:04:09.107157 waagent[1657]: 2025-05-17T01:04:09.107090Z INFO ExtHandler Downloaded certificate {'thumbprint': '43F5A468D3C176BC69BA4D5571DF0AE417C82FA0', 'hasPrivateKey': True} May 17 01:04:09.108376 waagent[1657]: 2025-05-17T01:04:09.108310Z INFO ExtHandler Fetch goal state from WireServer completed May 17 01:04:09.109414 waagent[1657]: 2025-05-17T01:04:09.109348Z INFO ExtHandler ExtHandler Goal state initialization completed. May 17 01:04:09.130230 waagent[1657]: 2025-05-17T01:04:09.130131Z INFO ExtHandler ExtHandler OpenSSL version: OpenSSL 3.0.15 3 Sep 2024 (Library: OpenSSL 3.0.15 3 Sep 2024) May 17 01:04:09.138833 waagent[1657]: 2025-05-17T01:04:09.138731Z INFO ExtHandler ExtHandler Using iptables [version 1.8.8] to manage firewall rules May 17 01:04:09.142765 waagent[1657]: 2025-05-17T01:04:09.142665Z INFO ExtHandler ExtHandler Did not find a legacy firewall rule: ['iptables', '-w', '-t', 'security', '-C', 'OUTPUT', '-d', '168.63.129.16', '-p', 'tcp', '-m', 'conntrack', '--ctstate', 'INVALID,NEW', '-j', 'ACCEPT'] May 17 01:04:09.143115 waagent[1657]: 2025-05-17T01:04:09.143057Z INFO ExtHandler ExtHandler Checking state of the firewall May 17 01:04:09.379987 waagent[1657]: 2025-05-17T01:04:09.377613Z INFO ExtHandler ExtHandler Created firewall rules for Azure Fabric: May 17 01:04:09.379987 waagent[1657]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) May 17 01:04:09.379987 waagent[1657]: pkts bytes target prot opt in out source destination May 17 01:04:09.379987 waagent[1657]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) May 17 01:04:09.379987 waagent[1657]: pkts bytes target prot opt in out source destination May 17 01:04:09.379987 waagent[1657]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) May 17 01:04:09.379987 waagent[1657]: pkts bytes target prot opt in out source destination May 17 01:04:09.379987 waagent[1657]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 May 17 01:04:09.379987 waagent[1657]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 May 17 01:04:09.379987 waagent[1657]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW May 17 01:04:09.381465 waagent[1657]: 2025-05-17T01:04:09.381396Z INFO ExtHandler ExtHandler Setting up persistent firewall rules May 17 01:04:09.384750 waagent[1657]: 2025-05-17T01:04:09.384632Z INFO ExtHandler ExtHandler The firewalld service is not present on the system May 17 01:04:09.385189 waagent[1657]: 2025-05-17T01:04:09.385131Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service May 17 01:04:09.385663 waagent[1657]: 2025-05-17T01:04:09.385604Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup May 17 01:04:09.393296 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. May 17 01:04:09.393447 systemd[1]: Stopped kubelet.service. May 17 01:04:09.394733 systemd[1]: Starting kubelet.service... May 17 01:04:09.398399 waagent[1657]: 2025-05-17T01:04:09.398349Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now May 17 01:04:09.399044 waagent[1657]: 2025-05-17T01:04:09.398979Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' May 17 01:04:09.407923 waagent[1657]: 2025-05-17T01:04:09.407841Z INFO ExtHandler ExtHandler WALinuxAgent-2.13.1.1 running as process 1657 May 17 01:04:09.411580 waagent[1657]: 2025-05-17T01:04:09.411491Z INFO ExtHandler ExtHandler [CGI] Cgroups is not currently supported on ['flatcar', '3510.3.7', '', 'Flatcar Container Linux by Kinvolk'] May 17 01:04:09.412673 waagent[1657]: 2025-05-17T01:04:09.412607Z INFO ExtHandler ExtHandler [CGI] Agent will reset the quotas in case cgroup usage went from enabled to disabled May 17 01:04:09.413767 waagent[1657]: 2025-05-17T01:04:09.413705Z INFO ExtHandler ExtHandler [CGI] Agent cgroups enabled: False May 17 01:04:09.416870 waagent[1657]: 2025-05-17T01:04:09.416796Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: 1. configuration enabled [True], 2. cgroups v1 enabled [False] OR cgroups v2 is in use and v2 resource limiting configuration enabled [False], 3. python supported: [True] May 17 01:04:09.418511 waagent[1657]: 2025-05-17T01:04:09.418354Z INFO ExtHandler ExtHandler Starting env monitor service. May 17 01:04:09.419485 waagent[1657]: 2025-05-17T01:04:09.419428Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file May 17 01:04:09.419748 waagent[1657]: 2025-05-17T01:04:09.419698Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 May 17 01:04:09.420423 waagent[1657]: 2025-05-17T01:04:09.420362Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. May 17 01:04:09.420841 waagent[1657]: 2025-05-17T01:04:09.420785Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: May 17 01:04:09.420841 waagent[1657]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT May 17 01:04:09.420841 waagent[1657]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 May 17 01:04:09.420841 waagent[1657]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 May 17 01:04:09.420841 waagent[1657]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 May 17 01:04:09.420841 waagent[1657]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 May 17 01:04:09.420841 waagent[1657]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 May 17 01:04:09.423515 waagent[1657]: 2025-05-17T01:04:09.423374Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. May 17 01:04:09.424512 waagent[1657]: 2025-05-17T01:04:09.424438Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file May 17 01:04:09.426834 waagent[1657]: 2025-05-17T01:04:09.426705Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 May 17 01:04:09.427790 waagent[1657]: 2025-05-17T01:04:09.427721Z INFO EnvHandler ExtHandler Configure routes May 17 01:04:09.428124 waagent[1657]: 2025-05-17T01:04:09.428066Z INFO EnvHandler ExtHandler Gateway:None May 17 01:04:09.428571 waagent[1657]: 2025-05-17T01:04:09.428518Z INFO EnvHandler ExtHandler Routes:None May 17 01:04:09.431664 waagent[1657]: 2025-05-17T01:04:09.431594Z INFO ExtHandler ExtHandler Start Extension Telemetry service. May 17 01:04:09.432797 waagent[1657]: 2025-05-17T01:04:09.431358Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread May 17 01:04:09.434255 waagent[1657]: 2025-05-17T01:04:09.434176Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True May 17 01:04:09.434485 waagent[1657]: 2025-05-17T01:04:09.434410Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. May 17 01:04:09.439656 waagent[1657]: 2025-05-17T01:04:09.439461Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread May 17 01:04:09.452313 waagent[1657]: 2025-05-17T01:04:09.452245Z INFO MonitorHandler ExtHandler Network interfaces: May 17 01:04:09.452313 waagent[1657]: Executing ['ip', '-a', '-o', 'link']: May 17 01:04:09.452313 waagent[1657]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 May 17 01:04:09.452313 waagent[1657]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:be:6f:cd brd ff:ff:ff:ff:ff:ff May 17 01:04:09.452313 waagent[1657]: 3: enP55973s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:be:6f:cd brd ff:ff:ff:ff:ff:ff\ altname enP55973p0s2 May 17 01:04:09.452313 waagent[1657]: Executing ['ip', '-4', '-a', '-o', 'address']: May 17 01:04:09.452313 waagent[1657]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever May 17 01:04:09.452313 waagent[1657]: 2: eth0 inet 10.200.20.11/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever May 17 01:04:09.452313 waagent[1657]: Executing ['ip', '-6', '-a', '-o', 'address']: May 17 01:04:09.452313 waagent[1657]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever May 17 01:04:09.452313 waagent[1657]: 2: eth0 inet6 fe80::222:48ff:febe:6fcd/64 scope link \ valid_lft forever preferred_lft forever May 17 01:04:09.460604 waagent[1657]: 2025-05-17T01:04:09.460518Z INFO ExtHandler ExtHandler Downloading agent manifest May 17 01:04:09.495717 systemd[1]: Started kubelet.service. May 17 01:04:09.501193 waagent[1657]: 2025-05-17T01:04:09.501123Z INFO ExtHandler ExtHandler May 17 01:04:09.501475 waagent[1657]: 2025-05-17T01:04:09.501422Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: 151d6753-763a-4f98-9774-c78a592fdbf2 correlation ba56d1bd-9a30-468b-9617-d43638441d80 created: 2025-05-17T01:02:01.315559Z] May 17 01:04:09.502610 waagent[1657]: 2025-05-17T01:04:09.502542Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. May 17 01:04:09.504766 waagent[1657]: 2025-05-17T01:04:09.504702Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 3 ms] May 17 01:04:09.529320 waagent[1657]: 2025-05-17T01:04:09.529246Z INFO ExtHandler ExtHandler Looking for existing remote access users. May 17 01:04:09.532082 waagent[1657]: 2025-05-17T01:04:09.532013Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.13.1.1 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: 5D37E48E-BD42-42FB-8535-5DD8A8398D32;UpdateGSErrors: 0;AutoUpdate: 1;UpdateMode: SelfUpdate;] May 17 01:04:09.598130 kubelet[1701]: E0517 01:04:09.598072 1701 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 01:04:09.600364 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 01:04:09.600485 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 01:04:09.901980 waagent[1657]: 2025-05-17T01:04:09.901114Z INFO EnvHandler ExtHandler Using iptables [version 1.8.8] to manage firewall rules May 17 01:04:09.913155 waagent[1657]: 2025-05-17T01:04:09.913085Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 May 17 01:04:18.813903 systemd[1]: Created slice system-sshd.slice. May 17 01:04:18.815405 systemd[1]: Started sshd@0-10.200.20.11:22-10.200.16.10:43938.service. May 17 01:04:19.623249 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. May 17 01:04:19.623494 systemd[1]: Stopped kubelet.service. May 17 01:04:19.624970 systemd[1]: Starting kubelet.service... May 17 01:04:19.707857 sshd[1711]: Accepted publickey for core from 10.200.16.10 port 43938 ssh2: RSA SHA256:x3d6fk4o7Gi9e3Ae36hiTT61fdQx083j9gAothd9hI4 May 17 01:04:19.747575 systemd[1]: Started kubelet.service. May 17 01:04:19.840362 kubelet[1717]: E0517 01:04:19.840298 1717 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 01:04:19.842527 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 01:04:19.842664 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 01:04:20.022522 sshd[1711]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 01:04:20.026677 systemd-logind[1440]: New session 3 of user core. May 17 01:04:20.027123 systemd[1]: Started session-3.scope. May 17 01:04:20.382409 systemd[1]: Started sshd@1-10.200.20.11:22-10.200.16.10:43950.service. May 17 01:04:20.704957 kernel: hv_balloon: Max. dynamic memory size: 4096 MB May 17 01:04:20.864546 sshd[1725]: Accepted publickey for core from 10.200.16.10 port 43950 ssh2: RSA SHA256:x3d6fk4o7Gi9e3Ae36hiTT61fdQx083j9gAothd9hI4 May 17 01:04:20.866194 sshd[1725]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 01:04:20.870426 systemd[1]: Started session-4.scope. May 17 01:04:20.871072 systemd-logind[1440]: New session 4 of user core. May 17 01:04:21.214753 sshd[1725]: pam_unix(sshd:session): session closed for user core May 17 01:04:21.217650 systemd[1]: sshd@1-10.200.20.11:22-10.200.16.10:43950.service: Deactivated successfully. May 17 01:04:21.218369 systemd[1]: session-4.scope: Deactivated successfully. May 17 01:04:21.218874 systemd-logind[1440]: Session 4 logged out. Waiting for processes to exit. May 17 01:04:21.219826 systemd-logind[1440]: Removed session 4. May 17 01:04:21.298222 systemd[1]: Started sshd@2-10.200.20.11:22-10.200.16.10:43962.service. May 17 01:04:21.779756 sshd[1731]: Accepted publickey for core from 10.200.16.10 port 43962 ssh2: RSA SHA256:x3d6fk4o7Gi9e3Ae36hiTT61fdQx083j9gAothd9hI4 May 17 01:04:21.781056 sshd[1731]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 01:04:21.785028 systemd-logind[1440]: New session 5 of user core. May 17 01:04:21.785384 systemd[1]: Started session-5.scope. May 17 01:04:22.124818 sshd[1731]: pam_unix(sshd:session): session closed for user core May 17 01:04:22.127392 systemd[1]: sshd@2-10.200.20.11:22-10.200.16.10:43962.service: Deactivated successfully. May 17 01:04:22.128093 systemd[1]: session-5.scope: Deactivated successfully. May 17 01:04:22.128636 systemd-logind[1440]: Session 5 logged out. Waiting for processes to exit. May 17 01:04:22.129506 systemd-logind[1440]: Removed session 5. May 17 01:04:22.205220 systemd[1]: Started sshd@3-10.200.20.11:22-10.200.16.10:43972.service. May 17 01:04:22.686079 sshd[1737]: Accepted publickey for core from 10.200.16.10 port 43972 ssh2: RSA SHA256:x3d6fk4o7Gi9e3Ae36hiTT61fdQx083j9gAothd9hI4 May 17 01:04:22.687338 sshd[1737]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 01:04:22.691321 systemd-logind[1440]: New session 6 of user core. May 17 01:04:22.691706 systemd[1]: Started session-6.scope. May 17 01:04:23.034591 sshd[1737]: pam_unix(sshd:session): session closed for user core May 17 01:04:23.037080 systemd[1]: sshd@3-10.200.20.11:22-10.200.16.10:43972.service: Deactivated successfully. May 17 01:04:23.037734 systemd[1]: session-6.scope: Deactivated successfully. May 17 01:04:23.038295 systemd-logind[1440]: Session 6 logged out. Waiting for processes to exit. May 17 01:04:23.039180 systemd-logind[1440]: Removed session 6. May 17 01:04:23.115254 systemd[1]: Started sshd@4-10.200.20.11:22-10.200.16.10:43974.service. May 17 01:04:23.593340 sshd[1743]: Accepted publickey for core from 10.200.16.10 port 43974 ssh2: RSA SHA256:x3d6fk4o7Gi9e3Ae36hiTT61fdQx083j9gAothd9hI4 May 17 01:04:23.594688 sshd[1743]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 01:04:23.598622 systemd-logind[1440]: New session 7 of user core. May 17 01:04:23.599059 systemd[1]: Started session-7.scope. May 17 01:04:24.488996 sudo[1746]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 17 01:04:24.489217 sudo[1746]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 01:04:24.557780 dbus-daemon[1426]: avc: received setenforce notice (enforcing=1) May 17 01:04:24.557962 sudo[1746]: pam_unix(sudo:session): session closed for user root May 17 01:04:24.693928 sshd[1743]: pam_unix(sshd:session): session closed for user core May 17 01:04:24.697194 systemd[1]: sshd@4-10.200.20.11:22-10.200.16.10:43974.service: Deactivated successfully. May 17 01:04:24.697965 systemd[1]: session-7.scope: Deactivated successfully. May 17 01:04:24.698538 systemd-logind[1440]: Session 7 logged out. Waiting for processes to exit. May 17 01:04:24.699616 systemd-logind[1440]: Removed session 7. May 17 01:04:24.775977 systemd[1]: Started sshd@5-10.200.20.11:22-10.200.16.10:43988.service. May 17 01:04:25.226463 sshd[1750]: Accepted publickey for core from 10.200.16.10 port 43988 ssh2: RSA SHA256:x3d6fk4o7Gi9e3Ae36hiTT61fdQx083j9gAothd9hI4 May 17 01:04:25.228197 sshd[1750]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 01:04:25.232173 systemd-logind[1440]: New session 8 of user core. May 17 01:04:25.232536 systemd[1]: Started session-8.scope. May 17 01:04:25.481116 sudo[1754]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 17 01:04:25.481686 sudo[1754]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 01:04:25.484503 sudo[1754]: pam_unix(sudo:session): session closed for user root May 17 01:04:25.488759 sudo[1753]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 17 01:04:25.488994 sudo[1753]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 01:04:25.497095 systemd[1]: Stopping audit-rules.service... May 17 01:04:25.497000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 17 01:04:25.502102 kernel: kauditd_printk_skb: 55 callbacks suppressed May 17 01:04:25.502176 kernel: audit: type=1305 audit(1747443865.497:213): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 17 01:04:25.502433 auditctl[1757]: No rules May 17 01:04:25.497000 audit[1757]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffff7b2bd20 a2=420 a3=0 items=0 ppid=1 pid=1757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:04:25.502847 systemd[1]: audit-rules.service: Deactivated successfully. May 17 01:04:25.503036 systemd[1]: Stopped audit-rules.service. May 17 01:04:25.513756 systemd[1]: Starting audit-rules.service... May 17 01:04:25.535962 kernel: audit: type=1300 audit(1747443865.497:213): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffff7b2bd20 a2=420 a3=0 items=0 ppid=1 pid=1757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:04:25.497000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 17 01:04:25.544135 kernel: audit: type=1327 audit(1747443865.497:213): proctitle=2F7362696E2F617564697463746C002D44 May 17 01:04:25.502000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:04:25.561079 kernel: audit: type=1131 audit(1747443865.502:214): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:04:25.561154 augenrules[1774]: No rules May 17 01:04:25.561607 systemd[1]: Finished audit-rules.service. May 17 01:04:25.560000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:04:25.578569 kernel: audit: type=1130 audit(1747443865.560:215): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:04:25.562760 sudo[1753]: pam_unix(sudo:session): session closed for user root May 17 01:04:25.561000 audit[1753]: USER_END pid=1753 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 01:04:25.561000 audit[1753]: CRED_DISP pid=1753 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 01:04:25.598144 kernel: audit: type=1106 audit(1747443865.561:216): pid=1753 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 01:04:25.615952 kernel: audit: type=1104 audit(1747443865.561:217): pid=1753 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 01:04:25.648638 sshd[1750]: pam_unix(sshd:session): session closed for user core May 17 01:04:25.648000 audit[1750]: USER_END pid=1750 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:04:25.651633 systemd-logind[1440]: Session 8 logged out. Waiting for processes to exit. May 17 01:04:25.652776 systemd[1]: session-8.scope: Deactivated successfully. May 17 01:04:25.653868 systemd-logind[1440]: Removed session 8. May 17 01:04:25.654453 systemd[1]: sshd@5-10.200.20.11:22-10.200.16.10:43988.service: Deactivated successfully. May 17 01:04:25.648000 audit[1750]: CRED_DISP pid=1750 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:04:25.691773 kernel: audit: type=1106 audit(1747443865.648:218): pid=1750 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:04:25.691845 kernel: audit: type=1104 audit(1747443865.648:219): pid=1750 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:04:25.691869 kernel: audit: type=1131 audit(1747443865.648:220): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.11:22-10.200.16.10:43988 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:04:25.648000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.11:22-10.200.16.10:43988 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:04:25.732000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.11:22-10.200.16.10:43994 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:04:25.733236 systemd[1]: Started sshd@6-10.200.20.11:22-10.200.16.10:43994.service. May 17 01:04:26.220000 audit[1780]: USER_ACCT pid=1780 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:04:26.221445 sshd[1780]: Accepted publickey for core from 10.200.16.10 port 43994 ssh2: RSA SHA256:x3d6fk4o7Gi9e3Ae36hiTT61fdQx083j9gAothd9hI4 May 17 01:04:26.221000 audit[1780]: CRED_ACQ pid=1780 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:04:26.221000 audit[1780]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc29fa480 a2=3 a3=1 items=0 ppid=1 pid=1780 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:04:26.221000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 01:04:26.223034 sshd[1780]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 01:04:26.226874 systemd-logind[1440]: New session 9 of user core. May 17 01:04:26.227307 systemd[1]: Started session-9.scope. May 17 01:04:26.230000 audit[1780]: USER_START pid=1780 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:04:26.231000 audit[1782]: CRED_ACQ pid=1782 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:04:26.494000 audit[1783]: USER_ACCT pid=1783 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 01:04:26.494000 audit[1783]: CRED_REFR pid=1783 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 01:04:26.495554 sudo[1783]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 17 01:04:26.495773 sudo[1783]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 01:04:26.496000 audit[1783]: USER_START pid=1783 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 01:04:26.516409 systemd[1]: Starting docker.service... May 17 01:04:26.549766 env[1793]: time="2025-05-17T01:04:26.549715520Z" level=info msg="Starting up" May 17 01:04:26.551111 env[1793]: time="2025-05-17T01:04:26.551088926Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 17 01:04:26.551212 env[1793]: time="2025-05-17T01:04:26.551198606Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 17 01:04:26.551282 env[1793]: time="2025-05-17T01:04:26.551265686Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 17 01:04:26.551334 env[1793]: time="2025-05-17T01:04:26.551322607Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 17 01:04:26.552919 env[1793]: time="2025-05-17T01:04:26.552899733Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 17 01:04:26.553034 env[1793]: time="2025-05-17T01:04:26.553019893Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 17 01:04:26.553095 env[1793]: time="2025-05-17T01:04:26.553082334Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 17 01:04:26.553147 env[1793]: time="2025-05-17T01:04:26.553135534Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 17 01:04:26.649683 env[1793]: time="2025-05-17T01:04:26.649637755Z" level=info msg="Loading containers: start." May 17 01:04:26.794000 audit[1821]: NETFILTER_CFG table=nat:5 family=2 entries=2 op=nft_register_chain pid=1821 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:04:26.794000 audit[1821]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=116 a0=3 a1=ffffc4253da0 a2=0 a3=1 items=0 ppid=1793 pid=1821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:04:26.794000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 May 17 01:04:26.796000 audit[1823]: NETFILTER_CFG table=filter:6 family=2 entries=2 op=nft_register_chain pid=1823 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:04:26.796000 audit[1823]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=fffff1ee5810 a2=0 a3=1 items=0 ppid=1793 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:04:26.796000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 May 17 01:04:26.797000 audit[1825]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_chain pid=1825 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:04:26.797000 audit[1825]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=fffff59304c0 a2=0 a3=1 items=0 ppid=1793 pid=1825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:04:26.797000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 17 01:04:26.799000 audit[1827]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1827 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:04:26.799000 audit[1827]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=fffff9433640 a2=0 a3=1 items=0 ppid=1793 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:04:26.799000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 17 01:04:26.801000 audit[1829]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1829 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:04:26.801000 audit[1829]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffe26355d0 a2=0 a3=1 items=0 ppid=1793 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:04:26.801000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E May 17 01:04:26.802000 audit[1831]: NETFILTER_CFG table=filter:10 family=2 entries=1 op=nft_register_rule pid=1831 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:04:26.802000 audit[1831]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffe36003a0 a2=0 a3=1 items=0 ppid=1793 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:04:26.802000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E May 17 01:04:26.822000 audit[1833]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_chain pid=1833 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:04:26.822000 audit[1833]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffc04e37c0 a2=0 a3=1 items=0 ppid=1793 pid=1833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:04:26.822000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 May 17 01:04:26.824000 audit[1835]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1835 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:04:26.824000 audit[1835]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=212 a0=3 a1=fffffc246e30 a2=0 a3=1 items=0 ppid=1793 pid=1835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:04:26.824000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E May 17 01:04:26.826000 audit[1837]: NETFILTER_CFG table=filter:13 family=2 entries=2 op=nft_register_chain pid=1837 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:04:26.826000 audit[1837]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=308 a0=3 a1=ffffd85ff860 a2=0 a3=1 items=0 ppid=1793 pid=1837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:04:26.826000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 17 01:04:26.845000 audit[1841]: NETFILTER_CFG table=filter:14 family=2 entries=1 op=nft_unregister_rule pid=1841 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:04:26.845000 audit[1841]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffe3771fb0 a2=0 a3=1 items=0 ppid=1793 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:04:26.845000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 17 01:04:26.859000 audit[1842]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1842 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:04:26.859000 audit[1842]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffcbb5fdd0 a2=0 a3=1 items=0 ppid=1793 pid=1842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:04:26.859000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 17 01:04:27.001974 kernel: Initializing XFRM netlink socket May 17 01:04:27.059426 env[1793]: time="2025-05-17T01:04:27.059331641Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" May 17 01:04:27.455000 audit[1850]: NETFILTER_CFG table=nat:16 family=2 entries=2 op=nft_register_chain pid=1850 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:04:27.455000 audit[1850]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=492 a0=3 a1=ffffd80bff20 a2=0 a3=1 items=0 ppid=1793 pid=1850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:04:27.455000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 May 17 01:04:27.520000 audit[1853]: NETFILTER_CFG table=nat:17 family=2 entries=1 op=nft_register_rule pid=1853 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:04:27.520000 audit[1853]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=288 a0=3 a1=ffffc81b2080 a2=0 a3=1 items=0 ppid=1793 pid=1853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:04:27.520000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E May 17 01:04:27.523000 audit[1856]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_rule pid=1856 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:04:27.523000 audit[1856]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffd6d46d40 a2=0 a3=1 items=0 ppid=1793 pid=1856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:04:27.523000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 May 17 01:04:27.525000 audit[1858]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1858 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:04:27.525000 audit[1858]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffcb362b00 a2=0 a3=1 items=0 ppid=1793 pid=1858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:04:27.525000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 May 17 01:04:27.527000 audit[1860]: NETFILTER_CFG table=nat:20 family=2 entries=2 op=nft_register_chain pid=1860 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:04:27.527000 audit[1860]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=356 a0=3 a1=ffffe09ab370 a2=0 a3=1 items=0 ppid=1793 pid=1860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:04:27.527000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 May 17 01:04:27.529000 audit[1862]: NETFILTER_CFG table=nat:21 family=2 entries=2 op=nft_register_chain pid=1862 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:04:27.529000 audit[1862]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=444 a0=3 a1=ffffda0bfa40 a2=0 a3=1 items=0 ppid=1793 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:04:27.529000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 May 17 01:04:27.530000 audit[1864]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1864 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:04:27.530000 audit[1864]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=ffffc1edd0a0 a2=0 a3=1 items=0 ppid=1793 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:04:27.530000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 May 17 01:04:27.532000 audit[1866]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1866 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:04:27.532000 audit[1866]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=508 a0=3 a1=fffffc020810 a2=0 a3=1 items=0 ppid=1793 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:04:27.532000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 May 17 01:04:27.534000 audit[1868]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1868 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:04:27.534000 audit[1868]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=240 a0=3 a1=ffffe1556680 a2=0 a3=1 items=0 ppid=1793 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:04:27.534000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 17 01:04:27.535000 audit[1870]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1870 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:04:27.535000 audit[1870]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=428 a0=3 a1=ffffceba41c0 a2=0 a3=1 items=0 ppid=1793 pid=1870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:04:27.535000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 17 01:04:27.537000 audit[1872]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1872 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:04:27.537000 audit[1872]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffc24b0530 a2=0 a3=1 items=0 ppid=1793 pid=1872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:04:27.537000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 May 17 01:04:27.538857 systemd-networkd[1616]: docker0: Link UP May 17 01:04:27.557000 audit[1876]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_unregister_rule pid=1876 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:04:27.557000 audit[1876]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffc743e170 a2=0 a3=1 items=0 ppid=1793 pid=1876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:04:27.557000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 17 01:04:27.562000 audit[1877]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_rule pid=1877 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:04:27.562000 audit[1877]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffca4bbd10 a2=0 a3=1 items=0 ppid=1793 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:04:27.562000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 17 01:04:27.564131 env[1793]: time="2025-05-17T01:04:27.564104752Z" level=info msg="Loading containers: done." May 17 01:04:27.622600 env[1793]: time="2025-05-17T01:04:27.622548569Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 May 17 01:04:27.622777 env[1793]: time="2025-05-17T01:04:27.622741849Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 May 17 01:04:27.622873 env[1793]: time="2025-05-17T01:04:27.622848330Z" level=info msg="Daemon has completed initialization" May 17 01:04:27.655000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:04:27.656747 systemd[1]: Started docker.service. May 17 01:04:27.664644 env[1793]: time="2025-05-17T01:04:27.664572164Z" level=info msg="API listen on /run/docker.sock" May 17 01:04:29.950620 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. May 17 01:04:29.950806 systemd[1]: Stopped kubelet.service. May 17 01:04:29.949000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:04:29.949000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:04:29.952283 systemd[1]: Starting kubelet.service... May 17 01:04:30.077523 systemd[1]: Started kubelet.service. May 17 01:04:30.077000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:04:30.112761 kubelet[1912]: E0517 01:04:30.112697 1912 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 01:04:30.114000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 17 01:04:30.114986 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 01:04:30.115105 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 01:04:31.370385 env[1453]: time="2025-05-17T01:04:31.370335176Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.32.5\"" May 17 01:04:32.330921 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount574114873.mount: Deactivated successfully. May 17 01:04:34.066150 update_engine[1444]: I0517 01:04:34.066090 1444 update_attempter.cc:509] Updating boot flags... May 17 01:04:34.558992 env[1453]: time="2025-05-17T01:04:34.558658019Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.32.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:04:34.565410 env[1453]: time="2025-05-17T01:04:34.565372514Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:42968274c3d27c41cdc146f5442f122c1c74960e299c13e2f348d2fe835a9134,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:04:34.570329 env[1453]: time="2025-05-17T01:04:34.570291726Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.32.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:04:34.575007 env[1453]: time="2025-05-17T01:04:34.574973897Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:0bee1bf751fe06009678c0cde7545443ba3a8d2edf71cea4c69cbb5774b9bf47,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:04:34.575908 env[1453]: time="2025-05-17T01:04:34.575877779Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.32.5\" returns image reference \"sha256:42968274c3d27c41cdc146f5442f122c1c74960e299c13e2f348d2fe835a9134\"" May 17 01:04:34.576594 env[1453]: time="2025-05-17T01:04:34.576566941Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.32.5\"" May 17 01:04:36.529731 env[1453]: time="2025-05-17T01:04:36.529664050Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.32.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:04:36.535690 env[1453]: time="2025-05-17T01:04:36.535654903Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:82042044d6ea1f1e5afda9c7351883800adbde447314786c4e5a2fd9e42aab09,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:04:36.540969 env[1453]: time="2025-05-17T01:04:36.540924234Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.32.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:04:36.545209 env[1453]: time="2025-05-17T01:04:36.545177843Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:79bcf2f5e614c336c02dcea9dfcdf485d7297aed6a21239a99c87f7164f9baca,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:04:36.546686 env[1453]: time="2025-05-17T01:04:36.545921924Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.32.5\" returns image reference \"sha256:82042044d6ea1f1e5afda9c7351883800adbde447314786c4e5a2fd9e42aab09\"" May 17 01:04:36.547179 env[1453]: time="2025-05-17T01:04:36.547149847Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.32.5\"" May 17 01:04:38.019286 env[1453]: time="2025-05-17T01:04:38.019217846Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.32.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:04:38.025245 env[1453]: time="2025-05-17T01:04:38.025203937Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e149336437f90109dad736c8a42e4b73c137a66579be8f3b9a456bcc62af3f9b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:04:38.029835 env[1453]: time="2025-05-17T01:04:38.029807825Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.32.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:04:38.040086 env[1453]: time="2025-05-17T01:04:38.040046364Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:f0f39d8b9808c407cacb3a46a5a9ce4d4a4a7cf3b674ba4bd221f5bc90051d2a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:04:38.041048 env[1453]: time="2025-05-17T01:04:38.041015805Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.32.5\" returns image reference \"sha256:e149336437f90109dad736c8a42e4b73c137a66579be8f3b9a456bcc62af3f9b\"" May 17 01:04:38.041553 env[1453]: time="2025-05-17T01:04:38.041526566Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.5\"" May 17 01:04:39.327810 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1626527706.mount: Deactivated successfully. May 17 01:04:39.847048 env[1453]: time="2025-05-17T01:04:39.847002321Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.32.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:04:39.854013 env[1453]: time="2025-05-17T01:04:39.853984172Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:69b7afc06f22edcae3b6a7d80cdacb488a5415fd605e89534679e5ebc41375fc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:04:39.858142 env[1453]: time="2025-05-17T01:04:39.858118380Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.32.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:04:39.862317 env[1453]: time="2025-05-17T01:04:39.862293427Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:9dc6553459c3319525ba4090a780db1a133d5dee68c08e07f9b9d6ba83b42a0b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:04:39.862718 env[1453]: time="2025-05-17T01:04:39.862692067Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.5\" returns image reference \"sha256:69b7afc06f22edcae3b6a7d80cdacb488a5415fd605e89534679e5ebc41375fc\"" May 17 01:04:39.863218 env[1453]: time="2025-05-17T01:04:39.863194788Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\"" May 17 01:04:40.200614 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 5. May 17 01:04:40.221189 kernel: kauditd_printk_skb: 88 callbacks suppressed May 17 01:04:40.221289 kernel: audit: type=1130 audit(1747443880.199:259): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:04:40.199000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:04:40.200793 systemd[1]: Stopped kubelet.service. May 17 01:04:40.202296 systemd[1]: Starting kubelet.service... May 17 01:04:40.199000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:04:40.238117 kernel: audit: type=1131 audit(1747443880.199:260): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:04:40.297683 systemd[1]: Started kubelet.service. May 17 01:04:40.296000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:04:40.314970 kernel: audit: type=1130 audit(1747443880.296:261): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:04:40.371863 kubelet[1962]: E0517 01:04:40.371804 1962 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 01:04:40.373000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 17 01:04:40.374084 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 01:04:40.374205 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 01:04:40.392959 kernel: audit: type=1131 audit(1747443880.373:262): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 17 01:04:41.925142 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2690470855.mount: Deactivated successfully. May 17 01:04:43.360819 env[1453]: time="2025-05-17T01:04:43.360772036Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:04:43.367996 env[1453]: time="2025-05-17T01:04:43.367962687Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2f6c962e7b8311337352d9fdea917da2184d9919f4da7695bc2a6517cf392fe4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:04:43.371748 env[1453]: time="2025-05-17T01:04:43.371719542Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:04:43.377004 env[1453]: time="2025-05-17T01:04:43.376966682Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:9caabbf6238b189a65d0d6e6ac138de60d6a1c419e5a341fbbb7c78382559c6e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:04:43.377901 env[1453]: time="2025-05-17T01:04:43.377873294Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\" returns image reference \"sha256:2f6c962e7b8311337352d9fdea917da2184d9919f4da7695bc2a6517cf392fe4\"" May 17 01:04:43.378454 env[1453]: time="2025-05-17T01:04:43.378432686Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" May 17 01:04:43.947420 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount725749431.mount: Deactivated successfully. May 17 01:04:43.973218 env[1453]: time="2025-05-17T01:04:43.973163441Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:04:43.982630 env[1453]: time="2025-05-17T01:04:43.982581379Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:afb61768ce381961ca0beff95337601f29dc70ff3ed14e5e4b3e5699057e6aa8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:04:43.987540 env[1453]: time="2025-05-17T01:04:43.987502700Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:04:43.992190 env[1453]: time="2025-05-17T01:04:43.992163967Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:04:43.992712 env[1453]: time="2025-05-17T01:04:43.992681516Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:afb61768ce381961ca0beff95337601f29dc70ff3ed14e5e4b3e5699057e6aa8\"" May 17 01:04:43.993332 env[1453]: time="2025-05-17T01:04:43.993300552Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.16-0\"" May 17 01:04:44.738046 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount529528534.mount: Deactivated successfully. May 17 01:04:47.927015 env[1453]: time="2025-05-17T01:04:47.926961923Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.16-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:04:47.934896 env[1453]: time="2025-05-17T01:04:47.934848207Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7fc9d4aa817aa6a3e549f3cd49d1f7b496407be979fc36dd5f356d59ce8c3a82,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:04:47.941000 env[1453]: time="2025-05-17T01:04:47.940952319Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.16-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:04:47.946648 env[1453]: time="2025-05-17T01:04:47.946603928Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:c6a9d11cc5c04b114ccdef39a9265eeef818e3d02f5359be035ae784097fdec5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:04:47.947573 env[1453]: time="2025-05-17T01:04:47.947536216Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.16-0\" returns image reference \"sha256:7fc9d4aa817aa6a3e549f3cd49d1f7b496407be979fc36dd5f356d59ce8c3a82\"" May 17 01:04:50.450668 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 6. May 17 01:04:50.450847 systemd[1]: Stopped kubelet.service. May 17 01:04:50.452289 systemd[1]: Starting kubelet.service... May 17 01:04:50.449000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:04:50.449000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:04:50.490621 kernel: audit: type=1130 audit(1747443890.449:263): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:04:50.490753 kernel: audit: type=1131 audit(1747443890.449:264): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:04:50.584000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:04:50.585576 systemd[1]: Started kubelet.service. May 17 01:04:50.605968 kernel: audit: type=1130 audit(1747443890.584:265): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:04:50.660032 kubelet[1989]: E0517 01:04:50.659986 1989 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 01:04:50.661000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 17 01:04:50.662274 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 01:04:50.662393 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 01:04:50.681959 kernel: audit: type=1131 audit(1747443890.661:266): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 17 01:04:53.806392 systemd[1]: Stopped kubelet.service. May 17 01:04:53.806000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:04:53.810240 systemd[1]: Starting kubelet.service... May 17 01:04:53.807000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:04:53.846797 kernel: audit: type=1130 audit(1747443893.806:267): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:04:53.846921 kernel: audit: type=1131 audit(1747443893.807:268): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:04:53.870041 systemd[1]: Reloading. May 17 01:04:53.947357 /usr/lib/systemd/system-generators/torcx-generator[2021]: time="2025-05-17T01:04:53Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 01:04:53.947785 /usr/lib/systemd/system-generators/torcx-generator[2021]: time="2025-05-17T01:04:53Z" level=info msg="torcx already run" May 17 01:04:54.054798 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 01:04:54.054823 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 01:04:54.073545 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 01:04:54.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:54.152000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:54.192778 kernel: audit: type=1400 audit(1747443894.150:269): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:54.193631 kernel: audit: type=1400 audit(1747443894.152:270): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:54.202059 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 17 01:04:54.202191 kernel: audit: type=1400 audit(1747443894.152:271): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:54.152000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:54.152000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:54.152000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:54.152000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:54.152000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:54.152000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:54.152000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:54.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:54.172000 audit: BPF prog-id=41 op=LOAD May 17 01:04:54.172000 audit: BPF prog-id=34 op=UNLOAD May 17 01:04:54.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:54.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:54.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:54.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:54.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:54.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:54.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:54.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:54.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:54.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:54.192000 audit: BPF prog-id=42 op=LOAD May 17 01:04:54.192000 audit: BPF prog-id=33 op=UNLOAD May 17 01:04:54.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:54.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:54.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:54.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:54.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:54.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:54.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:54.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:54.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:54.193000 audit: BPF prog-id=43 op=LOAD May 17 01:04:54.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:54.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:54.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:54.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:54.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:54.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:54.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:54.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:54.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:54.193000 audit: BPF prog-id=44 op=LOAD May 17 01:04:54.193000 audit: BPF prog-id=24 op=UNLOAD May 17 01:04:54.193000 audit: BPF prog-id=25 op=UNLOAD May 17 01:04:54.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:54.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:54.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:54.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:54.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:54.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:54.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:54.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:54.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:54.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:54.195000 audit: BPF prog-id=45 op=LOAD May 17 01:04:54.195000 audit: BPF prog-id=35 op=UNLOAD May 17 01:04:54.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:54.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:54.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:54.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:54.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:54.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:54.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:54.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:54.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:54.201000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:54.242503 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM May 17 01:04:54.242568 systemd[1]: kubelet.service: Failed with result 'signal'. May 17 01:04:54.242771 systemd[1]: Stopped kubelet.service. May 17 01:04:54.241000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 17 01:04:54.244662 systemd[1]: Starting kubelet.service... May 17 01:04:54.347729 systemd[1]: Started kubelet.service. May 17 01:04:54.348000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:04:54.388659 kubelet[2086]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 01:04:54.388659 kubelet[2086]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. May 17 01:04:54.388659 kubelet[2086]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 01:04:54.389097 kubelet[2086]: I0517 01:04:54.388714 2086 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 17 01:04:55.220215 kubelet[2086]: I0517 01:04:55.220160 2086 server.go:520] "Kubelet version" kubeletVersion="v1.32.4" May 17 01:04:55.220215 kubelet[2086]: I0517 01:04:55.220204 2086 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 17 01:04:55.220524 kubelet[2086]: I0517 01:04:55.220502 2086 server.go:954] "Client rotation is on, will bootstrap in background" May 17 01:04:55.241279 kubelet[2086]: E0517 01:04:55.241241 2086 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://10.200.20.11:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.200.20.11:6443: connect: connection refused" logger="UnhandledError" May 17 01:04:55.245079 kubelet[2086]: I0517 01:04:55.245052 2086 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 17 01:04:55.252335 kubelet[2086]: E0517 01:04:55.252277 2086 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 17 01:04:55.252335 kubelet[2086]: I0517 01:04:55.252321 2086 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 17 01:04:55.257451 kubelet[2086]: I0517 01:04:55.257415 2086 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 17 01:04:55.258556 kubelet[2086]: I0517 01:04:55.258510 2086 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 17 01:04:55.258879 kubelet[2086]: I0517 01:04:55.258694 2086 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510.3.7-n-56b9a5cda4","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 17 01:04:55.259060 kubelet[2086]: I0517 01:04:55.259046 2086 topology_manager.go:138] "Creating topology manager with none policy" May 17 01:04:55.259129 kubelet[2086]: I0517 01:04:55.259120 2086 container_manager_linux.go:304] "Creating device plugin manager" May 17 01:04:55.259312 kubelet[2086]: I0517 01:04:55.259299 2086 state_mem.go:36] "Initialized new in-memory state store" May 17 01:04:55.262346 kubelet[2086]: I0517 01:04:55.262322 2086 kubelet.go:446] "Attempting to sync node with API server" May 17 01:04:55.262470 kubelet[2086]: I0517 01:04:55.262457 2086 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" May 17 01:04:55.262566 kubelet[2086]: I0517 01:04:55.262554 2086 kubelet.go:352] "Adding apiserver pod source" May 17 01:04:55.262650 kubelet[2086]: I0517 01:04:55.262624 2086 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 17 01:04:55.266900 kubelet[2086]: I0517 01:04:55.266868 2086 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 17 01:04:55.267408 kubelet[2086]: I0517 01:04:55.267376 2086 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 17 01:04:55.267460 kubelet[2086]: W0517 01:04:55.267439 2086 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 17 01:04:55.268048 kubelet[2086]: I0517 01:04:55.268023 2086 watchdog_linux.go:99] "Systemd watchdog is not enabled" May 17 01:04:55.268114 kubelet[2086]: I0517 01:04:55.268064 2086 server.go:1287] "Started kubelet" May 17 01:04:55.268259 kubelet[2086]: W0517 01:04:55.268212 2086 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.200.20.11:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.7-n-56b9a5cda4&limit=500&resourceVersion=0": dial tcp 10.200.20.11:6443: connect: connection refused May 17 01:04:55.268303 kubelet[2086]: E0517 01:04:55.268273 2086 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.200.20.11:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.7-n-56b9a5cda4&limit=500&resourceVersion=0\": dial tcp 10.200.20.11:6443: connect: connection refused" logger="UnhandledError" May 17 01:04:55.277109 kubelet[2086]: W0517 01:04:55.277063 2086 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.200.20.11:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.200.20.11:6443: connect: connection refused May 17 01:04:55.277300 kubelet[2086]: E0517 01:04:55.277281 2086 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.200.20.11:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.200.20.11:6443: connect: connection refused" logger="UnhandledError" May 17 01:04:55.277000 audit[2086]: AVC avc: denied { mac_admin } for pid=2086 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:55.277000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 01:04:55.277000 audit[2086]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000adeed0 a1=400091ea50 a2=4000adeea0 a3=25 items=0 ppid=1 pid=2086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:04:55.277000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 01:04:55.277000 audit[2086]: AVC avc: denied { mac_admin } for pid=2086 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:55.277000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 01:04:55.277000 audit[2086]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=400082cfe0 a1=400091ea68 a2=4000adef60 a3=25 items=0 ppid=1 pid=2086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:04:55.277000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 01:04:55.278895 kubelet[2086]: I0517 01:04:55.278490 2086 kubelet.go:1507] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" May 17 01:04:55.278895 kubelet[2086]: I0517 01:04:55.278527 2086 kubelet.go:1511] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" May 17 01:04:55.278895 kubelet[2086]: I0517 01:04:55.278602 2086 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 17 01:04:55.280754 kubelet[2086]: I0517 01:04:55.280709 2086 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 May 17 01:04:55.281719 kubelet[2086]: I0517 01:04:55.281696 2086 server.go:479] "Adding debug handlers to kubelet server" May 17 01:04:55.282815 kubelet[2086]: I0517 01:04:55.282731 2086 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 17 01:04:55.283130 kubelet[2086]: I0517 01:04:55.283113 2086 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 17 01:04:55.283624 kubelet[2086]: I0517 01:04:55.283600 2086 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 17 01:04:55.284000 audit[2098]: NETFILTER_CFG table=mangle:29 family=2 entries=2 op=nft_register_chain pid=2098 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:04:55.284000 audit[2098]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffd382e660 a2=0 a3=1 items=0 ppid=2086 pid=2098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:04:55.284000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 17 01:04:55.285650 kubelet[2086]: E0517 01:04:55.285540 2086 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.200.20.11:6443/api/v1/namespaces/default/events\": dial tcp 10.200.20.11:6443: connect: connection refused" event="&Event{ObjectMeta:{ci-3510.3.7-n-56b9a5cda4.18402af6e26065ee default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510.3.7-n-56b9a5cda4,UID:ci-3510.3.7-n-56b9a5cda4,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510.3.7-n-56b9a5cda4,},FirstTimestamp:2025-05-17 01:04:55.268042222 +0000 UTC m=+0.915004774,LastTimestamp:2025-05-17 01:04:55.268042222 +0000 UTC m=+0.915004774,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510.3.7-n-56b9a5cda4,}" May 17 01:04:55.286709 kubelet[2086]: I0517 01:04:55.286686 2086 volume_manager.go:297] "Starting Kubelet Volume Manager" May 17 01:04:55.287013 kubelet[2086]: I0517 01:04:55.286999 2086 desired_state_of_world_populator.go:150] "Desired state populator starts to run" May 17 01:04:55.287169 kubelet[2086]: I0517 01:04:55.287158 2086 reconciler.go:26] "Reconciler: start to sync state" May 17 01:04:55.286000 audit[2099]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=2099 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:04:55.286000 audit[2099]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc564f340 a2=0 a3=1 items=0 ppid=2086 pid=2099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:04:55.286000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 17 01:04:55.287793 kubelet[2086]: W0517 01:04:55.287751 2086 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.200.20.11:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.11:6443: connect: connection refused May 17 01:04:55.287909 kubelet[2086]: E0517 01:04:55.287892 2086 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.200.20.11:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.200.20.11:6443: connect: connection refused" logger="UnhandledError" May 17 01:04:55.288182 kubelet[2086]: I0517 01:04:55.288165 2086 factory.go:221] Registration of the systemd container factory successfully May 17 01:04:55.288353 kubelet[2086]: I0517 01:04:55.288335 2086 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 17 01:04:55.288794 kubelet[2086]: E0517 01:04:55.288776 2086 kubelet.go:1555] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 17 01:04:55.288997 kubelet[2086]: E0517 01:04:55.288965 2086 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-56b9a5cda4\" not found" May 17 01:04:55.290111 kubelet[2086]: I0517 01:04:55.290096 2086 factory.go:221] Registration of the containerd container factory successfully May 17 01:04:55.290000 audit[2101]: NETFILTER_CFG table=filter:31 family=2 entries=2 op=nft_register_chain pid=2101 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:04:55.290000 audit[2101]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffda776040 a2=0 a3=1 items=0 ppid=2086 pid=2101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:04:55.290000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 01:04:55.293000 audit[2103]: NETFILTER_CFG table=filter:32 family=2 entries=2 op=nft_register_chain pid=2103 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:04:55.293000 audit[2103]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=fffff8ebdd90 a2=0 a3=1 items=0 ppid=2086 pid=2103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:04:55.293000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 01:04:55.303205 kubelet[2086]: E0517 01:04:55.303147 2086 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.11:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.7-n-56b9a5cda4?timeout=10s\": dial tcp 10.200.20.11:6443: connect: connection refused" interval="200ms" May 17 01:04:55.389166 kubelet[2086]: E0517 01:04:55.389090 2086 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-56b9a5cda4\" not found" May 17 01:04:55.398000 audit[2108]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2108 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:04:55.398000 audit[2108]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=fffff14ca2a0 a2=0 a3=1 items=0 ppid=2086 pid=2108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:04:55.398000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 17 01:04:55.400268 kubelet[2086]: I0517 01:04:55.400219 2086 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 17 01:04:55.400000 audit[2110]: NETFILTER_CFG table=mangle:34 family=10 entries=2 op=nft_register_chain pid=2110 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 01:04:55.400000 audit[2110]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=fffffe4c7c70 a2=0 a3=1 items=0 ppid=2086 pid=2110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:04:55.400000 audit[2111]: NETFILTER_CFG table=mangle:35 family=2 entries=1 op=nft_register_chain pid=2111 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:04:55.400000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 17 01:04:55.400000 audit[2111]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc886e1f0 a2=0 a3=1 items=0 ppid=2086 pid=2111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:04:55.400000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 17 01:04:55.402050 kubelet[2086]: I0517 01:04:55.402015 2086 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 17 01:04:55.402050 kubelet[2086]: I0517 01:04:55.402049 2086 status_manager.go:227] "Starting to sync pod status with apiserver" May 17 01:04:55.402152 kubelet[2086]: I0517 01:04:55.402068 2086 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." May 17 01:04:55.402152 kubelet[2086]: I0517 01:04:55.402078 2086 kubelet.go:2382] "Starting kubelet main sync loop" May 17 01:04:55.402152 kubelet[2086]: E0517 01:04:55.402124 2086 kubelet.go:2406] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 17 01:04:55.402000 audit[2113]: NETFILTER_CFG table=mangle:36 family=10 entries=1 op=nft_register_chain pid=2113 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 01:04:55.402000 audit[2113]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe582f790 a2=0 a3=1 items=0 ppid=2086 pid=2113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:04:55.402000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 17 01:04:55.404222 kubelet[2086]: W0517 01:04:55.404174 2086 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.200.20.11:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.11:6443: connect: connection refused May 17 01:04:55.404362 kubelet[2086]: E0517 01:04:55.404344 2086 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.200.20.11:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.200.20.11:6443: connect: connection refused" logger="UnhandledError" May 17 01:04:55.403000 audit[2115]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2115 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:04:55.403000 audit[2115]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffda49e6f0 a2=0 a3=1 items=0 ppid=2086 pid=2115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:04:55.403000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 17 01:04:55.404000 audit[2114]: NETFILTER_CFG table=nat:38 family=10 entries=2 op=nft_register_chain pid=2114 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 01:04:55.404000 audit[2114]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffe9ffca90 a2=0 a3=1 items=0 ppid=2086 pid=2114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:04:55.404000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 17 01:04:55.405000 audit[2117]: NETFILTER_CFG table=filter:39 family=2 entries=1 op=nft_register_chain pid=2117 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:04:55.405000 audit[2117]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe4f52570 a2=0 a3=1 items=0 ppid=2086 pid=2117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:04:55.405000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 17 01:04:55.406000 audit[2118]: NETFILTER_CFG table=filter:40 family=10 entries=2 op=nft_register_chain pid=2118 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 01:04:55.406000 audit[2118]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=fffffda60300 a2=0 a3=1 items=0 ppid=2086 pid=2118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:04:55.406000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 17 01:04:55.412758 kubelet[2086]: I0517 01:04:55.412729 2086 cpu_manager.go:221] "Starting CPU manager" policy="none" May 17 01:04:55.412758 kubelet[2086]: I0517 01:04:55.412756 2086 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" May 17 01:04:55.412863 kubelet[2086]: I0517 01:04:55.412780 2086 state_mem.go:36] "Initialized new in-memory state store" May 17 01:04:55.418313 kubelet[2086]: I0517 01:04:55.418282 2086 policy_none.go:49] "None policy: Start" May 17 01:04:55.418313 kubelet[2086]: I0517 01:04:55.418312 2086 memory_manager.go:186] "Starting memorymanager" policy="None" May 17 01:04:55.418426 kubelet[2086]: I0517 01:04:55.418325 2086 state_mem.go:35] "Initializing new in-memory state store" May 17 01:04:55.426676 systemd[1]: Created slice kubepods.slice. May 17 01:04:55.431643 systemd[1]: Created slice kubepods-burstable.slice. May 17 01:04:55.434856 systemd[1]: Created slice kubepods-besteffort.slice. May 17 01:04:55.442871 kubelet[2086]: I0517 01:04:55.442825 2086 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 17 01:04:55.441000 audit[2086]: AVC avc: denied { mac_admin } for pid=2086 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:55.441000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 01:04:55.441000 audit[2086]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000dd8db0 a1=4000cd5d70 a2=4000dd8d80 a3=25 items=0 ppid=1 pid=2086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:04:55.441000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 01:04:55.443217 kubelet[2086]: I0517 01:04:55.442905 2086 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" May 17 01:04:55.443217 kubelet[2086]: I0517 01:04:55.443068 2086 eviction_manager.go:189] "Eviction manager: starting control loop" May 17 01:04:55.443217 kubelet[2086]: I0517 01:04:55.443081 2086 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 17 01:04:55.443909 kubelet[2086]: I0517 01:04:55.443877 2086 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 17 01:04:55.445248 kubelet[2086]: E0517 01:04:55.445015 2086 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" May 17 01:04:55.445248 kubelet[2086]: E0517 01:04:55.445062 2086 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.7-n-56b9a5cda4\" not found" May 17 01:04:55.505740 kubelet[2086]: E0517 01:04:55.503865 2086 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.11:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.7-n-56b9a5cda4?timeout=10s\": dial tcp 10.200.20.11:6443: connect: connection refused" interval="400ms" May 17 01:04:55.515673 systemd[1]: Created slice kubepods-burstable-pod7c092ee12221735ba59db66dba67f65b.slice. May 17 01:04:55.533441 kubelet[2086]: E0517 01:04:55.533399 2086 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.7-n-56b9a5cda4\" not found" node="ci-3510.3.7-n-56b9a5cda4" May 17 01:04:55.535696 systemd[1]: Created slice kubepods-burstable-pod5a997ba40393328b4552305c0aee093f.slice. May 17 01:04:55.537577 kubelet[2086]: E0517 01:04:55.537549 2086 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.7-n-56b9a5cda4\" not found" node="ci-3510.3.7-n-56b9a5cda4" May 17 01:04:55.545804 kubelet[2086]: I0517 01:04:55.545769 2086 kubelet_node_status.go:75] "Attempting to register node" node="ci-3510.3.7-n-56b9a5cda4" May 17 01:04:55.546378 kubelet[2086]: E0517 01:04:55.546344 2086 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.200.20.11:6443/api/v1/nodes\": dial tcp 10.200.20.11:6443: connect: connection refused" node="ci-3510.3.7-n-56b9a5cda4" May 17 01:04:55.547790 systemd[1]: Created slice kubepods-burstable-pod183d0bddc3c6ab0d2f925a78ecd315ef.slice. May 17 01:04:55.550421 kubelet[2086]: E0517 01:04:55.550393 2086 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.7-n-56b9a5cda4\" not found" node="ci-3510.3.7-n-56b9a5cda4" May 17 01:04:55.588573 kubelet[2086]: I0517 01:04:55.588530 2086 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/7c092ee12221735ba59db66dba67f65b-ca-certs\") pod \"kube-apiserver-ci-3510.3.7-n-56b9a5cda4\" (UID: \"7c092ee12221735ba59db66dba67f65b\") " pod="kube-system/kube-apiserver-ci-3510.3.7-n-56b9a5cda4" May 17 01:04:55.588801 kubelet[2086]: I0517 01:04:55.588775 2086 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/7c092ee12221735ba59db66dba67f65b-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.7-n-56b9a5cda4\" (UID: \"7c092ee12221735ba59db66dba67f65b\") " pod="kube-system/kube-apiserver-ci-3510.3.7-n-56b9a5cda4" May 17 01:04:55.588911 kubelet[2086]: I0517 01:04:55.588895 2086 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/5a997ba40393328b4552305c0aee093f-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.7-n-56b9a5cda4\" (UID: \"5a997ba40393328b4552305c0aee093f\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-56b9a5cda4" May 17 01:04:55.589056 kubelet[2086]: I0517 01:04:55.589036 2086 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/5a997ba40393328b4552305c0aee093f-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.7-n-56b9a5cda4\" (UID: \"5a997ba40393328b4552305c0aee093f\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-56b9a5cda4" May 17 01:04:55.589160 kubelet[2086]: I0517 01:04:55.589144 2086 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/7c092ee12221735ba59db66dba67f65b-k8s-certs\") pod \"kube-apiserver-ci-3510.3.7-n-56b9a5cda4\" (UID: \"7c092ee12221735ba59db66dba67f65b\") " pod="kube-system/kube-apiserver-ci-3510.3.7-n-56b9a5cda4" May 17 01:04:55.589264 kubelet[2086]: I0517 01:04:55.589248 2086 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/5a997ba40393328b4552305c0aee093f-ca-certs\") pod \"kube-controller-manager-ci-3510.3.7-n-56b9a5cda4\" (UID: \"5a997ba40393328b4552305c0aee093f\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-56b9a5cda4" May 17 01:04:55.589378 kubelet[2086]: I0517 01:04:55.589362 2086 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/5a997ba40393328b4552305c0aee093f-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.7-n-56b9a5cda4\" (UID: \"5a997ba40393328b4552305c0aee093f\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-56b9a5cda4" May 17 01:04:55.589487 kubelet[2086]: I0517 01:04:55.589470 2086 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/5a997ba40393328b4552305c0aee093f-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.7-n-56b9a5cda4\" (UID: \"5a997ba40393328b4552305c0aee093f\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-56b9a5cda4" May 17 01:04:55.589588 kubelet[2086]: I0517 01:04:55.589570 2086 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/183d0bddc3c6ab0d2f925a78ecd315ef-kubeconfig\") pod \"kube-scheduler-ci-3510.3.7-n-56b9a5cda4\" (UID: \"183d0bddc3c6ab0d2f925a78ecd315ef\") " pod="kube-system/kube-scheduler-ci-3510.3.7-n-56b9a5cda4" May 17 01:04:55.748779 kubelet[2086]: I0517 01:04:55.748741 2086 kubelet_node_status.go:75] "Attempting to register node" node="ci-3510.3.7-n-56b9a5cda4" May 17 01:04:55.749210 kubelet[2086]: E0517 01:04:55.749178 2086 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.200.20.11:6443/api/v1/nodes\": dial tcp 10.200.20.11:6443: connect: connection refused" node="ci-3510.3.7-n-56b9a5cda4" May 17 01:04:55.835483 env[1453]: time="2025-05-17T01:04:55.834821836Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.7-n-56b9a5cda4,Uid:7c092ee12221735ba59db66dba67f65b,Namespace:kube-system,Attempt:0,}" May 17 01:04:55.839573 env[1453]: time="2025-05-17T01:04:55.839528950Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.7-n-56b9a5cda4,Uid:5a997ba40393328b4552305c0aee093f,Namespace:kube-system,Attempt:0,}" May 17 01:04:55.852033 env[1453]: time="2025-05-17T01:04:55.851986464Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.7-n-56b9a5cda4,Uid:183d0bddc3c6ab0d2f925a78ecd315ef,Namespace:kube-system,Attempt:0,}" May 17 01:04:55.904416 kubelet[2086]: E0517 01:04:55.904371 2086 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.11:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.7-n-56b9a5cda4?timeout=10s\": dial tcp 10.200.20.11:6443: connect: connection refused" interval="800ms" May 17 01:04:56.151682 kubelet[2086]: I0517 01:04:56.151040 2086 kubelet_node_status.go:75] "Attempting to register node" node="ci-3510.3.7-n-56b9a5cda4" May 17 01:04:56.151682 kubelet[2086]: E0517 01:04:56.151412 2086 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.200.20.11:6443/api/v1/nodes\": dial tcp 10.200.20.11:6443: connect: connection refused" node="ci-3510.3.7-n-56b9a5cda4" May 17 01:04:56.572351 kubelet[2086]: W0517 01:04:56.572290 2086 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.200.20.11:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.7-n-56b9a5cda4&limit=500&resourceVersion=0": dial tcp 10.200.20.11:6443: connect: connection refused May 17 01:04:56.572678 kubelet[2086]: E0517 01:04:56.572372 2086 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.200.20.11:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.7-n-56b9a5cda4&limit=500&resourceVersion=0\": dial tcp 10.200.20.11:6443: connect: connection refused" logger="UnhandledError" May 17 01:04:56.582841 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount174362029.mount: Deactivated successfully. May 17 01:04:56.615911 env[1453]: time="2025-05-17T01:04:56.615860710Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:04:56.629876 env[1453]: time="2025-05-17T01:04:56.629818310Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:04:56.634301 env[1453]: time="2025-05-17T01:04:56.634235568Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:04:56.638077 env[1453]: time="2025-05-17T01:04:56.638027920Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:04:56.649876 env[1453]: time="2025-05-17T01:04:56.649834394Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:04:56.654435 env[1453]: time="2025-05-17T01:04:56.654393977Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:04:56.658017 env[1453]: time="2025-05-17T01:04:56.657979801Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:04:56.663135 env[1453]: time="2025-05-17T01:04:56.663093207Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:04:56.665522 env[1453]: time="2025-05-17T01:04:56.665486543Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:04:56.672046 env[1453]: time="2025-05-17T01:04:56.672004925Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:04:56.679656 env[1453]: time="2025-05-17T01:04:56.679610870Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:04:56.684654 env[1453]: time="2025-05-17T01:04:56.684605511Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:04:56.705129 kubelet[2086]: E0517 01:04:56.705080 2086 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.11:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.7-n-56b9a5cda4?timeout=10s\": dial tcp 10.200.20.11:6443: connect: connection refused" interval="1.6s" May 17 01:04:56.730301 env[1453]: time="2025-05-17T01:04:56.730225823Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 01:04:56.730301 env[1453]: time="2025-05-17T01:04:56.730270985Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 01:04:56.730663 env[1453]: time="2025-05-17T01:04:56.730281786Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 01:04:56.730663 env[1453]: time="2025-05-17T01:04:56.730570677Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ff25ff9fc6d885e77a38109ccb57a64ae36ef447cfd4e1be990ce0dd15fe9222 pid=2126 runtime=io.containerd.runc.v2 May 17 01:04:56.751847 systemd[1]: Started cri-containerd-ff25ff9fc6d885e77a38109ccb57a64ae36ef447cfd4e1be990ce0dd15fe9222.scope. May 17 01:04:56.770968 kernel: kauditd_printk_skb: 426 callbacks suppressed May 17 01:04:56.771090 kernel: audit: type=1400 audit(1747443896.763:354): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.763000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.763000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.789111 kernel: audit: type=1400 audit(1747443896.763:355): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.830569 kernel: audit: type=1400 audit(1747443896.763:356): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.763000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.832061 kubelet[2086]: W0517 01:04:56.831928 2086 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.200.20.11:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.11:6443: connect: connection refused May 17 01:04:56.832061 kubelet[2086]: E0517 01:04:56.832029 2086 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.200.20.11:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.200.20.11:6443: connect: connection refused" logger="UnhandledError" May 17 01:04:56.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.855061 env[1453]: time="2025-05-17T01:04:56.841134398Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 01:04:56.855061 env[1453]: time="2025-05-17T01:04:56.841258963Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 01:04:56.855061 env[1453]: time="2025-05-17T01:04:56.841287404Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 01:04:56.855061 env[1453]: time="2025-05-17T01:04:56.841499213Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/dad58f283f55982cb97e290157ba0f8567015f792b324b33e6ccb74238fb2149 pid=2164 runtime=io.containerd.runc.v2 May 17 01:04:56.855451 kubelet[2086]: W0517 01:04:56.849629 2086 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.200.20.11:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.200.20.11:6443: connect: connection refused May 17 01:04:56.855451 kubelet[2086]: E0517 01:04:56.849694 2086 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.200.20.11:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.200.20.11:6443: connect: connection refused" logger="UnhandledError" May 17 01:04:56.874791 kernel: audit: type=1400 audit(1747443896.763:357): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.874897 kernel: audit: type=1400 audit(1747443896.763:358): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.893375 kernel: audit: type=1400 audit(1747443896.763:359): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.893470 env[1453]: time="2025-05-17T01:04:56.878056521Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 01:04:56.893470 env[1453]: time="2025-05-17T01:04:56.878161406Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 01:04:56.893470 env[1453]: time="2025-05-17T01:04:56.878189047Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 01:04:56.893470 env[1453]: time="2025-05-17T01:04:56.878363214Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a1f584d9d07125d35ff0fdf2ecf95b61762918c2c1d945086074519a3406f24f pid=2177 runtime=io.containerd.runc.v2 May 17 01:04:56.896195 env[1453]: time="2025-05-17T01:04:56.896021523Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.7-n-56b9a5cda4,Uid:7c092ee12221735ba59db66dba67f65b,Namespace:kube-system,Attempt:0,} returns sandbox id \"ff25ff9fc6d885e77a38109ccb57a64ae36ef447cfd4e1be990ce0dd15fe9222\"" May 17 01:04:56.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.916715 kernel: audit: type=1400 audit(1747443896.763:360): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.917135 env[1453]: time="2025-05-17T01:04:56.899505823Z" level=info msg="CreateContainer within sandbox \"ff25ff9fc6d885e77a38109ccb57a64ae36ef447cfd4e1be990ce0dd15fe9222\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" May 17 01:04:56.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.937133 kernel: audit: type=1400 audit(1747443896.763:361): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.937346 systemd[1]: Started cri-containerd-a1f584d9d07125d35ff0fdf2ecf95b61762918c2c1d945086074519a3406f24f.scope. May 17 01:04:56.938360 systemd[1]: Started cri-containerd-dad58f283f55982cb97e290157ba0f8567015f792b324b33e6ccb74238fb2149.scope. May 17 01:04:56.763000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.960025 kernel: audit: type=1400 audit(1747443896.763:362): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.960594 kubelet[2086]: W0517 01:04:56.960514 2086 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.200.20.11:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.11:6443: connect: connection refused May 17 01:04:56.960692 kubelet[2086]: E0517 01:04:56.960604 2086 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.200.20.11:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.200.20.11:6443: connect: connection refused" logger="UnhandledError" May 17 01:04:56.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.974200 env[1453]: time="2025-05-17T01:04:56.974144221Z" level=info msg="CreateContainer within sandbox \"ff25ff9fc6d885e77a38109ccb57a64ae36ef447cfd4e1be990ce0dd15fe9222\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"8ee42226f60b38020b7c5ecc16278b7ddc0ea10ef25c976ec5507e83a79751af\"" May 17 01:04:56.979848 kernel: audit: type=1400 audit(1747443896.768:363): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.980379 env[1453]: time="2025-05-17T01:04:56.980335710Z" level=info msg="StartContainer for \"8ee42226f60b38020b7c5ecc16278b7ddc0ea10ef25c976ec5507e83a79751af\"" May 17 01:04:56.980986 kubelet[2086]: I0517 01:04:56.980787 2086 kubelet_node_status.go:75] "Attempting to register node" node="ci-3510.3.7-n-56b9a5cda4" May 17 01:04:56.981362 kubelet[2086]: E0517 01:04:56.981327 2086 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.200.20.11:6443/api/v1/nodes\": dial tcp 10.200.20.11:6443: connect: connection refused" node="ci-3510.3.7-n-56b9a5cda4" May 17 01:04:56.768000 audit: BPF prog-id=56 op=LOAD May 17 01:04:56.788000 audit[2136]: AVC avc: denied { bpf } for pid=2136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.788000 audit[2136]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2126 pid=2136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:04:56.788000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666323566663966633664383835653737613338313039636362353761 May 17 01:04:56.788000 audit[2136]: AVC avc: denied { perfmon } for pid=2136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.788000 audit[2136]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2126 pid=2136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:04:56.788000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666323566663966633664383835653737613338313039636362353761 May 17 01:04:56.788000 audit[2136]: AVC avc: denied { bpf } for pid=2136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.788000 audit[2136]: AVC avc: denied { bpf } for pid=2136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.788000 audit[2136]: AVC avc: denied { bpf } for pid=2136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.788000 audit[2136]: AVC avc: denied { perfmon } for pid=2136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.788000 audit[2136]: AVC avc: denied { perfmon } for pid=2136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.788000 audit[2136]: AVC avc: denied { perfmon } for pid=2136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.788000 audit[2136]: AVC avc: denied { perfmon } for pid=2136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.788000 audit[2136]: AVC avc: denied { perfmon } for pid=2136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.788000 audit[2136]: AVC avc: denied { bpf } for pid=2136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.788000 audit[2136]: AVC avc: denied { bpf } for pid=2136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.788000 audit: BPF prog-id=57 op=LOAD May 17 01:04:56.788000 audit[2136]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2126 pid=2136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:04:56.788000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666323566663966633664383835653737613338313039636362353761 May 17 01:04:56.806000 audit[2136]: AVC avc: denied { bpf } for pid=2136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.806000 audit[2136]: AVC avc: denied { bpf } for pid=2136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.806000 audit[2136]: AVC avc: denied { perfmon } for pid=2136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.806000 audit[2136]: AVC avc: denied { perfmon } for pid=2136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.806000 audit[2136]: AVC avc: denied { perfmon } for pid=2136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.806000 audit[2136]: AVC avc: denied { perfmon } for pid=2136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.806000 audit[2136]: AVC avc: denied { perfmon } for pid=2136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.806000 audit[2136]: AVC avc: denied { bpf } for pid=2136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.806000 audit[2136]: AVC avc: denied { bpf } for pid=2136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.806000 audit: BPF prog-id=58 op=LOAD May 17 01:04:56.806000 audit[2136]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2126 pid=2136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:04:56.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666323566663966633664383835653737613338313039636362353761 May 17 01:04:56.806000 audit: BPF prog-id=58 op=UNLOAD May 17 01:04:56.806000 audit: BPF prog-id=57 op=UNLOAD May 17 01:04:56.807000 audit[2136]: AVC avc: denied { bpf } for pid=2136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.807000 audit[2136]: AVC avc: denied { bpf } for pid=2136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.807000 audit[2136]: AVC avc: denied { bpf } for pid=2136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.807000 audit[2136]: AVC avc: denied { perfmon } for pid=2136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.807000 audit[2136]: AVC avc: denied { perfmon } for pid=2136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.807000 audit[2136]: AVC avc: denied { perfmon } for pid=2136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.807000 audit[2136]: AVC avc: denied { perfmon } for pid=2136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.807000 audit[2136]: AVC avc: denied { perfmon } for pid=2136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.807000 audit[2136]: AVC avc: denied { bpf } for pid=2136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.807000 audit[2136]: AVC avc: denied { bpf } for pid=2136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.807000 audit: BPF prog-id=59 op=LOAD May 17 01:04:56.807000 audit[2136]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2126 pid=2136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:04:56.807000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666323566663966633664383835653737613338313039636362353761 May 17 01:04:56.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.959000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.959000 audit: BPF prog-id=60 op=LOAD May 17 01:04:56.960000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.960000 audit[2178]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2164 pid=2178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:04:56.960000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461643538663238336635353938326362393765323930313537626130 May 17 01:04:56.982000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.982000 audit[2178]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2164 pid=2178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:04:56.982000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461643538663238336635353938326362393765323930313537626130 May 17 01:04:56.986000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.986000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.986000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.986000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.986000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.986000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.986000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.986000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.986000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.986000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.986000 audit: BPF prog-id=61 op=LOAD May 17 01:04:56.986000 audit[2178]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2164 pid=2178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:04:56.986000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461643538663238336635353938326362393765323930313537626130 May 17 01:04:56.986000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.986000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.986000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.986000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.986000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.986000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.986000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.986000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.986000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.986000 audit: BPF prog-id=62 op=LOAD May 17 01:04:56.986000 audit[2178]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2164 pid=2178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:04:56.986000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461643538663238336635353938326362393765323930313537626130 May 17 01:04:56.986000 audit: BPF prog-id=62 op=UNLOAD May 17 01:04:56.986000 audit: BPF prog-id=61 op=UNLOAD May 17 01:04:56.986000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.986000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.986000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.986000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.986000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.986000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.986000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.986000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.986000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.986000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.986000 audit: BPF prog-id=63 op=LOAD May 17 01:04:56.986000 audit[2178]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2164 pid=2178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:04:56.986000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461643538663238336635353938326362393765323930313537626130 May 17 01:04:56.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.998000 audit: BPF prog-id=64 op=LOAD May 17 01:04:56.998000 audit[2195]: AVC avc: denied { bpf } for pid=2195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.998000 audit[2195]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2177 pid=2195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:04:56.998000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131663538346439643037313235643335666630666466326563663935 May 17 01:04:56.998000 audit[2195]: AVC avc: denied { perfmon } for pid=2195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.998000 audit[2195]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2177 pid=2195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:04:56.998000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131663538346439643037313235643335666630666466326563663935 May 17 01:04:56.999000 audit[2195]: AVC avc: denied { bpf } for pid=2195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.999000 audit[2195]: AVC avc: denied { bpf } for pid=2195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.999000 audit[2195]: AVC avc: denied { bpf } for pid=2195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.999000 audit[2195]: AVC avc: denied { perfmon } for pid=2195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.999000 audit[2195]: AVC avc: denied { perfmon } for pid=2195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.999000 audit[2195]: AVC avc: denied { perfmon } for pid=2195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.999000 audit[2195]: AVC avc: denied { perfmon } for pid=2195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.999000 audit[2195]: AVC avc: denied { perfmon } for pid=2195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.999000 audit[2195]: AVC avc: denied { bpf } for pid=2195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.999000 audit[2195]: AVC avc: denied { bpf } for pid=2195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.999000 audit: BPF prog-id=65 op=LOAD May 17 01:04:56.999000 audit[2195]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2177 pid=2195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:04:56.999000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131663538346439643037313235643335666630666466326563663935 May 17 01:04:56.999000 audit[2195]: AVC avc: denied { bpf } for pid=2195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.999000 audit[2195]: AVC avc: denied { bpf } for pid=2195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.999000 audit[2195]: AVC avc: denied { perfmon } for pid=2195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.999000 audit[2195]: AVC avc: denied { perfmon } for pid=2195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.999000 audit[2195]: AVC avc: denied { perfmon } for pid=2195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.999000 audit[2195]: AVC avc: denied { perfmon } for pid=2195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.999000 audit[2195]: AVC avc: denied { perfmon } for pid=2195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.999000 audit[2195]: AVC avc: denied { bpf } for pid=2195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.999000 audit[2195]: AVC avc: denied { bpf } for pid=2195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.999000 audit: BPF prog-id=66 op=LOAD May 17 01:04:56.999000 audit[2195]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2177 pid=2195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:04:56.999000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131663538346439643037313235643335666630666466326563663935 May 17 01:04:56.999000 audit: BPF prog-id=66 op=UNLOAD May 17 01:04:56.999000 audit: BPF prog-id=65 op=UNLOAD May 17 01:04:56.999000 audit[2195]: AVC avc: denied { bpf } for pid=2195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.999000 audit[2195]: AVC avc: denied { bpf } for pid=2195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.999000 audit[2195]: AVC avc: denied { bpf } for pid=2195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.999000 audit[2195]: AVC avc: denied { perfmon } for pid=2195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.999000 audit[2195]: AVC avc: denied { perfmon } for pid=2195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.999000 audit[2195]: AVC avc: denied { perfmon } for pid=2195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.999000 audit[2195]: AVC avc: denied { perfmon } for pid=2195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.999000 audit[2195]: AVC avc: denied { perfmon } for pid=2195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.999000 audit[2195]: AVC avc: denied { bpf } for pid=2195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.999000 audit[2195]: AVC avc: denied { bpf } for pid=2195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:56.999000 audit: BPF prog-id=67 op=LOAD May 17 01:04:56.999000 audit[2195]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2177 pid=2195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:04:56.999000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131663538346439643037313235643335666630666466326563663935 May 17 01:04:57.006651 systemd[1]: Started cri-containerd-8ee42226f60b38020b7c5ecc16278b7ddc0ea10ef25c976ec5507e83a79751af.scope. May 17 01:04:57.033349 env[1453]: time="2025-05-17T01:04:57.033298644Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.7-n-56b9a5cda4,Uid:183d0bddc3c6ab0d2f925a78ecd315ef,Namespace:kube-system,Attempt:0,} returns sandbox id \"dad58f283f55982cb97e290157ba0f8567015f792b324b33e6ccb74238fb2149\"" May 17 01:04:57.034966 env[1453]: time="2025-05-17T01:04:57.034904306Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.7-n-56b9a5cda4,Uid:5a997ba40393328b4552305c0aee093f,Namespace:kube-system,Attempt:0,} returns sandbox id \"a1f584d9d07125d35ff0fdf2ecf95b61762918c2c1d945086074519a3406f24f\"" May 17 01:04:57.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.035000 audit: BPF prog-id=68 op=LOAD May 17 01:04:57.036000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.036000 audit[2232]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2126 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:04:57.036000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865653432323236663630623338303230623763356563633136323738 May 17 01:04:57.036000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.036000 audit[2232]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2126 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:04:57.036000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865653432323236663630623338303230623763356563633136323738 May 17 01:04:57.036000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.036000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.036000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.036000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.036000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.036000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.036000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.036000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.036000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.036000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.036000 audit: BPF prog-id=69 op=LOAD May 17 01:04:57.036000 audit[2232]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2126 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:04:57.036000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865653432323236663630623338303230623763356563633136323738 May 17 01:04:57.036000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.036000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.036000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.036000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.036000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.036000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.036000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.036000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.036000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.036000 audit: BPF prog-id=70 op=LOAD May 17 01:04:57.036000 audit[2232]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2126 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:04:57.036000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865653432323236663630623338303230623763356563633136323738 May 17 01:04:57.038000 audit: BPF prog-id=70 op=UNLOAD May 17 01:04:57.038000 audit: BPF prog-id=69 op=UNLOAD May 17 01:04:57.038000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.038000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.038000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.038000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.038000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.038000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.038000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.038000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.038000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.038000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.038000 audit: BPF prog-id=71 op=LOAD May 17 01:04:57.038000 audit[2232]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2126 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:04:57.038000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865653432323236663630623338303230623763356563633136323738 May 17 01:04:57.041762 env[1453]: time="2025-05-17T01:04:57.041707573Z" level=info msg="CreateContainer within sandbox \"dad58f283f55982cb97e290157ba0f8567015f792b324b33e6ccb74238fb2149\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" May 17 01:04:57.045120 env[1453]: time="2025-05-17T01:04:57.042903059Z" level=info msg="CreateContainer within sandbox \"a1f584d9d07125d35ff0fdf2ecf95b61762918c2c1d945086074519a3406f24f\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" May 17 01:04:57.074016 env[1453]: time="2025-05-17T01:04:57.073916953Z" level=info msg="StartContainer for \"8ee42226f60b38020b7c5ecc16278b7ddc0ea10ef25c976ec5507e83a79751af\" returns successfully" May 17 01:04:57.098644 env[1453]: time="2025-05-17T01:04:57.094771849Z" level=info msg="CreateContainer within sandbox \"a1f584d9d07125d35ff0fdf2ecf95b61762918c2c1d945086074519a3406f24f\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"f74c3a1e02f7545a29aacd4ae1bbcd37cbcef0941e92c59cfe24c117aa4283d4\"" May 17 01:04:57.100592 env[1453]: time="2025-05-17T01:04:57.100553115Z" level=info msg="StartContainer for \"f74c3a1e02f7545a29aacd4ae1bbcd37cbcef0941e92c59cfe24c117aa4283d4\"" May 17 01:04:57.123432 env[1453]: time="2025-05-17T01:04:57.123378128Z" level=info msg="CreateContainer within sandbox \"dad58f283f55982cb97e290157ba0f8567015f792b324b33e6ccb74238fb2149\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"c5e1a9fb5a9e3c807fa9a16771e039c2aa44d4f4a28c107e17daab588642afd1\"" May 17 01:04:57.124333 env[1453]: time="2025-05-17T01:04:57.124297244Z" level=info msg="StartContainer for \"c5e1a9fb5a9e3c807fa9a16771e039c2aa44d4f4a28c107e17daab588642afd1\"" May 17 01:04:57.135141 systemd[1]: Started cri-containerd-f74c3a1e02f7545a29aacd4ae1bbcd37cbcef0941e92c59cfe24c117aa4283d4.scope. May 17 01:04:57.151543 systemd[1]: Started cri-containerd-c5e1a9fb5a9e3c807fa9a16771e039c2aa44d4f4a28c107e17daab588642afd1.scope. May 17 01:04:57.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.162000 audit: BPF prog-id=72 op=LOAD May 17 01:04:57.162000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.162000 audit[2287]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2177 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:04:57.162000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637346333613165303266373534356132396161636434616531626263 May 17 01:04:57.162000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.162000 audit[2287]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2177 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:04:57.162000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637346333613165303266373534356132396161636434616531626263 May 17 01:04:57.162000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.162000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.162000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.162000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.162000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.162000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.162000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.162000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.162000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.162000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.162000 audit: BPF prog-id=73 op=LOAD May 17 01:04:57.162000 audit[2287]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2177 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:04:57.162000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637346333613165303266373534356132396161636434616531626263 May 17 01:04:57.163000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.163000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.163000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.163000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.163000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.163000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.163000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.163000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.163000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.163000 audit: BPF prog-id=74 op=LOAD May 17 01:04:57.163000 audit[2287]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2177 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:04:57.163000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637346333613165303266373534356132396161636434616531626263 May 17 01:04:57.163000 audit: BPF prog-id=74 op=UNLOAD May 17 01:04:57.163000 audit: BPF prog-id=73 op=UNLOAD May 17 01:04:57.163000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.163000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.163000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.163000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.163000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.163000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.163000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.163000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.163000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.163000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.163000 audit: BPF prog-id=75 op=LOAD May 17 01:04:57.163000 audit[2287]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2177 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:04:57.163000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637346333613165303266373534356132396161636434616531626263 May 17 01:04:57.167000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.167000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.167000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.167000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.167000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.167000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.167000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.167000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.167000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.167000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.167000 audit: BPF prog-id=76 op=LOAD May 17 01:04:57.168000 audit[2303]: AVC avc: denied { bpf } for pid=2303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.168000 audit[2303]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2164 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:04:57.168000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335653161396662356139653363383037666139613136373731653033 May 17 01:04:57.168000 audit[2303]: AVC avc: denied { perfmon } for pid=2303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.168000 audit[2303]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2164 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:04:57.168000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335653161396662356139653363383037666139613136373731653033 May 17 01:04:57.168000 audit[2303]: AVC avc: denied { bpf } for pid=2303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.168000 audit[2303]: AVC avc: denied { bpf } for pid=2303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.168000 audit[2303]: AVC avc: denied { bpf } for pid=2303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.168000 audit[2303]: AVC avc: denied { perfmon } for pid=2303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.168000 audit[2303]: AVC avc: denied { perfmon } for pid=2303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.168000 audit[2303]: AVC avc: denied { perfmon } for pid=2303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.168000 audit[2303]: AVC avc: denied { perfmon } for pid=2303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.168000 audit[2303]: AVC avc: denied { perfmon } for pid=2303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.168000 audit[2303]: AVC avc: denied { bpf } for pid=2303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.168000 audit[2303]: AVC avc: denied { bpf } for pid=2303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.168000 audit: BPF prog-id=77 op=LOAD May 17 01:04:57.168000 audit[2303]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2164 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:04:57.168000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335653161396662356139653363383037666139613136373731653033 May 17 01:04:57.168000 audit[2303]: AVC avc: denied { bpf } for pid=2303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.168000 audit[2303]: AVC avc: denied { bpf } for pid=2303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.168000 audit[2303]: AVC avc: denied { perfmon } for pid=2303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.168000 audit[2303]: AVC avc: denied { perfmon } for pid=2303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.168000 audit[2303]: AVC avc: denied { perfmon } for pid=2303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.168000 audit[2303]: AVC avc: denied { perfmon } for pid=2303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.168000 audit[2303]: AVC avc: denied { perfmon } for pid=2303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.168000 audit[2303]: AVC avc: denied { bpf } for pid=2303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.168000 audit[2303]: AVC avc: denied { bpf } for pid=2303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.168000 audit: BPF prog-id=78 op=LOAD May 17 01:04:57.168000 audit[2303]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2164 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:04:57.168000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335653161396662356139653363383037666139613136373731653033 May 17 01:04:57.168000 audit: BPF prog-id=78 op=UNLOAD May 17 01:04:57.168000 audit: BPF prog-id=77 op=UNLOAD May 17 01:04:57.168000 audit[2303]: AVC avc: denied { bpf } for pid=2303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.168000 audit[2303]: AVC avc: denied { bpf } for pid=2303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.168000 audit[2303]: AVC avc: denied { bpf } for pid=2303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.168000 audit[2303]: AVC avc: denied { perfmon } for pid=2303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.168000 audit[2303]: AVC avc: denied { perfmon } for pid=2303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.168000 audit[2303]: AVC avc: denied { perfmon } for pid=2303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.168000 audit[2303]: AVC avc: denied { perfmon } for pid=2303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.168000 audit[2303]: AVC avc: denied { perfmon } for pid=2303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.168000 audit[2303]: AVC avc: denied { bpf } for pid=2303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.168000 audit[2303]: AVC avc: denied { bpf } for pid=2303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:04:57.168000 audit: BPF prog-id=79 op=LOAD May 17 01:04:57.168000 audit[2303]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2164 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:04:57.168000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335653161396662356139653363383037666139613136373731653033 May 17 01:04:57.194416 env[1453]: time="2025-05-17T01:04:57.194343865Z" level=info msg="StartContainer for \"c5e1a9fb5a9e3c807fa9a16771e039c2aa44d4f4a28c107e17daab588642afd1\" returns successfully" May 17 01:04:57.206416 env[1453]: time="2025-05-17T01:04:57.206363615Z" level=info msg="StartContainer for \"f74c3a1e02f7545a29aacd4ae1bbcd37cbcef0941e92c59cfe24c117aa4283d4\" returns successfully" May 17 01:04:57.414045 kubelet[2086]: E0517 01:04:57.413928 2086 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.7-n-56b9a5cda4\" not found" node="ci-3510.3.7-n-56b9a5cda4" May 17 01:04:57.419035 kubelet[2086]: E0517 01:04:57.418998 2086 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.7-n-56b9a5cda4\" not found" node="ci-3510.3.7-n-56b9a5cda4" May 17 01:04:57.420242 kubelet[2086]: E0517 01:04:57.420218 2086 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.7-n-56b9a5cda4\" not found" node="ci-3510.3.7-n-56b9a5cda4" May 17 01:04:57.584289 systemd[1]: run-containerd-runc-k8s.io-ff25ff9fc6d885e77a38109ccb57a64ae36ef447cfd4e1be990ce0dd15fe9222-runc.3JhGDV.mount: Deactivated successfully. May 17 01:04:58.421850 kubelet[2086]: E0517 01:04:58.421817 2086 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.7-n-56b9a5cda4\" not found" node="ci-3510.3.7-n-56b9a5cda4" May 17 01:04:58.422647 kubelet[2086]: E0517 01:04:58.422627 2086 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.7-n-56b9a5cda4\" not found" node="ci-3510.3.7-n-56b9a5cda4" May 17 01:04:58.583823 kubelet[2086]: I0517 01:04:58.583795 2086 kubelet_node_status.go:75] "Attempting to register node" node="ci-3510.3.7-n-56b9a5cda4" May 17 01:04:58.980000 audit[2310]: AVC avc: denied { watch } for pid=2310 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c618,c658 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:04:58.980000 audit[2310]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000bb6c30 a2=fc6 a3=0 items=0 ppid=2177 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c618,c658 key=(null) May 17 01:04:58.980000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 01:04:58.981000 audit[2310]: AVC avc: denied { watch } for pid=2310 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c618,c658 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:04:58.981000 audit[2310]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=40003d7180 a2=fc6 a3=0 items=0 ppid=2177 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c618,c658 key=(null) May 17 01:04:58.981000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 01:04:59.458000 audit[2252]: AVC avc: denied { watch } for pid=2252 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c429,c763 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:04:59.458000 audit[2252]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=3f a1=4003f24b70 a2=fc6 a3=0 items=0 ppid=2126 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c429,c763 key=(null) May 17 01:04:59.458000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 01:04:59.458000 audit[2252]: AVC avc: denied { watch } for pid=2252 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c429,c763 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:04:59.458000 audit[2252]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=3f a1=400903d020 a2=fc6 a3=0 items=0 ppid=2126 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c429,c763 key=(null) May 17 01:04:59.458000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 01:04:59.459000 audit[2252]: AVC avc: denied { watch } for pid=2252 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c429,c763 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:04:59.459000 audit[2252]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=3f a1=4003f24d80 a2=fc6 a3=0 items=0 ppid=2126 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c429,c763 key=(null) May 17 01:04:59.459000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 01:04:59.467000 audit[2252]: AVC avc: denied { watch } for pid=2252 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520987 scontext=system_u:system_r:svirt_lxc_net_t:s0:c429,c763 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:04:59.467000 audit[2252]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=40046edb00 a2=fc6 a3=0 items=0 ppid=2126 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c429,c763 key=(null) May 17 01:04:59.467000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 01:04:59.485000 audit[2252]: AVC avc: denied { watch } for pid=2252 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c429,c763 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:04:59.485000 audit[2252]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=67 a1=4007290e60 a2=fc6 a3=0 items=0 ppid=2126 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c429,c763 key=(null) May 17 01:04:59.485000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 01:04:59.485000 audit[2252]: AVC avc: denied { watch } for pid=2252 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c429,c763 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:04:59.485000 audit[2252]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=67 a1=40070e2a50 a2=fc6 a3=0 items=0 ppid=2126 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c429,c763 key=(null) May 17 01:04:59.485000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 01:04:59.662998 kubelet[2086]: E0517 01:04:59.662884 2086 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510.3.7-n-56b9a5cda4\" not found" node="ci-3510.3.7-n-56b9a5cda4" May 17 01:04:59.786763 kubelet[2086]: I0517 01:04:59.786651 2086 kubelet_node_status.go:78] "Successfully registered node" node="ci-3510.3.7-n-56b9a5cda4" May 17 01:04:59.786763 kubelet[2086]: E0517 01:04:59.786704 2086 kubelet_node_status.go:548] "Error updating node status, will retry" err="error getting node \"ci-3510.3.7-n-56b9a5cda4\": node \"ci-3510.3.7-n-56b9a5cda4\" not found" May 17 01:04:59.791355 kubelet[2086]: I0517 01:04:59.791310 2086 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-ci-3510.3.7-n-56b9a5cda4" May 17 01:04:59.836138 kubelet[2086]: E0517 01:04:59.836089 2086 kubelet.go:3196] "Failed creating a mirror pod" err="pods \"kube-controller-manager-ci-3510.3.7-n-56b9a5cda4\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-controller-manager-ci-3510.3.7-n-56b9a5cda4" May 17 01:04:59.836138 kubelet[2086]: I0517 01:04:59.836123 2086 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-ci-3510.3.7-n-56b9a5cda4" May 17 01:04:59.837994 kubelet[2086]: E0517 01:04:59.837947 2086 kubelet.go:3196] "Failed creating a mirror pod" err="pods \"kube-scheduler-ci-3510.3.7-n-56b9a5cda4\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-scheduler-ci-3510.3.7-n-56b9a5cda4" May 17 01:04:59.837994 kubelet[2086]: I0517 01:04:59.837983 2086 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-ci-3510.3.7-n-56b9a5cda4" May 17 01:04:59.840759 kubelet[2086]: E0517 01:04:59.840712 2086 kubelet.go:3196] "Failed creating a mirror pod" err="pods \"kube-apiserver-ci-3510.3.7-n-56b9a5cda4\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-apiserver-ci-3510.3.7-n-56b9a5cda4" May 17 01:04:59.863986 kubelet[2086]: I0517 01:04:59.863923 2086 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-ci-3510.3.7-n-56b9a5cda4" May 17 01:04:59.866169 kubelet[2086]: E0517 01:04:59.866134 2086 kubelet.go:3196] "Failed creating a mirror pod" err="pods \"kube-apiserver-ci-3510.3.7-n-56b9a5cda4\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-apiserver-ci-3510.3.7-n-56b9a5cda4" May 17 01:05:00.277948 kubelet[2086]: I0517 01:05:00.277899 2086 apiserver.go:52] "Watching apiserver" May 17 01:05:00.287378 kubelet[2086]: I0517 01:05:00.287352 2086 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" May 17 01:05:00.876697 kubelet[2086]: I0517 01:05:00.876664 2086 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-ci-3510.3.7-n-56b9a5cda4" May 17 01:05:00.883785 kubelet[2086]: W0517 01:05:00.883751 2086 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 17 01:05:02.412662 systemd[1]: Reloading. May 17 01:05:02.477193 /usr/lib/systemd/system-generators/torcx-generator[2374]: time="2025-05-17T01:05:02Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 01:05:02.477630 /usr/lib/systemd/system-generators/torcx-generator[2374]: time="2025-05-17T01:05:02Z" level=info msg="torcx already run" May 17 01:05:02.581137 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 01:05:02.581163 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 01:05:02.597130 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 01:05:02.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.698524 kernel: kauditd_printk_skb: 356 callbacks suppressed May 17 01:05:02.698663 kernel: audit: type=1400 audit(1747443902.674:470): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.734234 kernel: audit: type=1400 audit(1747443902.680:471): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.734337 kernel: audit: type=1400 audit(1747443902.680:472): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.752418 kernel: audit: type=1400 audit(1747443902.680:473): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.753039 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 17 01:05:02.775331 kernel: audit: type=1400 audit(1747443902.680:474): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.775446 kernel: audit: audit_lost=105 audit_rate_limit=0 audit_backlog_limit=64 May 17 01:05:02.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.799232 kernel: audit: type=1400 audit(1747443902.680:475): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.799330 kernel: audit: backlog limit exceeded May 17 01:05:02.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.821512 kernel: audit: type=1400 audit(1747443902.680:476): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.680000 audit: BPF prog-id=80 op=LOAD May 17 01:05:02.680000 audit: BPF prog-id=60 op=UNLOAD May 17 01:05:02.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.697000 audit: BPF prog-id=81 op=LOAD May 17 01:05:02.697000 audit: BPF prog-id=41 op=UNLOAD May 17 01:05:02.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.716000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.716000 audit: BPF prog-id=82 op=LOAD May 17 01:05:02.716000 audit: BPF prog-id=56 op=UNLOAD May 17 01:05:02.716000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.716000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.716000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.716000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.716000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.716000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.716000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.716000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.716000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.733000 audit: BPF prog-id=83 op=LOAD May 17 01:05:02.733000 audit: BPF prog-id=42 op=UNLOAD May 17 01:05:02.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.751000 audit: BPF prog-id=84 op=LOAD May 17 01:05:02.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.751000 audit: BPF prog-id=85 op=LOAD May 17 01:05:02.751000 audit: BPF prog-id=43 op=UNLOAD May 17 01:05:02.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.822000 audit: BPF prog-id=89 op=LOAD May 17 01:05:02.822000 audit: BPF prog-id=48 op=UNLOAD May 17 01:05:02.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.823000 audit: BPF prog-id=90 op=LOAD May 17 01:05:02.823000 audit: BPF prog-id=49 op=UNLOAD May 17 01:05:02.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.823000 audit: BPF prog-id=91 op=LOAD May 17 01:05:02.823000 audit: BPF prog-id=72 op=UNLOAD May 17 01:05:02.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.824000 audit: BPF prog-id=92 op=LOAD May 17 01:05:02.824000 audit: BPF prog-id=76 op=UNLOAD May 17 01:05:02.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.825000 audit: BPF prog-id=93 op=LOAD May 17 01:05:02.825000 audit: BPF prog-id=64 op=UNLOAD May 17 01:05:02.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.826000 audit: BPF prog-id=94 op=LOAD May 17 01:05:02.826000 audit: BPF prog-id=50 op=UNLOAD May 17 01:05:02.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.826000 audit: BPF prog-id=95 op=LOAD May 17 01:05:02.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.826000 audit: BPF prog-id=96 op=LOAD May 17 01:05:02.826000 audit: BPF prog-id=51 op=UNLOAD May 17 01:05:02.826000 audit: BPF prog-id=52 op=UNLOAD May 17 01:05:02.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.827000 audit: BPF prog-id=97 op=LOAD May 17 01:05:02.827000 audit: BPF prog-id=53 op=UNLOAD May 17 01:05:02.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.827000 audit: BPF prog-id=98 op=LOAD May 17 01:05:02.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.827000 audit: BPF prog-id=99 op=LOAD May 17 01:05:02.827000 audit: BPF prog-id=54 op=UNLOAD May 17 01:05:02.827000 audit: BPF prog-id=55 op=UNLOAD May 17 01:05:02.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:02.828000 audit: BPF prog-id=100 op=LOAD May 17 01:05:02.828000 audit: BPF prog-id=68 op=UNLOAD May 17 01:05:02.855779 systemd[1]: Stopping kubelet.service... May 17 01:05:02.882300 systemd[1]: kubelet.service: Deactivated successfully. May 17 01:05:02.882515 systemd[1]: Stopped kubelet.service. May 17 01:05:02.882576 systemd[1]: kubelet.service: Consumed 1.327s CPU time. May 17 01:05:02.881000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:05:02.884404 systemd[1]: Starting kubelet.service... May 17 01:05:02.989000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:05:02.990550 systemd[1]: Started kubelet.service. May 17 01:05:03.050378 kubelet[2439]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 01:05:03.050788 kubelet[2439]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. May 17 01:05:03.050846 kubelet[2439]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 01:05:03.051106 kubelet[2439]: I0517 01:05:03.051072 2439 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 17 01:05:03.062360 kubelet[2439]: I0517 01:05:03.062316 2439 server.go:520] "Kubelet version" kubeletVersion="v1.32.4" May 17 01:05:03.062569 kubelet[2439]: I0517 01:05:03.062554 2439 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 17 01:05:03.062969 kubelet[2439]: I0517 01:05:03.062927 2439 server.go:954] "Client rotation is on, will bootstrap in background" May 17 01:05:03.064400 kubelet[2439]: I0517 01:05:03.064368 2439 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". May 17 01:05:03.072244 kubelet[2439]: I0517 01:05:03.072193 2439 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 17 01:05:03.077607 kubelet[2439]: E0517 01:05:03.077508 2439 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 17 01:05:03.077786 kubelet[2439]: I0517 01:05:03.077770 2439 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 17 01:05:03.082604 kubelet[2439]: I0517 01:05:03.082572 2439 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 17 01:05:03.083145 kubelet[2439]: I0517 01:05:03.083100 2439 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 17 01:05:03.085395 kubelet[2439]: I0517 01:05:03.083245 2439 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510.3.7-n-56b9a5cda4","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 17 01:05:03.085712 kubelet[2439]: I0517 01:05:03.085690 2439 topology_manager.go:138] "Creating topology manager with none policy" May 17 01:05:03.085786 kubelet[2439]: I0517 01:05:03.085776 2439 container_manager_linux.go:304] "Creating device plugin manager" May 17 01:05:03.087899 kubelet[2439]: I0517 01:05:03.086893 2439 state_mem.go:36] "Initialized new in-memory state store" May 17 01:05:03.087899 kubelet[2439]: I0517 01:05:03.087150 2439 kubelet.go:446] "Attempting to sync node with API server" May 17 01:05:03.087899 kubelet[2439]: I0517 01:05:03.087179 2439 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" May 17 01:05:03.087899 kubelet[2439]: I0517 01:05:03.087200 2439 kubelet.go:352] "Adding apiserver pod source" May 17 01:05:03.087899 kubelet[2439]: I0517 01:05:03.087212 2439 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 17 01:05:03.097309 kubelet[2439]: I0517 01:05:03.095478 2439 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 17 01:05:03.097309 kubelet[2439]: I0517 01:05:03.096095 2439 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 17 01:05:03.097309 kubelet[2439]: I0517 01:05:03.096734 2439 watchdog_linux.go:99] "Systemd watchdog is not enabled" May 17 01:05:03.097309 kubelet[2439]: I0517 01:05:03.096779 2439 server.go:1287] "Started kubelet" May 17 01:05:03.098000 audit[2439]: AVC avc: denied { mac_admin } for pid=2439 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:03.098000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 01:05:03.098000 audit[2439]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40006383f0 a1=40000c71e8 a2=40006383c0 a3=25 items=0 ppid=1 pid=2439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:03.098000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 01:05:03.098000 audit[2439]: AVC avc: denied { mac_admin } for pid=2439 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:03.098000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 01:05:03.098000 audit[2439]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40000c3ec0 a1=40000c7200 a2=4000638480 a3=25 items=0 ppid=1 pid=2439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:03.098000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 01:05:03.099488 kubelet[2439]: I0517 01:05:03.099135 2439 kubelet.go:1507] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" May 17 01:05:03.099488 kubelet[2439]: I0517 01:05:03.099184 2439 kubelet.go:1511] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" May 17 01:05:03.099488 kubelet[2439]: I0517 01:05:03.099219 2439 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 17 01:05:03.109288 kubelet[2439]: I0517 01:05:03.109228 2439 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 May 17 01:05:03.110403 kubelet[2439]: I0517 01:05:03.110236 2439 server.go:479] "Adding debug handlers to kubelet server" May 17 01:05:03.111508 kubelet[2439]: I0517 01:05:03.111436 2439 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 17 01:05:03.111667 kubelet[2439]: I0517 01:05:03.111644 2439 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 17 01:05:03.112663 kubelet[2439]: I0517 01:05:03.112633 2439 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 17 01:05:03.115969 kubelet[2439]: I0517 01:05:03.114176 2439 volume_manager.go:297] "Starting Kubelet Volume Manager" May 17 01:05:03.115969 kubelet[2439]: E0517 01:05:03.114410 2439 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-56b9a5cda4\" not found" May 17 01:05:03.116281 kubelet[2439]: I0517 01:05:03.116245 2439 desired_state_of_world_populator.go:150] "Desired state populator starts to run" May 17 01:05:03.116387 kubelet[2439]: I0517 01:05:03.116369 2439 reconciler.go:26] "Reconciler: start to sync state" May 17 01:05:03.119971 kubelet[2439]: I0517 01:05:03.118149 2439 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 17 01:05:03.119971 kubelet[2439]: I0517 01:05:03.119167 2439 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 17 01:05:03.119971 kubelet[2439]: I0517 01:05:03.119194 2439 status_manager.go:227] "Starting to sync pod status with apiserver" May 17 01:05:03.119971 kubelet[2439]: I0517 01:05:03.119215 2439 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." May 17 01:05:03.119971 kubelet[2439]: I0517 01:05:03.119222 2439 kubelet.go:2382] "Starting kubelet main sync loop" May 17 01:05:03.119971 kubelet[2439]: E0517 01:05:03.119262 2439 kubelet.go:2406] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 17 01:05:03.133566 kubelet[2439]: I0517 01:05:03.133535 2439 factory.go:221] Registration of the systemd container factory successfully May 17 01:05:03.133829 kubelet[2439]: I0517 01:05:03.133805 2439 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 17 01:05:03.151117 kubelet[2439]: E0517 01:05:03.151088 2439 kubelet.go:1555] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 17 01:05:03.156682 kubelet[2439]: I0517 01:05:03.156616 2439 factory.go:221] Registration of the containerd container factory successfully May 17 01:05:03.196582 kubelet[2439]: I0517 01:05:03.196548 2439 cpu_manager.go:221] "Starting CPU manager" policy="none" May 17 01:05:03.196582 kubelet[2439]: I0517 01:05:03.196571 2439 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" May 17 01:05:03.196744 kubelet[2439]: I0517 01:05:03.196595 2439 state_mem.go:36] "Initialized new in-memory state store" May 17 01:05:03.196794 kubelet[2439]: I0517 01:05:03.196770 2439 state_mem.go:88] "Updated default CPUSet" cpuSet="" May 17 01:05:03.196823 kubelet[2439]: I0517 01:05:03.196787 2439 state_mem.go:96] "Updated CPUSet assignments" assignments={} May 17 01:05:03.196823 kubelet[2439]: I0517 01:05:03.196807 2439 policy_none.go:49] "None policy: Start" May 17 01:05:03.196823 kubelet[2439]: I0517 01:05:03.196817 2439 memory_manager.go:186] "Starting memorymanager" policy="None" May 17 01:05:03.196895 kubelet[2439]: I0517 01:05:03.196826 2439 state_mem.go:35] "Initializing new in-memory state store" May 17 01:05:03.196962 kubelet[2439]: I0517 01:05:03.196919 2439 state_mem.go:75] "Updated machine memory state" May 17 01:05:03.200604 kubelet[2439]: I0517 01:05:03.200561 2439 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 17 01:05:03.199000 audit[2439]: AVC avc: denied { mac_admin } for pid=2439 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:03.199000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 01:05:03.199000 audit[2439]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000927230 a1=4000acfc08 a2=40009270e0 a3=25 items=0 ppid=1 pid=2439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:03.199000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 01:05:03.200987 kubelet[2439]: I0517 01:05:03.200657 2439 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" May 17 01:05:03.200987 kubelet[2439]: I0517 01:05:03.200803 2439 eviction_manager.go:189] "Eviction manager: starting control loop" May 17 01:05:03.200987 kubelet[2439]: I0517 01:05:03.200815 2439 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 17 01:05:03.201797 kubelet[2439]: I0517 01:05:03.201767 2439 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 17 01:05:03.206372 kubelet[2439]: E0517 01:05:03.206336 2439 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" May 17 01:05:03.220687 kubelet[2439]: I0517 01:05:03.220643 2439 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-ci-3510.3.7-n-56b9a5cda4" May 17 01:05:03.221928 kubelet[2439]: I0517 01:05:03.221898 2439 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-ci-3510.3.7-n-56b9a5cda4" May 17 01:05:03.222194 kubelet[2439]: I0517 01:05:03.222171 2439 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-ci-3510.3.7-n-56b9a5cda4" May 17 01:05:03.245778 kubelet[2439]: W0517 01:05:03.245031 2439 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 17 01:05:03.245778 kubelet[2439]: E0517 01:05:03.245091 2439 kubelet.go:3196] "Failed creating a mirror pod" err="pods \"kube-scheduler-ci-3510.3.7-n-56b9a5cda4\" already exists" pod="kube-system/kube-scheduler-ci-3510.3.7-n-56b9a5cda4" May 17 01:05:03.245778 kubelet[2439]: W0517 01:05:03.245201 2439 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 17 01:05:03.245778 kubelet[2439]: W0517 01:05:03.245631 2439 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 17 01:05:03.304009 kubelet[2439]: I0517 01:05:03.303976 2439 kubelet_node_status.go:75] "Attempting to register node" node="ci-3510.3.7-n-56b9a5cda4" May 17 01:05:03.317915 kubelet[2439]: I0517 01:05:03.317658 2439 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/7c092ee12221735ba59db66dba67f65b-ca-certs\") pod \"kube-apiserver-ci-3510.3.7-n-56b9a5cda4\" (UID: \"7c092ee12221735ba59db66dba67f65b\") " pod="kube-system/kube-apiserver-ci-3510.3.7-n-56b9a5cda4" May 17 01:05:03.317915 kubelet[2439]: I0517 01:05:03.317700 2439 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/7c092ee12221735ba59db66dba67f65b-k8s-certs\") pod \"kube-apiserver-ci-3510.3.7-n-56b9a5cda4\" (UID: \"7c092ee12221735ba59db66dba67f65b\") " pod="kube-system/kube-apiserver-ci-3510.3.7-n-56b9a5cda4" May 17 01:05:03.317915 kubelet[2439]: I0517 01:05:03.317725 2439 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/5a997ba40393328b4552305c0aee093f-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.7-n-56b9a5cda4\" (UID: \"5a997ba40393328b4552305c0aee093f\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-56b9a5cda4" May 17 01:05:03.317915 kubelet[2439]: I0517 01:05:03.317742 2439 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/5a997ba40393328b4552305c0aee093f-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.7-n-56b9a5cda4\" (UID: \"5a997ba40393328b4552305c0aee093f\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-56b9a5cda4" May 17 01:05:03.317915 kubelet[2439]: I0517 01:05:03.317758 2439 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/5a997ba40393328b4552305c0aee093f-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.7-n-56b9a5cda4\" (UID: \"5a997ba40393328b4552305c0aee093f\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-56b9a5cda4" May 17 01:05:03.318173 kubelet[2439]: I0517 01:05:03.317775 2439 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/7c092ee12221735ba59db66dba67f65b-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.7-n-56b9a5cda4\" (UID: \"7c092ee12221735ba59db66dba67f65b\") " pod="kube-system/kube-apiserver-ci-3510.3.7-n-56b9a5cda4" May 17 01:05:03.318173 kubelet[2439]: I0517 01:05:03.317791 2439 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/5a997ba40393328b4552305c0aee093f-ca-certs\") pod \"kube-controller-manager-ci-3510.3.7-n-56b9a5cda4\" (UID: \"5a997ba40393328b4552305c0aee093f\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-56b9a5cda4" May 17 01:05:03.318173 kubelet[2439]: I0517 01:05:03.317806 2439 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/5a997ba40393328b4552305c0aee093f-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.7-n-56b9a5cda4\" (UID: \"5a997ba40393328b4552305c0aee093f\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-56b9a5cda4" May 17 01:05:03.318173 kubelet[2439]: I0517 01:05:03.317822 2439 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/183d0bddc3c6ab0d2f925a78ecd315ef-kubeconfig\") pod \"kube-scheduler-ci-3510.3.7-n-56b9a5cda4\" (UID: \"183d0bddc3c6ab0d2f925a78ecd315ef\") " pod="kube-system/kube-scheduler-ci-3510.3.7-n-56b9a5cda4" May 17 01:05:03.321680 kubelet[2439]: I0517 01:05:03.321646 2439 kubelet_node_status.go:124] "Node was previously registered" node="ci-3510.3.7-n-56b9a5cda4" May 17 01:05:03.321905 kubelet[2439]: I0517 01:05:03.321893 2439 kubelet_node_status.go:78] "Successfully registered node" node="ci-3510.3.7-n-56b9a5cda4" May 17 01:05:04.092353 kubelet[2439]: I0517 01:05:04.092315 2439 apiserver.go:52] "Watching apiserver" May 17 01:05:04.116875 kubelet[2439]: I0517 01:05:04.116837 2439 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" May 17 01:05:04.175874 kubelet[2439]: I0517 01:05:04.175844 2439 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-ci-3510.3.7-n-56b9a5cda4" May 17 01:05:04.176660 kubelet[2439]: I0517 01:05:04.176439 2439 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-ci-3510.3.7-n-56b9a5cda4" May 17 01:05:04.176999 kubelet[2439]: I0517 01:05:04.176974 2439 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-ci-3510.3.7-n-56b9a5cda4" May 17 01:05:04.195951 kubelet[2439]: W0517 01:05:04.195889 2439 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 17 01:05:04.196108 kubelet[2439]: E0517 01:05:04.195967 2439 kubelet.go:3196] "Failed creating a mirror pod" err="pods \"kube-scheduler-ci-3510.3.7-n-56b9a5cda4\" already exists" pod="kube-system/kube-scheduler-ci-3510.3.7-n-56b9a5cda4" May 17 01:05:04.197375 kubelet[2439]: W0517 01:05:04.197345 2439 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 17 01:05:04.197481 kubelet[2439]: E0517 01:05:04.197389 2439 kubelet.go:3196] "Failed creating a mirror pod" err="pods \"kube-controller-manager-ci-3510.3.7-n-56b9a5cda4\" already exists" pod="kube-system/kube-controller-manager-ci-3510.3.7-n-56b9a5cda4" May 17 01:05:04.197741 kubelet[2439]: W0517 01:05:04.197715 2439 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 17 01:05:04.197788 kubelet[2439]: E0517 01:05:04.197766 2439 kubelet.go:3196] "Failed creating a mirror pod" err="pods \"kube-apiserver-ci-3510.3.7-n-56b9a5cda4\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.7-n-56b9a5cda4" May 17 01:05:04.220000 audit[2310]: AVC avc: denied { watch } for pid=2310 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=521012 scontext=system_u:system_r:svirt_lxc_net_t:s0:c618,c658 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 17 01:05:04.220000 audit[2310]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000e949c0 a2=fc6 a3=0 items=0 ppid=2177 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c618,c658 key=(null) May 17 01:05:04.220000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 01:05:04.240495 kubelet[2439]: I0517 01:05:04.240435 2439 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510.3.7-n-56b9a5cda4" podStartSLOduration=4.240300471 podStartE2EDuration="4.240300471s" podCreationTimestamp="2025-05-17 01:05:00 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 01:05:04.209359739 +0000 UTC m=+1.209817127" watchObservedRunningTime="2025-05-17 01:05:04.240300471 +0000 UTC m=+1.240757899" May 17 01:05:04.260004 kubelet[2439]: I0517 01:05:04.259908 2439 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510.3.7-n-56b9a5cda4" podStartSLOduration=1.2598909919999999 podStartE2EDuration="1.259890992s" podCreationTimestamp="2025-05-17 01:05:03 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 01:05:04.240306551 +0000 UTC m=+1.240763939" watchObservedRunningTime="2025-05-17 01:05:04.259890992 +0000 UTC m=+1.260348380" May 17 01:05:04.275743 kubelet[2439]: I0517 01:05:04.275685 2439 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510.3.7-n-56b9a5cda4" podStartSLOduration=1.275664347 podStartE2EDuration="1.275664347s" podCreationTimestamp="2025-05-17 01:05:03 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 01:05:04.260306805 +0000 UTC m=+1.260764193" watchObservedRunningTime="2025-05-17 01:05:04.275664347 +0000 UTC m=+1.276121735" May 17 01:05:07.211000 audit[2310]: AVC avc: denied { watch } for pid=2310 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c618,c658 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:05:07.211000 audit[2310]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000c74340 a2=fc6 a3=0 items=0 ppid=2177 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c618,c658 key=(null) May 17 01:05:07.211000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 01:05:07.212000 audit[2310]: AVC avc: denied { watch } for pid=2310 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c618,c658 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:05:07.212000 audit[2310]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000bc9920 a2=fc6 a3=0 items=0 ppid=2177 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c618,c658 key=(null) May 17 01:05:07.212000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 01:05:07.212000 audit[2310]: AVC avc: denied { watch } for pid=2310 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c618,c658 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:05:07.212000 audit[2310]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000bc9940 a2=fc6 a3=0 items=0 ppid=2177 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c618,c658 key=(null) May 17 01:05:07.212000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 01:05:07.212000 audit[2310]: AVC avc: denied { watch } for pid=2310 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c618,c658 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:05:07.212000 audit[2310]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000bc9980 a2=fc6 a3=0 items=0 ppid=2177 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c618,c658 key=(null) May 17 01:05:07.212000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 01:05:08.058439 kubelet[2439]: I0517 01:05:08.058401 2439 kuberuntime_manager.go:1702] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" May 17 01:05:08.058798 env[1453]: time="2025-05-17T01:05:08.058724690Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 17 01:05:08.059002 kubelet[2439]: I0517 01:05:08.058919 2439 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" May 17 01:05:08.893873 systemd[1]: Created slice kubepods-besteffort-poddddb0c89_ad53_4db6_8796_a73eb92fde7f.slice. May 17 01:05:08.949898 kubelet[2439]: I0517 01:05:08.949857 2439 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-x6jnc\" (UniqueName: \"kubernetes.io/projected/dddb0c89-ad53-4db6-8796-a73eb92fde7f-kube-api-access-x6jnc\") pod \"kube-proxy-srwsd\" (UID: \"dddb0c89-ad53-4db6-8796-a73eb92fde7f\") " pod="kube-system/kube-proxy-srwsd" May 17 01:05:08.950095 kubelet[2439]: I0517 01:05:08.950078 2439 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/dddb0c89-ad53-4db6-8796-a73eb92fde7f-kube-proxy\") pod \"kube-proxy-srwsd\" (UID: \"dddb0c89-ad53-4db6-8796-a73eb92fde7f\") " pod="kube-system/kube-proxy-srwsd" May 17 01:05:08.950190 kubelet[2439]: I0517 01:05:08.950178 2439 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/dddb0c89-ad53-4db6-8796-a73eb92fde7f-xtables-lock\") pod \"kube-proxy-srwsd\" (UID: \"dddb0c89-ad53-4db6-8796-a73eb92fde7f\") " pod="kube-system/kube-proxy-srwsd" May 17 01:05:08.950275 kubelet[2439]: I0517 01:05:08.950263 2439 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/dddb0c89-ad53-4db6-8796-a73eb92fde7f-lib-modules\") pod \"kube-proxy-srwsd\" (UID: \"dddb0c89-ad53-4db6-8796-a73eb92fde7f\") " pod="kube-system/kube-proxy-srwsd" May 17 01:05:09.058471 kubelet[2439]: I0517 01:05:09.058436 2439 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" May 17 01:05:09.095092 systemd[1]: Created slice kubepods-besteffort-pod73511e12_b5b4_4eaa_a4c3_542441aa2a1d.slice. May 17 01:05:09.096183 kubelet[2439]: W0517 01:05:09.096158 2439 reflector.go:569] object-"tigera-operator"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510.3.7-n-56b9a5cda4" cannot list resource "configmaps" in API group "" in the namespace "tigera-operator": no relationship found between node 'ci-3510.3.7-n-56b9a5cda4' and this object May 17 01:05:09.097267 kubelet[2439]: E0517 01:05:09.097238 2439 reflector.go:166] "Unhandled Error" err="object-\"tigera-operator\"/\"kube-root-ca.crt\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps \"kube-root-ca.crt\" is forbidden: User \"system:node:ci-3510.3.7-n-56b9a5cda4\" cannot list resource \"configmaps\" in API group \"\" in the namespace \"tigera-operator\": no relationship found between node 'ci-3510.3.7-n-56b9a5cda4' and this object" logger="UnhandledError" May 17 01:05:09.097363 kubelet[2439]: I0517 01:05:09.096354 2439 status_manager.go:890] "Failed to get status for pod" podUID="73511e12-b5b4-4eaa-a4c3-542441aa2a1d" pod="tigera-operator/tigera-operator-844669ff44-wmwf6" err="pods \"tigera-operator-844669ff44-wmwf6\" is forbidden: User \"system:node:ci-3510.3.7-n-56b9a5cda4\" cannot get resource \"pods\" in API group \"\" in the namespace \"tigera-operator\": no relationship found between node 'ci-3510.3.7-n-56b9a5cda4' and this object" May 17 01:05:09.097446 kubelet[2439]: W0517 01:05:09.096419 2439 reflector.go:569] object-"tigera-operator"/"kubernetes-services-endpoint": failed to list *v1.ConfigMap: configmaps "kubernetes-services-endpoint" is forbidden: User "system:node:ci-3510.3.7-n-56b9a5cda4" cannot list resource "configmaps" in API group "" in the namespace "tigera-operator": no relationship found between node 'ci-3510.3.7-n-56b9a5cda4' and this object May 17 01:05:09.097551 kubelet[2439]: E0517 01:05:09.097532 2439 reflector.go:166] "Unhandled Error" err="object-\"tigera-operator\"/\"kubernetes-services-endpoint\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps \"kubernetes-services-endpoint\" is forbidden: User \"system:node:ci-3510.3.7-n-56b9a5cda4\" cannot list resource \"configmaps\" in API group \"\" in the namespace \"tigera-operator\": no relationship found between node 'ci-3510.3.7-n-56b9a5cda4' and this object" logger="UnhandledError" May 17 01:05:09.151466 kubelet[2439]: I0517 01:05:09.151359 2439 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-czswd\" (UniqueName: \"kubernetes.io/projected/73511e12-b5b4-4eaa-a4c3-542441aa2a1d-kube-api-access-czswd\") pod \"tigera-operator-844669ff44-wmwf6\" (UID: \"73511e12-b5b4-4eaa-a4c3-542441aa2a1d\") " pod="tigera-operator/tigera-operator-844669ff44-wmwf6" May 17 01:05:09.151636 kubelet[2439]: I0517 01:05:09.151620 2439 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/73511e12-b5b4-4eaa-a4c3-542441aa2a1d-var-lib-calico\") pod \"tigera-operator-844669ff44-wmwf6\" (UID: \"73511e12-b5b4-4eaa-a4c3-542441aa2a1d\") " pod="tigera-operator/tigera-operator-844669ff44-wmwf6" May 17 01:05:09.203586 env[1453]: time="2025-05-17T01:05:09.203189098Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-srwsd,Uid:dddb0c89-ad53-4db6-8796-a73eb92fde7f,Namespace:kube-system,Attempt:0,}" May 17 01:05:09.248529 env[1453]: time="2025-05-17T01:05:09.248444727Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 01:05:09.248723 env[1453]: time="2025-05-17T01:05:09.248502889Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 01:05:09.248723 env[1453]: time="2025-05-17T01:05:09.248513889Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 01:05:09.248817 env[1453]: time="2025-05-17T01:05:09.248752056Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f0239957ece4d6c66622b2f34a3ba775ff4ee77cb02c3c0731a468aa7b29ffbb pid=2488 runtime=io.containerd.runc.v2 May 17 01:05:09.273605 systemd[1]: Started cri-containerd-f0239957ece4d6c66622b2f34a3ba775ff4ee77cb02c3c0731a468aa7b29ffbb.scope. May 17 01:05:09.288488 kernel: kauditd_printk_skb: 327 callbacks suppressed May 17 01:05:09.288607 kernel: audit: type=1400 audit(1747443909.282:692): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:09.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:09.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:09.323471 kernel: audit: type=1400 audit(1747443909.282:693): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:09.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:09.340522 kernel: audit: type=1400 audit(1747443909.282:694): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:09.343527 kernel: audit: type=1400 audit(1747443909.282:695): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:09.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:09.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:09.374782 kernel: audit: type=1400 audit(1747443909.282:696): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:09.375380 kernel: audit: type=1400 audit(1747443909.282:697): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:09.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:09.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:09.408048 kernel: audit: type=1400 audit(1747443909.282:698): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:09.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:09.426196 kernel: audit: type=1400 audit(1747443909.282:699): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:09.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:09.443972 kernel: audit: type=1400 audit(1747443909.282:700): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:09.445524 env[1453]: time="2025-05-17T01:05:09.445466425Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-srwsd,Uid:dddb0c89-ad53-4db6-8796-a73eb92fde7f,Namespace:kube-system,Attempt:0,} returns sandbox id \"f0239957ece4d6c66622b2f34a3ba775ff4ee77cb02c3c0731a468aa7b29ffbb\"" May 17 01:05:09.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:09.451343 env[1453]: time="2025-05-17T01:05:09.451284354Z" level=info msg="CreateContainer within sandbox \"f0239957ece4d6c66622b2f34a3ba775ff4ee77cb02c3c0731a468aa7b29ffbb\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 17 01:05:09.462667 kernel: audit: type=1400 audit(1747443909.287:701): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:09.287000 audit: BPF prog-id=101 op=LOAD May 17 01:05:09.305000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:09.305000 audit[2497]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=2488 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:09.305000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630323339393537656365346436633636363232623266333461336261 May 17 01:05:09.305000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:09.305000 audit[2497]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2488 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:09.305000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630323339393537656365346436633636363232623266333461336261 May 17 01:05:09.305000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:09.305000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:09.305000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:09.305000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:09.305000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:09.305000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:09.305000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:09.305000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:09.305000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:09.305000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:09.305000 audit: BPF prog-id=102 op=LOAD May 17 01:05:09.305000 audit[2497]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2488 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:09.305000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630323339393537656365346436633636363232623266333461336261 May 17 01:05:09.322000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:09.322000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:09.322000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:09.322000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:09.322000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:09.322000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:09.322000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:09.322000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:09.322000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:09.322000 audit: BPF prog-id=103 op=LOAD May 17 01:05:09.322000 audit[2497]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2488 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:09.322000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630323339393537656365346436633636363232623266333461336261 May 17 01:05:09.322000 audit: BPF prog-id=103 op=UNLOAD May 17 01:05:09.322000 audit: BPF prog-id=102 op=UNLOAD May 17 01:05:09.322000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:09.322000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:09.322000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:09.322000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:09.322000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:09.322000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:09.322000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:09.322000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:09.322000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:09.322000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:09.322000 audit: BPF prog-id=104 op=LOAD May 17 01:05:09.322000 audit[2497]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2488 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:09.322000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630323339393537656365346436633636363232623266333461336261 May 17 01:05:09.512117 env[1453]: time="2025-05-17T01:05:09.512069392Z" level=info msg="CreateContainer within sandbox \"f0239957ece4d6c66622b2f34a3ba775ff4ee77cb02c3c0731a468aa7b29ffbb\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"9c802360c86fd48027e105e50abea21439793405358d1366b166d4b80ac13c02\"" May 17 01:05:09.514230 env[1453]: time="2025-05-17T01:05:09.514200773Z" level=info msg="StartContainer for \"9c802360c86fd48027e105e50abea21439793405358d1366b166d4b80ac13c02\"" May 17 01:05:09.530455 systemd[1]: Started cri-containerd-9c802360c86fd48027e105e50abea21439793405358d1366b166d4b80ac13c02.scope. May 17 01:05:09.551000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:09.551000 audit[2529]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2488 pid=2529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:09.551000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963383032333630633836666434383032376531303565353061626561 May 17 01:05:09.551000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:09.551000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:09.551000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:09.551000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:09.551000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:09.551000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:09.551000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:09.551000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:09.551000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:09.551000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:09.551000 audit: BPF prog-id=105 op=LOAD May 17 01:05:09.551000 audit[2529]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2488 pid=2529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:09.551000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963383032333630633836666434383032376531303565353061626561 May 17 01:05:09.551000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:09.551000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:09.551000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:09.551000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:09.551000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:09.551000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:09.551000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:09.551000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:09.551000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:09.551000 audit: BPF prog-id=106 op=LOAD May 17 01:05:09.551000 audit[2529]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2488 pid=2529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:09.551000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963383032333630633836666434383032376531303565353061626561 May 17 01:05:09.552000 audit: BPF prog-id=106 op=UNLOAD May 17 01:05:09.552000 audit: BPF prog-id=105 op=UNLOAD May 17 01:05:09.552000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:09.552000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:09.552000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:09.552000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:09.552000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:09.552000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:09.552000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:09.552000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:09.552000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:09.552000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:09.552000 audit: BPF prog-id=107 op=LOAD May 17 01:05:09.552000 audit[2529]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2488 pid=2529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:09.552000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963383032333630633836666434383032376531303565353061626561 May 17 01:05:09.585313 env[1453]: time="2025-05-17T01:05:09.585253268Z" level=info msg="StartContainer for \"9c802360c86fd48027e105e50abea21439793405358d1366b166d4b80ac13c02\" returns successfully" May 17 01:05:09.732000 audit[2587]: NETFILTER_CFG table=mangle:41 family=2 entries=1 op=nft_register_chain pid=2587 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:05:09.732000 audit[2587]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe50c0e70 a2=0 a3=1 items=0 ppid=2540 pid=2587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:09.732000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 17 01:05:09.733000 audit[2589]: NETFILTER_CFG table=nat:42 family=2 entries=1 op=nft_register_chain pid=2589 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:05:09.733000 audit[2589]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffc6dafb0 a2=0 a3=1 items=0 ppid=2540 pid=2589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:09.733000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 17 01:05:09.738000 audit[2590]: NETFILTER_CFG table=mangle:43 family=10 entries=1 op=nft_register_chain pid=2590 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 01:05:09.738000 audit[2590]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff75dfad0 a2=0 a3=1 items=0 ppid=2540 pid=2590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:09.738000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 17 01:05:09.739000 audit[2592]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2592 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:05:09.739000 audit[2592]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd6ef29b0 a2=0 a3=1 items=0 ppid=2540 pid=2592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:09.739000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 17 01:05:09.742000 audit[2593]: NETFILTER_CFG table=nat:45 family=10 entries=1 op=nft_register_chain pid=2593 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 01:05:09.742000 audit[2593]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff64240a0 a2=0 a3=1 items=0 ppid=2540 pid=2593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:09.742000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 17 01:05:09.743000 audit[2594]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=2594 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 01:05:09.743000 audit[2594]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcbf6bc30 a2=0 a3=1 items=0 ppid=2540 pid=2594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:09.743000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 17 01:05:09.836000 audit[2595]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2595 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:05:09.836000 audit[2595]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffd533f7c0 a2=0 a3=1 items=0 ppid=2540 pid=2595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:09.836000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 17 01:05:09.839000 audit[2597]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2597 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:05:09.839000 audit[2597]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=fffff2100250 a2=0 a3=1 items=0 ppid=2540 pid=2597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:09.839000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 17 01:05:09.842000 audit[2600]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_rule pid=2600 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:05:09.842000 audit[2600]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffce0aac10 a2=0 a3=1 items=0 ppid=2540 pid=2600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:09.842000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 17 01:05:09.843000 audit[2601]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_chain pid=2601 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:05:09.843000 audit[2601]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcff5e0c0 a2=0 a3=1 items=0 ppid=2540 pid=2601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:09.843000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 17 01:05:09.846000 audit[2603]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2603 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:05:09.846000 audit[2603]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffedb54b30 a2=0 a3=1 items=0 ppid=2540 pid=2603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:09.846000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 17 01:05:09.847000 audit[2604]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2604 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:05:09.847000 audit[2604]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd5774f80 a2=0 a3=1 items=0 ppid=2540 pid=2604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:09.847000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 17 01:05:09.849000 audit[2606]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2606 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:05:09.849000 audit[2606]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffffde2e1f0 a2=0 a3=1 items=0 ppid=2540 pid=2606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:09.849000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 17 01:05:09.852000 audit[2609]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_rule pid=2609 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:05:09.852000 audit[2609]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffe8d0d870 a2=0 a3=1 items=0 ppid=2540 pid=2609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:09.852000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 17 01:05:09.855000 audit[2610]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_chain pid=2610 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:05:09.855000 audit[2610]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff60b4210 a2=0 a3=1 items=0 ppid=2540 pid=2610 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:09.855000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 17 01:05:09.857000 audit[2612]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2612 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:05:09.857000 audit[2612]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffff0891ac0 a2=0 a3=1 items=0 ppid=2540 pid=2612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:09.857000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 17 01:05:09.858000 audit[2613]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_chain pid=2613 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:05:09.858000 audit[2613]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc5360030 a2=0 a3=1 items=0 ppid=2540 pid=2613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:09.858000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 17 01:05:09.861000 audit[2615]: NETFILTER_CFG table=filter:58 family=2 entries=1 op=nft_register_rule pid=2615 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:05:09.861000 audit[2615]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd9641c30 a2=0 a3=1 items=0 ppid=2540 pid=2615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:09.861000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 01:05:09.864000 audit[2618]: NETFILTER_CFG table=filter:59 family=2 entries=1 op=nft_register_rule pid=2618 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:05:09.864000 audit[2618]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc3ec5c60 a2=0 a3=1 items=0 ppid=2540 pid=2618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:09.864000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 01:05:09.868000 audit[2621]: NETFILTER_CFG table=filter:60 family=2 entries=1 op=nft_register_rule pid=2621 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:05:09.868000 audit[2621]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffed3d4820 a2=0 a3=1 items=0 ppid=2540 pid=2621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:09.868000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 17 01:05:09.869000 audit[2622]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2622 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:05:09.869000 audit[2622]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffff3295c40 a2=0 a3=1 items=0 ppid=2540 pid=2622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:09.869000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 17 01:05:09.872000 audit[2624]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2624 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:05:09.872000 audit[2624]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=524 a0=3 a1=ffffe9c79470 a2=0 a3=1 items=0 ppid=2540 pid=2624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:09.872000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 01:05:09.876000 audit[2627]: NETFILTER_CFG table=nat:63 family=2 entries=1 op=nft_register_rule pid=2627 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:05:09.876000 audit[2627]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe9b352b0 a2=0 a3=1 items=0 ppid=2540 pid=2627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:09.876000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 01:05:09.878000 audit[2628]: NETFILTER_CFG table=nat:64 family=2 entries=1 op=nft_register_chain pid=2628 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:05:09.878000 audit[2628]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc39a9ce0 a2=0 a3=1 items=0 ppid=2540 pid=2628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:09.878000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 17 01:05:09.882000 audit[2630]: NETFILTER_CFG table=nat:65 family=2 entries=1 op=nft_register_rule pid=2630 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:05:09.882000 audit[2630]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=532 a0=3 a1=ffffdb3c5b20 a2=0 a3=1 items=0 ppid=2540 pid=2630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:09.882000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 17 01:05:10.051000 audit[2636]: NETFILTER_CFG table=filter:66 family=2 entries=8 op=nft_register_rule pid=2636 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:05:10.051000 audit[2636]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5248 a0=3 a1=ffffec717be0 a2=0 a3=1 items=0 ppid=2540 pid=2636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:10.051000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:05:10.063338 systemd[1]: run-containerd-runc-k8s.io-f0239957ece4d6c66622b2f34a3ba775ff4ee77cb02c3c0731a468aa7b29ffbb-runc.BGfXJY.mount: Deactivated successfully. May 17 01:05:10.112000 audit[2636]: NETFILTER_CFG table=nat:67 family=2 entries=14 op=nft_register_chain pid=2636 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:05:10.112000 audit[2636]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5508 a0=3 a1=ffffec717be0 a2=0 a3=1 items=0 ppid=2540 pid=2636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:10.112000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:05:10.113000 audit[2641]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2641 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 01:05:10.113000 audit[2641]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffc4086000 a2=0 a3=1 items=0 ppid=2540 pid=2641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:10.113000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 17 01:05:10.116000 audit[2643]: NETFILTER_CFG table=filter:69 family=10 entries=2 op=nft_register_chain pid=2643 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 01:05:10.116000 audit[2643]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=fffffcff45d0 a2=0 a3=1 items=0 ppid=2540 pid=2643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:10.116000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 17 01:05:10.120000 audit[2646]: NETFILTER_CFG table=filter:70 family=10 entries=2 op=nft_register_chain pid=2646 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 01:05:10.120000 audit[2646]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffd6a338d0 a2=0 a3=1 items=0 ppid=2540 pid=2646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:10.120000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 17 01:05:10.121000 audit[2647]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_chain pid=2647 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 01:05:10.121000 audit[2647]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdc558f00 a2=0 a3=1 items=0 ppid=2540 pid=2647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:10.121000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 17 01:05:10.124000 audit[2649]: NETFILTER_CFG table=filter:72 family=10 entries=1 op=nft_register_rule pid=2649 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 01:05:10.124000 audit[2649]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffffdcc4a20 a2=0 a3=1 items=0 ppid=2540 pid=2649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:10.124000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 17 01:05:10.127000 audit[2650]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2650 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 01:05:10.127000 audit[2650]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff7457af0 a2=0 a3=1 items=0 ppid=2540 pid=2650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:10.127000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 17 01:05:10.129000 audit[2652]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2652 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 01:05:10.129000 audit[2652]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffff81a86e0 a2=0 a3=1 items=0 ppid=2540 pid=2652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:10.129000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 17 01:05:10.133000 audit[2655]: NETFILTER_CFG table=filter:75 family=10 entries=2 op=nft_register_chain pid=2655 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 01:05:10.133000 audit[2655]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffffb99b30 a2=0 a3=1 items=0 ppid=2540 pid=2655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:10.133000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 17 01:05:10.134000 audit[2656]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_chain pid=2656 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 01:05:10.134000 audit[2656]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe47c8550 a2=0 a3=1 items=0 ppid=2540 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:10.134000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 17 01:05:10.136000 audit[2658]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2658 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 01:05:10.136000 audit[2658]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffdf310d70 a2=0 a3=1 items=0 ppid=2540 pid=2658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:10.136000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 17 01:05:10.137000 audit[2659]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_chain pid=2659 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 01:05:10.137000 audit[2659]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc50aed70 a2=0 a3=1 items=0 ppid=2540 pid=2659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:10.137000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 17 01:05:10.140000 audit[2661]: NETFILTER_CFG table=filter:79 family=10 entries=1 op=nft_register_rule pid=2661 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 01:05:10.140000 audit[2661]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffffcc9a720 a2=0 a3=1 items=0 ppid=2540 pid=2661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:10.140000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 01:05:10.143000 audit[2664]: NETFILTER_CFG table=filter:80 family=10 entries=1 op=nft_register_rule pid=2664 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 01:05:10.143000 audit[2664]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffdeeaae10 a2=0 a3=1 items=0 ppid=2540 pid=2664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:10.143000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 17 01:05:10.147000 audit[2667]: NETFILTER_CFG table=filter:81 family=10 entries=1 op=nft_register_rule pid=2667 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 01:05:10.147000 audit[2667]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff43592d0 a2=0 a3=1 items=0 ppid=2540 pid=2667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:10.147000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 17 01:05:10.148000 audit[2668]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2668 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 01:05:10.148000 audit[2668]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffe68588a0 a2=0 a3=1 items=0 ppid=2540 pid=2668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:10.148000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 17 01:05:10.150000 audit[2670]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2670 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 01:05:10.150000 audit[2670]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=fffffb47dea0 a2=0 a3=1 items=0 ppid=2540 pid=2670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:10.150000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 01:05:10.153000 audit[2673]: NETFILTER_CFG table=nat:84 family=10 entries=2 op=nft_register_chain pid=2673 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 01:05:10.153000 audit[2673]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=fffff7a41310 a2=0 a3=1 items=0 ppid=2540 pid=2673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:10.153000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 01:05:10.154000 audit[2674]: NETFILTER_CFG table=nat:85 family=10 entries=1 op=nft_register_chain pid=2674 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 01:05:10.154000 audit[2674]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffb20d000 a2=0 a3=1 items=0 ppid=2540 pid=2674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:10.154000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 17 01:05:10.156000 audit[2676]: NETFILTER_CFG table=nat:86 family=10 entries=2 op=nft_register_chain pid=2676 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 01:05:10.156000 audit[2676]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffce3bea50 a2=0 a3=1 items=0 ppid=2540 pid=2676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:10.156000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 17 01:05:10.158000 audit[2677]: NETFILTER_CFG table=filter:87 family=10 entries=1 op=nft_register_chain pid=2677 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 01:05:10.158000 audit[2677]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff6ff26c0 a2=0 a3=1 items=0 ppid=2540 pid=2677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:10.158000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 17 01:05:10.162000 audit[2679]: NETFILTER_CFG table=filter:88 family=10 entries=1 op=nft_register_rule pid=2679 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 01:05:10.162000 audit[2679]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffd28aa230 a2=0 a3=1 items=0 ppid=2540 pid=2679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:10.162000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 01:05:10.165000 audit[2682]: NETFILTER_CFG table=filter:89 family=10 entries=1 op=nft_register_rule pid=2682 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 01:05:10.165000 audit[2682]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffe91f5ef0 a2=0 a3=1 items=0 ppid=2540 pid=2682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:10.165000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 01:05:10.168000 audit[2684]: NETFILTER_CFG table=filter:90 family=10 entries=3 op=nft_register_rule pid=2684 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 17 01:05:10.168000 audit[2684]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2088 a0=3 a1=fffff74edde0 a2=0 a3=1 items=0 ppid=2540 pid=2684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:10.168000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:05:10.169000 audit[2684]: NETFILTER_CFG table=nat:91 family=10 entries=7 op=nft_register_chain pid=2684 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 17 01:05:10.169000 audit[2684]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=fffff74edde0 a2=0 a3=1 items=0 ppid=2540 pid=2684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:10.169000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:05:10.261058 kubelet[2439]: E0517 01:05:10.261009 2439 projected.go:288] Couldn't get configMap tigera-operator/kube-root-ca.crt: failed to sync configmap cache: timed out waiting for the condition May 17 01:05:10.261058 kubelet[2439]: E0517 01:05:10.261039 2439 projected.go:194] Error preparing data for projected volume kube-api-access-czswd for pod tigera-operator/tigera-operator-844669ff44-wmwf6: failed to sync configmap cache: timed out waiting for the condition May 17 01:05:10.261471 kubelet[2439]: E0517 01:05:10.261093 2439 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/73511e12-b5b4-4eaa-a4c3-542441aa2a1d-kube-api-access-czswd podName:73511e12-b5b4-4eaa-a4c3-542441aa2a1d nodeName:}" failed. No retries permitted until 2025-05-17 01:05:10.761072835 +0000 UTC m=+7.761530183 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-czswd" (UniqueName: "kubernetes.io/projected/73511e12-b5b4-4eaa-a4c3-542441aa2a1d-kube-api-access-czswd") pod "tigera-operator-844669ff44-wmwf6" (UID: "73511e12-b5b4-4eaa-a4c3-542441aa2a1d") : failed to sync configmap cache: timed out waiting for the condition May 17 01:05:10.899645 env[1453]: time="2025-05-17T01:05:10.899245893Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-844669ff44-wmwf6,Uid:73511e12-b5b4-4eaa-a4c3-542441aa2a1d,Namespace:tigera-operator,Attempt:0,}" May 17 01:05:10.943994 env[1453]: time="2025-05-17T01:05:10.943895714Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 01:05:10.943994 env[1453]: time="2025-05-17T01:05:10.943955795Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 01:05:10.943994 env[1453]: time="2025-05-17T01:05:10.943967236Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 01:05:10.944508 env[1453]: time="2025-05-17T01:05:10.944439809Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3c5d102d791c36fbb8c5ed3e55e3a1f7a46795154fe2300b4ef83992070aa1e0 pid=2695 runtime=io.containerd.runc.v2 May 17 01:05:10.965410 systemd[1]: Started cri-containerd-3c5d102d791c36fbb8c5ed3e55e3a1f7a46795154fe2300b4ef83992070aa1e0.scope. May 17 01:05:10.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:10.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:10.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:10.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:10.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:10.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:10.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:10.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:10.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:10.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:10.984000 audit: BPF prog-id=108 op=LOAD May 17 01:05:10.985000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:10.985000 audit[2705]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2695 pid=2705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:10.985000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363356431303264373931633336666262386335656433653535653361 May 17 01:05:10.985000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:10.985000 audit[2705]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2695 pid=2705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:10.985000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363356431303264373931633336666262386335656433653535653361 May 17 01:05:10.985000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:10.985000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:10.985000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:10.985000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:10.985000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:10.985000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:10.985000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:10.985000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:10.985000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:10.985000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:10.985000 audit: BPF prog-id=109 op=LOAD May 17 01:05:10.985000 audit[2705]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2695 pid=2705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:10.985000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363356431303264373931633336666262386335656433653535653361 May 17 01:05:10.985000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:10.985000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:10.985000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:10.985000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:10.985000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:10.985000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:10.985000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:10.985000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:10.985000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:10.985000 audit: BPF prog-id=110 op=LOAD May 17 01:05:10.985000 audit[2705]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2695 pid=2705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:10.985000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363356431303264373931633336666262386335656433653535653361 May 17 01:05:10.985000 audit: BPF prog-id=110 op=UNLOAD May 17 01:05:10.985000 audit: BPF prog-id=109 op=UNLOAD May 17 01:05:10.985000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:10.985000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:10.985000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:10.985000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:10.985000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:10.985000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:10.985000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:10.985000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:10.985000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:10.985000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:10.985000 audit: BPF prog-id=111 op=LOAD May 17 01:05:10.985000 audit[2705]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2695 pid=2705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:10.985000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363356431303264373931633336666262386335656433653535653361 May 17 01:05:11.005714 env[1453]: time="2025-05-17T01:05:11.005663294Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-844669ff44-wmwf6,Uid:73511e12-b5b4-4eaa-a4c3-542441aa2a1d,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"3c5d102d791c36fbb8c5ed3e55e3a1f7a46795154fe2300b4ef83992070aa1e0\"" May 17 01:05:11.008790 env[1453]: time="2025-05-17T01:05:11.007733231Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.0\"" May 17 01:05:11.062859 systemd[1]: run-containerd-runc-k8s.io-3c5d102d791c36fbb8c5ed3e55e3a1f7a46795154fe2300b4ef83992070aa1e0-runc.zhfCWZ.mount: Deactivated successfully. May 17 01:05:13.802488 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1608059615.mount: Deactivated successfully. May 17 01:05:13.897442 kubelet[2439]: I0517 01:05:13.897378 2439 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-srwsd" podStartSLOduration=5.897357746 podStartE2EDuration="5.897357746s" podCreationTimestamp="2025-05-17 01:05:08 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 01:05:10.214042387 +0000 UTC m=+7.214499775" watchObservedRunningTime="2025-05-17 01:05:13.897357746 +0000 UTC m=+10.897815134" May 17 01:05:16.907385 env[1453]: time="2025-05-17T01:05:16.907342631Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.38.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:05:16.916458 env[1453]: time="2025-05-17T01:05:16.916418334Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:171854d50ba608218142ad5d32c7dd12ce55d536f02872e56e7c04c1f0a96a6b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:05:16.921727 env[1453]: time="2025-05-17T01:05:16.921689623Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.38.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:05:16.927494 env[1453]: time="2025-05-17T01:05:16.927457885Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:e0a34b265aebce1a2db906d8dad99190706e8bf3910cae626b9c2eb6bbb21775,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:05:16.928301 env[1453]: time="2025-05-17T01:05:16.928274505Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.0\" returns image reference \"sha256:171854d50ba608218142ad5d32c7dd12ce55d536f02872e56e7c04c1f0a96a6b\"" May 17 01:05:16.932954 env[1453]: time="2025-05-17T01:05:16.932914098Z" level=info msg="CreateContainer within sandbox \"3c5d102d791c36fbb8c5ed3e55e3a1f7a46795154fe2300b4ef83992070aa1e0\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" May 17 01:05:16.960872 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount207690788.mount: Deactivated successfully. May 17 01:05:16.966541 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3176294894.mount: Deactivated successfully. May 17 01:05:16.984396 env[1453]: time="2025-05-17T01:05:16.984353120Z" level=info msg="CreateContainer within sandbox \"3c5d102d791c36fbb8c5ed3e55e3a1f7a46795154fe2300b4ef83992070aa1e0\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"b1a9d89cf4af6cf448a395c33bf9ab690179760d79a5a1e3312709016afde32f\"" May 17 01:05:16.985333 env[1453]: time="2025-05-17T01:05:16.985307344Z" level=info msg="StartContainer for \"b1a9d89cf4af6cf448a395c33bf9ab690179760d79a5a1e3312709016afde32f\"" May 17 01:05:17.005142 systemd[1]: Started cri-containerd-b1a9d89cf4af6cf448a395c33bf9ab690179760d79a5a1e3312709016afde32f.scope. May 17 01:05:17.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:17.025456 kernel: kauditd_printk_skb: 300 callbacks suppressed May 17 01:05:17.025669 kernel: audit: type=1400 audit(1747443917.019:785): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:17.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:17.059909 kernel: audit: type=1400 audit(1747443917.019:786): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:17.060355 kernel: audit: type=1400 audit(1747443917.019:787): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:17.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:17.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:17.095437 kernel: audit: type=1400 audit(1747443917.019:788): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:17.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:17.114264 kernel: audit: type=1400 audit(1747443917.019:789): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:17.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:17.131624 kernel: audit: type=1400 audit(1747443917.019:790): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:17.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:17.149671 kernel: audit: type=1400 audit(1747443917.019:791): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:17.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:17.167580 kernel: audit: type=1400 audit(1747443917.019:792): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:17.174113 kernel: audit: type=1400 audit(1747443917.019:793): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:17.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:17.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:17.189571 env[1453]: time="2025-05-17T01:05:17.189530131Z" level=info msg="StartContainer for \"b1a9d89cf4af6cf448a395c33bf9ab690179760d79a5a1e3312709016afde32f\" returns successfully" May 17 01:05:17.203597 kernel: audit: type=1400 audit(1747443917.019:794): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:17.019000 audit: BPF prog-id=112 op=LOAD May 17 01:05:17.019000 audit[2736]: AVC avc: denied { bpf } for pid=2736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:17.019000 audit[2736]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2695 pid=2736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:17.019000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231613964383963663461663663663434386133393563333362663961 May 17 01:05:17.019000 audit[2736]: AVC avc: denied { perfmon } for pid=2736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:17.019000 audit[2736]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2695 pid=2736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:17.019000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231613964383963663461663663663434386133393563333362663961 May 17 01:05:17.019000 audit[2736]: AVC avc: denied { bpf } for pid=2736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:17.019000 audit[2736]: AVC avc: denied { bpf } for pid=2736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:17.019000 audit[2736]: AVC avc: denied { bpf } for pid=2736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:17.019000 audit[2736]: AVC avc: denied { perfmon } for pid=2736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:17.019000 audit[2736]: AVC avc: denied { perfmon } for pid=2736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:17.019000 audit[2736]: AVC avc: denied { perfmon } for pid=2736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:17.019000 audit[2736]: AVC avc: denied { perfmon } for pid=2736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:17.019000 audit[2736]: AVC avc: denied { perfmon } for pid=2736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:17.019000 audit[2736]: AVC avc: denied { bpf } for pid=2736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:17.019000 audit[2736]: AVC avc: denied { bpf } for pid=2736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:17.019000 audit: BPF prog-id=113 op=LOAD May 17 01:05:17.019000 audit[2736]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2695 pid=2736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:17.019000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231613964383963663461663663663434386133393563333362663961 May 17 01:05:17.024000 audit[2736]: AVC avc: denied { bpf } for pid=2736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:17.024000 audit[2736]: AVC avc: denied { bpf } for pid=2736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:17.024000 audit[2736]: AVC avc: denied { perfmon } for pid=2736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:17.024000 audit[2736]: AVC avc: denied { perfmon } for pid=2736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:17.024000 audit[2736]: AVC avc: denied { perfmon } for pid=2736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:17.024000 audit[2736]: AVC avc: denied { perfmon } for pid=2736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:17.024000 audit[2736]: AVC avc: denied { perfmon } for pid=2736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:17.024000 audit[2736]: AVC avc: denied { bpf } for pid=2736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:17.024000 audit[2736]: AVC avc: denied { bpf } for pid=2736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:17.024000 audit: BPF prog-id=114 op=LOAD May 17 01:05:17.024000 audit[2736]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2695 pid=2736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:17.024000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231613964383963663461663663663434386133393563333362663961 May 17 01:05:17.041000 audit: BPF prog-id=114 op=UNLOAD May 17 01:05:17.041000 audit: BPF prog-id=113 op=UNLOAD May 17 01:05:17.041000 audit[2736]: AVC avc: denied { bpf } for pid=2736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:17.041000 audit[2736]: AVC avc: denied { bpf } for pid=2736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:17.041000 audit[2736]: AVC avc: denied { bpf } for pid=2736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:17.041000 audit[2736]: AVC avc: denied { perfmon } for pid=2736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:17.041000 audit[2736]: AVC avc: denied { perfmon } for pid=2736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:17.041000 audit[2736]: AVC avc: denied { perfmon } for pid=2736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:17.041000 audit[2736]: AVC avc: denied { perfmon } for pid=2736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:17.041000 audit[2736]: AVC avc: denied { perfmon } for pid=2736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:17.041000 audit[2736]: AVC avc: denied { bpf } for pid=2736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:17.041000 audit[2736]: AVC avc: denied { bpf } for pid=2736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:17.041000 audit: BPF prog-id=115 op=LOAD May 17 01:05:17.041000 audit[2736]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2695 pid=2736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:17.041000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231613964383963663461663663663434386133393563333362663961 May 17 01:05:17.216581 kubelet[2439]: I0517 01:05:17.216444 2439 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-844669ff44-wmwf6" podStartSLOduration=2.293657606 podStartE2EDuration="8.216426496s" podCreationTimestamp="2025-05-17 01:05:09 +0000 UTC" firstStartedPulling="2025-05-17 01:05:11.006887968 +0000 UTC m=+8.007345356" lastFinishedPulling="2025-05-17 01:05:16.929656858 +0000 UTC m=+13.930114246" observedRunningTime="2025-05-17 01:05:17.216092168 +0000 UTC m=+14.216549556" watchObservedRunningTime="2025-05-17 01:05:17.216426496 +0000 UTC m=+14.216883884" May 17 01:05:23.144813 sudo[1783]: pam_unix(sudo:session): session closed for user root May 17 01:05:23.143000 audit[1783]: USER_END pid=1783 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 01:05:23.150871 kernel: kauditd_printk_skb: 47 callbacks suppressed May 17 01:05:23.150944 kernel: audit: type=1106 audit(1747443923.143:803): pid=1783 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 01:05:23.144000 audit[1783]: CRED_DISP pid=1783 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 01:05:23.210927 kernel: audit: type=1104 audit(1747443923.144:804): pid=1783 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 01:05:23.251053 sshd[1780]: pam_unix(sshd:session): session closed for user core May 17 01:05:23.255000 audit[1780]: USER_END pid=1780 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:05:23.260279 systemd[1]: sshd@6-10.200.20.11:22-10.200.16.10:43994.service: Deactivated successfully. May 17 01:05:23.261730 systemd[1]: session-9.scope: Deactivated successfully. May 17 01:05:23.261885 systemd[1]: session-9.scope: Consumed 7.091s CPU time. May 17 01:05:23.284852 systemd-logind[1440]: Session 9 logged out. Waiting for processes to exit. May 17 01:05:23.285870 systemd-logind[1440]: Removed session 9. May 17 01:05:23.255000 audit[1780]: CRED_DISP pid=1780 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:05:23.313325 kernel: audit: type=1106 audit(1747443923.255:805): pid=1780 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:05:23.313473 kernel: audit: type=1104 audit(1747443923.255:806): pid=1780 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:05:23.259000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.11:22-10.200.16.10:43994 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:05:23.335264 kernel: audit: type=1131 audit(1747443923.259:807): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.11:22-10.200.16.10:43994 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:05:26.331000 audit[2812]: NETFILTER_CFG table=filter:92 family=2 entries=15 op=nft_register_rule pid=2812 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:05:26.331000 audit[2812]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=ffffe26fa410 a2=0 a3=1 items=0 ppid=2540 pid=2812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:26.381616 kernel: audit: type=1325 audit(1747443926.331:808): table=filter:92 family=2 entries=15 op=nft_register_rule pid=2812 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:05:26.381764 kernel: audit: type=1300 audit(1747443926.331:808): arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=ffffe26fa410 a2=0 a3=1 items=0 ppid=2540 pid=2812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:26.331000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:05:26.404607 kernel: audit: type=1327 audit(1747443926.331:808): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:05:26.349000 audit[2812]: NETFILTER_CFG table=nat:93 family=2 entries=12 op=nft_register_rule pid=2812 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:05:26.421861 kernel: audit: type=1325 audit(1747443926.349:809): table=nat:93 family=2 entries=12 op=nft_register_rule pid=2812 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:05:26.349000 audit[2812]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffe26fa410 a2=0 a3=1 items=0 ppid=2540 pid=2812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:26.452902 kernel: audit: type=1300 audit(1747443926.349:809): arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffe26fa410 a2=0 a3=1 items=0 ppid=2540 pid=2812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:26.349000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:05:26.456000 audit[2814]: NETFILTER_CFG table=filter:94 family=2 entries=16 op=nft_register_rule pid=2814 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:05:26.456000 audit[2814]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=ffffd0fbcc30 a2=0 a3=1 items=0 ppid=2540 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:26.456000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:05:26.467000 audit[2814]: NETFILTER_CFG table=nat:95 family=2 entries=12 op=nft_register_rule pid=2814 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:05:26.467000 audit[2814]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffd0fbcc30 a2=0 a3=1 items=0 ppid=2540 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:26.467000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:05:30.705000 audit[2817]: NETFILTER_CFG table=filter:96 family=2 entries=17 op=nft_register_rule pid=2817 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:05:30.711175 kernel: kauditd_printk_skb: 7 callbacks suppressed May 17 01:05:30.711282 kernel: audit: type=1325 audit(1747443930.705:812): table=filter:96 family=2 entries=17 op=nft_register_rule pid=2817 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:05:30.705000 audit[2817]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6736 a0=3 a1=fffffa4251d0 a2=0 a3=1 items=0 ppid=2540 pid=2817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:30.754210 kernel: audit: type=1300 audit(1747443930.705:812): arch=c00000b7 syscall=211 success=yes exit=6736 a0=3 a1=fffffa4251d0 a2=0 a3=1 items=0 ppid=2540 pid=2817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:30.705000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:05:30.777304 kernel: audit: type=1327 audit(1747443930.705:812): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:05:30.756000 audit[2817]: NETFILTER_CFG table=nat:97 family=2 entries=12 op=nft_register_rule pid=2817 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:05:30.794645 kernel: audit: type=1325 audit(1747443930.756:813): table=nat:97 family=2 entries=12 op=nft_register_rule pid=2817 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:05:30.756000 audit[2817]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=fffffa4251d0 a2=0 a3=1 items=0 ppid=2540 pid=2817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:30.825765 kernel: audit: type=1300 audit(1747443930.756:813): arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=fffffa4251d0 a2=0 a3=1 items=0 ppid=2540 pid=2817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:30.834375 systemd[1]: Created slice kubepods-besteffort-podd461ff99_5c48_4bf3_b108_f897132b161c.slice. May 17 01:05:30.756000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:05:30.854383 kernel: audit: type=1327 audit(1747443930.756:813): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:05:30.906000 audit[2819]: NETFILTER_CFG table=filter:98 family=2 entries=18 op=nft_register_rule pid=2819 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:05:30.906000 audit[2819]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6736 a0=3 a1=ffffee222770 a2=0 a3=1 items=0 ppid=2540 pid=2819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:30.952732 kernel: audit: type=1325 audit(1747443930.906:814): table=filter:98 family=2 entries=18 op=nft_register_rule pid=2819 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:05:30.952929 kernel: audit: type=1300 audit(1747443930.906:814): arch=c00000b7 syscall=211 success=yes exit=6736 a0=3 a1=ffffee222770 a2=0 a3=1 items=0 ppid=2540 pid=2819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:30.954629 kubelet[2439]: I0517 01:05:30.954553 2439 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/d461ff99-5c48-4bf3-b108-f897132b161c-typha-certs\") pod \"calico-typha-57d4dc79d9-w8w5b\" (UID: \"d461ff99-5c48-4bf3-b108-f897132b161c\") " pod="calico-system/calico-typha-57d4dc79d9-w8w5b" May 17 01:05:30.954629 kubelet[2439]: I0517 01:05:30.954623 2439 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/d461ff99-5c48-4bf3-b108-f897132b161c-tigera-ca-bundle\") pod \"calico-typha-57d4dc79d9-w8w5b\" (UID: \"d461ff99-5c48-4bf3-b108-f897132b161c\") " pod="calico-system/calico-typha-57d4dc79d9-w8w5b" May 17 01:05:30.906000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:05:30.955185 kubelet[2439]: I0517 01:05:30.954656 2439 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ks78k\" (UniqueName: \"kubernetes.io/projected/d461ff99-5c48-4bf3-b108-f897132b161c-kube-api-access-ks78k\") pod \"calico-typha-57d4dc79d9-w8w5b\" (UID: \"d461ff99-5c48-4bf3-b108-f897132b161c\") " pod="calico-system/calico-typha-57d4dc79d9-w8w5b" May 17 01:05:30.969547 kernel: audit: type=1327 audit(1747443930.906:814): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:05:30.934000 audit[2819]: NETFILTER_CFG table=nat:99 family=2 entries=12 op=nft_register_rule pid=2819 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:05:30.985178 kernel: audit: type=1325 audit(1747443930.934:815): table=nat:99 family=2 entries=12 op=nft_register_rule pid=2819 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:05:30.934000 audit[2819]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffee222770 a2=0 a3=1 items=0 ppid=2540 pid=2819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:30.934000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:05:31.084205 systemd[1]: Created slice kubepods-besteffort-pod232b4b77_66b9_4ac9_aa18_d824794fe50b.slice. May 17 01:05:31.137800 env[1453]: time="2025-05-17T01:05:31.137729253Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-57d4dc79d9-w8w5b,Uid:d461ff99-5c48-4bf3-b108-f897132b161c,Namespace:calico-system,Attempt:0,}" May 17 01:05:31.156103 kubelet[2439]: I0517 01:05:31.156001 2439 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/232b4b77-66b9-4ac9-aa18-d824794fe50b-lib-modules\") pod \"calico-node-r82np\" (UID: \"232b4b77-66b9-4ac9-aa18-d824794fe50b\") " pod="calico-system/calico-node-r82np" May 17 01:05:31.156981 kubelet[2439]: I0517 01:05:31.156129 2439 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/232b4b77-66b9-4ac9-aa18-d824794fe50b-var-lib-calico\") pod \"calico-node-r82np\" (UID: \"232b4b77-66b9-4ac9-aa18-d824794fe50b\") " pod="calico-system/calico-node-r82np" May 17 01:05:31.156981 kubelet[2439]: I0517 01:05:31.156160 2439 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/232b4b77-66b9-4ac9-aa18-d824794fe50b-xtables-lock\") pod \"calico-node-r82np\" (UID: \"232b4b77-66b9-4ac9-aa18-d824794fe50b\") " pod="calico-system/calico-node-r82np" May 17 01:05:31.156981 kubelet[2439]: I0517 01:05:31.156221 2439 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-r7mb6\" (UniqueName: \"kubernetes.io/projected/232b4b77-66b9-4ac9-aa18-d824794fe50b-kube-api-access-r7mb6\") pod \"calico-node-r82np\" (UID: \"232b4b77-66b9-4ac9-aa18-d824794fe50b\") " pod="calico-system/calico-node-r82np" May 17 01:05:31.156981 kubelet[2439]: I0517 01:05:31.156282 2439 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/232b4b77-66b9-4ac9-aa18-d824794fe50b-node-certs\") pod \"calico-node-r82np\" (UID: \"232b4b77-66b9-4ac9-aa18-d824794fe50b\") " pod="calico-system/calico-node-r82np" May 17 01:05:31.156981 kubelet[2439]: I0517 01:05:31.156364 2439 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/232b4b77-66b9-4ac9-aa18-d824794fe50b-cni-bin-dir\") pod \"calico-node-r82np\" (UID: \"232b4b77-66b9-4ac9-aa18-d824794fe50b\") " pod="calico-system/calico-node-r82np" May 17 01:05:31.157171 kubelet[2439]: I0517 01:05:31.156432 2439 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/232b4b77-66b9-4ac9-aa18-d824794fe50b-var-run-calico\") pod \"calico-node-r82np\" (UID: \"232b4b77-66b9-4ac9-aa18-d824794fe50b\") " pod="calico-system/calico-node-r82np" May 17 01:05:31.157171 kubelet[2439]: I0517 01:05:31.156468 2439 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/232b4b77-66b9-4ac9-aa18-d824794fe50b-flexvol-driver-host\") pod \"calico-node-r82np\" (UID: \"232b4b77-66b9-4ac9-aa18-d824794fe50b\") " pod="calico-system/calico-node-r82np" May 17 01:05:31.157171 kubelet[2439]: I0517 01:05:31.156494 2439 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/232b4b77-66b9-4ac9-aa18-d824794fe50b-tigera-ca-bundle\") pod \"calico-node-r82np\" (UID: \"232b4b77-66b9-4ac9-aa18-d824794fe50b\") " pod="calico-system/calico-node-r82np" May 17 01:05:31.157171 kubelet[2439]: I0517 01:05:31.156559 2439 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/232b4b77-66b9-4ac9-aa18-d824794fe50b-cni-log-dir\") pod \"calico-node-r82np\" (UID: \"232b4b77-66b9-4ac9-aa18-d824794fe50b\") " pod="calico-system/calico-node-r82np" May 17 01:05:31.157171 kubelet[2439]: I0517 01:05:31.156618 2439 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/232b4b77-66b9-4ac9-aa18-d824794fe50b-cni-net-dir\") pod \"calico-node-r82np\" (UID: \"232b4b77-66b9-4ac9-aa18-d824794fe50b\") " pod="calico-system/calico-node-r82np" May 17 01:05:31.157332 kubelet[2439]: I0517 01:05:31.156644 2439 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/232b4b77-66b9-4ac9-aa18-d824794fe50b-policysync\") pod \"calico-node-r82np\" (UID: \"232b4b77-66b9-4ac9-aa18-d824794fe50b\") " pod="calico-system/calico-node-r82np" May 17 01:05:31.188214 env[1453]: time="2025-05-17T01:05:31.187981990Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 01:05:31.188214 env[1453]: time="2025-05-17T01:05:31.188030311Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 01:05:31.188214 env[1453]: time="2025-05-17T01:05:31.188044631Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 01:05:31.188421 env[1453]: time="2025-05-17T01:05:31.188240115Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ab4bba1ebba01b6e41d973b270a3476fae58d6c8412cbee6ec2e66ae1b0c78d9 pid=2830 runtime=io.containerd.runc.v2 May 17 01:05:31.207407 systemd[1]: Started cri-containerd-ab4bba1ebba01b6e41d973b270a3476fae58d6c8412cbee6ec2e66ae1b0c78d9.scope. May 17 01:05:31.223347 kubelet[2439]: E0517 01:05:31.223219 2439 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-92ktb" podUID="4d21f64d-bc3c-4fa5-8ad3-4aed6c59a824" May 17 01:05:31.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:31.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:31.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:31.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:31.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:31.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:31.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:31.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:31.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:31.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:31.257000 audit: BPF prog-id=116 op=LOAD May 17 01:05:31.261737 kubelet[2439]: E0517 01:05:31.261693 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:31.261737 kubelet[2439]: W0517 01:05:31.261720 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:31.261872 kubelet[2439]: E0517 01:05:31.261759 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:31.262089 kubelet[2439]: E0517 01:05:31.262065 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:31.262089 kubelet[2439]: W0517 01:05:31.262081 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:31.262197 kubelet[2439]: E0517 01:05:31.262111 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:31.262366 kubelet[2439]: E0517 01:05:31.262347 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:31.262366 kubelet[2439]: W0517 01:05:31.262362 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:31.262443 kubelet[2439]: E0517 01:05:31.262416 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:31.262615 kubelet[2439]: E0517 01:05:31.262595 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:31.262615 kubelet[2439]: W0517 01:05:31.262610 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:31.262704 kubelet[2439]: E0517 01:05:31.262653 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:31.262869 kubelet[2439]: E0517 01:05:31.262848 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:31.262869 kubelet[2439]: W0517 01:05:31.262864 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:31.262972 kubelet[2439]: E0517 01:05:31.262894 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:31.263151 kubelet[2439]: E0517 01:05:31.263131 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:31.263151 kubelet[2439]: W0517 01:05:31.263147 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:31.263238 kubelet[2439]: E0517 01:05:31.263189 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:31.263399 kubelet[2439]: E0517 01:05:31.263379 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:31.263399 kubelet[2439]: W0517 01:05:31.263394 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:31.263486 kubelet[2439]: E0517 01:05:31.263410 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:31.264000 audit[2838]: AVC avc: denied { bpf } for pid=2838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:31.264000 audit[2838]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2830 pid=2838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:31.264000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162346262613165626261303162366534316439373362323730613334 May 17 01:05:31.264000 audit[2838]: AVC avc: denied { perfmon } for pid=2838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:31.264000 audit[2838]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2830 pid=2838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:31.264000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162346262613165626261303162366534316439373362323730613334 May 17 01:05:31.264000 audit[2838]: AVC avc: denied { bpf } for pid=2838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:31.264000 audit[2838]: AVC avc: denied { bpf } for pid=2838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:31.264000 audit[2838]: AVC avc: denied { bpf } for pid=2838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:31.264000 audit[2838]: AVC avc: denied { perfmon } for pid=2838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:31.264000 audit[2838]: AVC avc: denied { perfmon } for pid=2838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:31.264000 audit[2838]: AVC avc: denied { perfmon } for pid=2838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:31.264000 audit[2838]: AVC avc: denied { perfmon } for pid=2838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:31.264000 audit[2838]: AVC avc: denied { perfmon } for pid=2838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:31.264000 audit[2838]: AVC avc: denied { bpf } for pid=2838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:31.264000 audit[2838]: AVC avc: denied { bpf } for pid=2838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:31.264000 audit: BPF prog-id=117 op=LOAD May 17 01:05:31.264000 audit[2838]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2830 pid=2838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:31.264000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162346262613165626261303162366534316439373362323730613334 May 17 01:05:31.264000 audit[2838]: AVC avc: denied { bpf } for pid=2838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:31.264000 audit[2838]: AVC avc: denied { bpf } for pid=2838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:31.264000 audit[2838]: AVC avc: denied { perfmon } for pid=2838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:31.264000 audit[2838]: AVC avc: denied { perfmon } for pid=2838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:31.264000 audit[2838]: AVC avc: denied { perfmon } for pid=2838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:31.264000 audit[2838]: AVC avc: denied { perfmon } for pid=2838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:31.264000 audit[2838]: AVC avc: denied { perfmon } for pid=2838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:31.264000 audit[2838]: AVC avc: denied { bpf } for pid=2838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:31.264000 audit[2838]: AVC avc: denied { bpf } for pid=2838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:31.264000 audit: BPF prog-id=118 op=LOAD May 17 01:05:31.265980 kubelet[2439]: E0517 01:05:31.265502 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:31.265980 kubelet[2439]: W0517 01:05:31.265515 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:31.265980 kubelet[2439]: E0517 01:05:31.265531 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:31.266250 kubelet[2439]: E0517 01:05:31.266217 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:31.266250 kubelet[2439]: W0517 01:05:31.266234 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:31.266340 kubelet[2439]: E0517 01:05:31.266264 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:31.266772 kubelet[2439]: E0517 01:05:31.266494 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:31.266772 kubelet[2439]: W0517 01:05:31.266509 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:31.266772 kubelet[2439]: E0517 01:05:31.266570 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:31.266952 kubelet[2439]: E0517 01:05:31.266804 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:31.266952 kubelet[2439]: W0517 01:05:31.266814 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:31.266952 kubelet[2439]: E0517 01:05:31.266889 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:31.268025 kubelet[2439]: E0517 01:05:31.267146 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:31.268025 kubelet[2439]: W0517 01:05:31.267162 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:31.268025 kubelet[2439]: E0517 01:05:31.267197 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:31.264000 audit[2838]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2830 pid=2838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:31.264000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162346262613165626261303162366534316439373362323730613334 May 17 01:05:31.269000 audit: BPF prog-id=118 op=UNLOAD May 17 01:05:31.269000 audit: BPF prog-id=117 op=UNLOAD May 17 01:05:31.269000 audit[2838]: AVC avc: denied { bpf } for pid=2838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:31.269000 audit[2838]: AVC avc: denied { bpf } for pid=2838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:31.269000 audit[2838]: AVC avc: denied { bpf } for pid=2838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:31.269000 audit[2838]: AVC avc: denied { perfmon } for pid=2838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:31.269000 audit[2838]: AVC avc: denied { perfmon } for pid=2838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:31.269000 audit[2838]: AVC avc: denied { perfmon } for pid=2838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:31.269000 audit[2838]: AVC avc: denied { perfmon } for pid=2838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:31.269000 audit[2838]: AVC avc: denied { perfmon } for pid=2838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:31.269000 audit[2838]: AVC avc: denied { bpf } for pid=2838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:31.269000 audit[2838]: AVC avc: denied { bpf } for pid=2838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:31.269000 audit: BPF prog-id=119 op=LOAD May 17 01:05:31.269000 audit[2838]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2830 pid=2838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:31.269000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162346262613165626261303162366534316439373362323730613334 May 17 01:05:31.270688 kubelet[2439]: E0517 01:05:31.270544 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:31.270688 kubelet[2439]: W0517 01:05:31.270558 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:31.270688 kubelet[2439]: E0517 01:05:31.270583 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:31.272188 kubelet[2439]: E0517 01:05:31.272150 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:31.272188 kubelet[2439]: W0517 01:05:31.272167 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:31.272188 kubelet[2439]: E0517 01:05:31.272193 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:31.273204 kubelet[2439]: E0517 01:05:31.273162 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:31.273204 kubelet[2439]: W0517 01:05:31.273196 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:31.273323 kubelet[2439]: E0517 01:05:31.273270 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:31.273471 kubelet[2439]: E0517 01:05:31.273448 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:31.273471 kubelet[2439]: W0517 01:05:31.273464 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:31.273542 kubelet[2439]: E0517 01:05:31.273509 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:31.273859 kubelet[2439]: E0517 01:05:31.273814 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:31.273859 kubelet[2439]: W0517 01:05:31.273845 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:31.273859 kubelet[2439]: E0517 01:05:31.273860 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:31.274264 kubelet[2439]: E0517 01:05:31.274243 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:31.274264 kubelet[2439]: W0517 01:05:31.274258 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:31.274363 kubelet[2439]: E0517 01:05:31.274269 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:31.287157 kubelet[2439]: E0517 01:05:31.287119 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:31.287157 kubelet[2439]: W0517 01:05:31.287145 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:31.287157 kubelet[2439]: E0517 01:05:31.287166 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:31.287965 kubelet[2439]: E0517 01:05:31.287943 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:31.288029 kubelet[2439]: W0517 01:05:31.287960 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:31.288029 kubelet[2439]: E0517 01:05:31.288008 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:31.288423 kubelet[2439]: E0517 01:05:31.288170 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:31.288423 kubelet[2439]: W0517 01:05:31.288183 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:31.288423 kubelet[2439]: E0517 01:05:31.288192 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:31.288423 kubelet[2439]: E0517 01:05:31.288332 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:31.288423 kubelet[2439]: W0517 01:05:31.288342 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:31.288423 kubelet[2439]: E0517 01:05:31.288350 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:31.288630 kubelet[2439]: E0517 01:05:31.288497 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:31.288630 kubelet[2439]: W0517 01:05:31.288506 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:31.288630 kubelet[2439]: E0517 01:05:31.288518 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:31.288698 kubelet[2439]: E0517 01:05:31.288651 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:31.288698 kubelet[2439]: W0517 01:05:31.288659 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:31.288698 kubelet[2439]: E0517 01:05:31.288667 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:31.288824 kubelet[2439]: E0517 01:05:31.288808 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:31.288824 kubelet[2439]: W0517 01:05:31.288820 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:31.288881 kubelet[2439]: E0517 01:05:31.288832 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:31.289019 kubelet[2439]: E0517 01:05:31.288988 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:31.289019 kubelet[2439]: W0517 01:05:31.289001 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:31.289019 kubelet[2439]: E0517 01:05:31.289016 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:31.289190 kubelet[2439]: E0517 01:05:31.289174 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:31.289190 kubelet[2439]: W0517 01:05:31.289186 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:31.289257 kubelet[2439]: E0517 01:05:31.289197 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:31.289957 kubelet[2439]: E0517 01:05:31.289334 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:31.289957 kubelet[2439]: W0517 01:05:31.289347 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:31.289957 kubelet[2439]: E0517 01:05:31.289365 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:31.289957 kubelet[2439]: E0517 01:05:31.289492 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:31.289957 kubelet[2439]: W0517 01:05:31.289500 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:31.289957 kubelet[2439]: E0517 01:05:31.289508 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:31.289957 kubelet[2439]: E0517 01:05:31.289629 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:31.289957 kubelet[2439]: W0517 01:05:31.289644 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:31.289957 kubelet[2439]: E0517 01:05:31.289702 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:31.291139 kubelet[2439]: E0517 01:05:31.291084 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:31.291139 kubelet[2439]: W0517 01:05:31.291125 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:31.291265 kubelet[2439]: E0517 01:05:31.291146 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:31.293121 kubelet[2439]: E0517 01:05:31.293095 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:31.293121 kubelet[2439]: W0517 01:05:31.293113 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:31.293259 kubelet[2439]: E0517 01:05:31.293135 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:31.293364 kubelet[2439]: E0517 01:05:31.293341 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:31.293364 kubelet[2439]: W0517 01:05:31.293353 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:31.293429 kubelet[2439]: E0517 01:05:31.293362 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:31.293612 kubelet[2439]: E0517 01:05:31.293585 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:31.293612 kubelet[2439]: W0517 01:05:31.293606 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:31.293704 kubelet[2439]: E0517 01:05:31.293617 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:31.293793 kubelet[2439]: E0517 01:05:31.293776 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:31.293829 kubelet[2439]: W0517 01:05:31.293794 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:31.293829 kubelet[2439]: E0517 01:05:31.293803 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:31.294046 kubelet[2439]: E0517 01:05:31.294018 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:31.294046 kubelet[2439]: W0517 01:05:31.294039 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:31.294143 kubelet[2439]: E0517 01:05:31.294049 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:31.294316 kubelet[2439]: E0517 01:05:31.294296 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:31.294316 kubelet[2439]: W0517 01:05:31.294310 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:31.294413 kubelet[2439]: E0517 01:05:31.294319 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:31.294500 kubelet[2439]: E0517 01:05:31.294483 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:31.294500 kubelet[2439]: W0517 01:05:31.294496 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:31.294556 kubelet[2439]: E0517 01:05:31.294504 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:31.294724 kubelet[2439]: E0517 01:05:31.294704 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:31.294724 kubelet[2439]: W0517 01:05:31.294718 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:31.294806 kubelet[2439]: E0517 01:05:31.294728 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:31.339145 env[1453]: time="2025-05-17T01:05:31.339084128Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-57d4dc79d9-w8w5b,Uid:d461ff99-5c48-4bf3-b108-f897132b161c,Namespace:calico-system,Attempt:0,} returns sandbox id \"ab4bba1ebba01b6e41d973b270a3476fae58d6c8412cbee6ec2e66ae1b0c78d9\"" May 17 01:05:31.340900 env[1453]: time="2025-05-17T01:05:31.340863400Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.0\"" May 17 01:05:31.360095 kubelet[2439]: E0517 01:05:31.360051 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:31.360095 kubelet[2439]: W0517 01:05:31.360076 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:31.360095 kubelet[2439]: E0517 01:05:31.360096 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:31.360312 kubelet[2439]: I0517 01:05:31.360128 2439 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/4d21f64d-bc3c-4fa5-8ad3-4aed6c59a824-socket-dir\") pod \"csi-node-driver-92ktb\" (UID: \"4d21f64d-bc3c-4fa5-8ad3-4aed6c59a824\") " pod="calico-system/csi-node-driver-92ktb" May 17 01:05:31.360534 kubelet[2439]: E0517 01:05:31.360506 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:31.360534 kubelet[2439]: W0517 01:05:31.360527 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:31.360616 kubelet[2439]: E0517 01:05:31.360547 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:31.360616 kubelet[2439]: I0517 01:05:31.360565 2439 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/4d21f64d-bc3c-4fa5-8ad3-4aed6c59a824-kubelet-dir\") pod \"csi-node-driver-92ktb\" (UID: \"4d21f64d-bc3c-4fa5-8ad3-4aed6c59a824\") " pod="calico-system/csi-node-driver-92ktb" May 17 01:05:31.360801 kubelet[2439]: E0517 01:05:31.360777 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:31.360801 kubelet[2439]: W0517 01:05:31.360793 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:31.360885 kubelet[2439]: E0517 01:05:31.360818 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:31.360885 kubelet[2439]: I0517 01:05:31.360833 2439 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rmr8b\" (UniqueName: \"kubernetes.io/projected/4d21f64d-bc3c-4fa5-8ad3-4aed6c59a824-kube-api-access-rmr8b\") pod \"csi-node-driver-92ktb\" (UID: \"4d21f64d-bc3c-4fa5-8ad3-4aed6c59a824\") " pod="calico-system/csi-node-driver-92ktb" May 17 01:05:31.361192 kubelet[2439]: E0517 01:05:31.361132 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:31.361192 kubelet[2439]: W0517 01:05:31.361147 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:31.361192 kubelet[2439]: E0517 01:05:31.361160 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:31.361192 kubelet[2439]: I0517 01:05:31.361175 2439 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/4d21f64d-bc3c-4fa5-8ad3-4aed6c59a824-registration-dir\") pod \"csi-node-driver-92ktb\" (UID: \"4d21f64d-bc3c-4fa5-8ad3-4aed6c59a824\") " pod="calico-system/csi-node-driver-92ktb" May 17 01:05:31.361467 kubelet[2439]: E0517 01:05:31.361430 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:31.361467 kubelet[2439]: W0517 01:05:31.361450 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:31.361467 kubelet[2439]: E0517 01:05:31.361466 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:31.361572 kubelet[2439]: I0517 01:05:31.361481 2439 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/4d21f64d-bc3c-4fa5-8ad3-4aed6c59a824-varrun\") pod \"csi-node-driver-92ktb\" (UID: \"4d21f64d-bc3c-4fa5-8ad3-4aed6c59a824\") " pod="calico-system/csi-node-driver-92ktb" May 17 01:05:31.361772 kubelet[2439]: E0517 01:05:31.361742 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:31.361772 kubelet[2439]: W0517 01:05:31.361758 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:31.361851 kubelet[2439]: E0517 01:05:31.361838 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:31.362034 kubelet[2439]: E0517 01:05:31.362008 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:31.362034 kubelet[2439]: W0517 01:05:31.362030 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:31.362129 kubelet[2439]: E0517 01:05:31.362117 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:31.362304 kubelet[2439]: E0517 01:05:31.362284 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:31.362304 kubelet[2439]: W0517 01:05:31.362299 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:31.362395 kubelet[2439]: E0517 01:05:31.362385 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:31.362560 kubelet[2439]: E0517 01:05:31.362534 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:31.362560 kubelet[2439]: W0517 01:05:31.362554 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:31.362665 kubelet[2439]: E0517 01:05:31.362646 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:31.362843 kubelet[2439]: E0517 01:05:31.362805 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:31.362843 kubelet[2439]: W0517 01:05:31.362820 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:31.362992 kubelet[2439]: E0517 01:05:31.362973 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:31.363400 kubelet[2439]: E0517 01:05:31.363166 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:31.363400 kubelet[2439]: W0517 01:05:31.363182 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:31.363400 kubelet[2439]: E0517 01:05:31.363192 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:31.363810 kubelet[2439]: E0517 01:05:31.363674 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:31.363810 kubelet[2439]: W0517 01:05:31.363691 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:31.363810 kubelet[2439]: E0517 01:05:31.363702 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:31.364244 kubelet[2439]: E0517 01:05:31.364109 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:31.364244 kubelet[2439]: W0517 01:05:31.364126 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:31.364244 kubelet[2439]: E0517 01:05:31.364147 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:31.364676 kubelet[2439]: E0517 01:05:31.364526 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:31.364676 kubelet[2439]: W0517 01:05:31.364543 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:31.364676 kubelet[2439]: E0517 01:05:31.364555 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:31.365002 kubelet[2439]: E0517 01:05:31.364968 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:31.365002 kubelet[2439]: W0517 01:05:31.364986 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:31.365002 kubelet[2439]: E0517 01:05:31.364999 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:31.388691 env[1453]: time="2025-05-17T01:05:31.388648613Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-r82np,Uid:232b4b77-66b9-4ac9-aa18-d824794fe50b,Namespace:calico-system,Attempt:0,}" May 17 01:05:31.435997 env[1453]: time="2025-05-17T01:05:31.435903177Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 01:05:31.436154 env[1453]: time="2025-05-17T01:05:31.436007459Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 01:05:31.436154 env[1453]: time="2025-05-17T01:05:31.436035860Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 01:05:31.436207 env[1453]: time="2025-05-17T01:05:31.436166742Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5543d027cb99086157193b88fa19eaa7be9459f91cb96c5c0a86def50743465a pid=2926 runtime=io.containerd.runc.v2 May 17 01:05:31.458806 systemd[1]: Started cri-containerd-5543d027cb99086157193b88fa19eaa7be9459f91cb96c5c0a86def50743465a.scope. May 17 01:05:31.462410 kubelet[2439]: E0517 01:05:31.462376 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:31.462410 kubelet[2439]: W0517 01:05:31.462399 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:31.462534 kubelet[2439]: E0517 01:05:31.462418 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:31.462616 kubelet[2439]: E0517 01:05:31.462591 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:31.462616 kubelet[2439]: W0517 01:05:31.462605 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:31.462616 kubelet[2439]: E0517 01:05:31.462614 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:31.462773 kubelet[2439]: E0517 01:05:31.462752 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:31.462773 kubelet[2439]: W0517 01:05:31.462764 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:31.462773 kubelet[2439]: E0517 01:05:31.462773 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:31.462952 kubelet[2439]: E0517 01:05:31.462922 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:31.462952 kubelet[2439]: W0517 01:05:31.462944 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:31.462952 kubelet[2439]: E0517 01:05:31.462952 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:31.463110 kubelet[2439]: E0517 01:05:31.463087 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:31.463110 kubelet[2439]: W0517 01:05:31.463100 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:31.463110 kubelet[2439]: E0517 01:05:31.463108 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:31.463289 kubelet[2439]: E0517 01:05:31.463266 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:31.463289 kubelet[2439]: W0517 01:05:31.463279 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:31.463289 kubelet[2439]: E0517 01:05:31.463288 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:31.463421 kubelet[2439]: E0517 01:05:31.463401 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:31.463421 kubelet[2439]: W0517 01:05:31.463412 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:31.463421 kubelet[2439]: E0517 01:05:31.463420 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:31.463546 kubelet[2439]: E0517 01:05:31.463525 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:31.463546 kubelet[2439]: W0517 01:05:31.463537 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:31.463546 kubelet[2439]: E0517 01:05:31.463545 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:31.463708 kubelet[2439]: E0517 01:05:31.463687 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:31.463708 kubelet[2439]: W0517 01:05:31.463701 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:31.463708 kubelet[2439]: E0517 01:05:31.463708 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:31.463896 kubelet[2439]: E0517 01:05:31.463864 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:31.463896 kubelet[2439]: W0517 01:05:31.463884 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:31.463896 kubelet[2439]: E0517 01:05:31.463893 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:31.466123 kubelet[2439]: E0517 01:05:31.466093 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:31.466123 kubelet[2439]: W0517 01:05:31.466116 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:31.466123 kubelet[2439]: E0517 01:05:31.466131 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:31.466322 kubelet[2439]: E0517 01:05:31.466303 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:31.466322 kubelet[2439]: W0517 01:05:31.466317 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:31.466384 kubelet[2439]: E0517 01:05:31.466328 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:31.466616 kubelet[2439]: E0517 01:05:31.466596 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:31.466616 kubelet[2439]: W0517 01:05:31.466611 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:31.466673 kubelet[2439]: E0517 01:05:31.466621 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:31.466788 kubelet[2439]: E0517 01:05:31.466766 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:31.466788 kubelet[2439]: W0517 01:05:31.466779 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:31.466788 kubelet[2439]: E0517 01:05:31.466788 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:31.466914 kubelet[2439]: E0517 01:05:31.466895 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:31.466914 kubelet[2439]: W0517 01:05:31.466906 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:31.466914 kubelet[2439]: E0517 01:05:31.466913 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:31.467052 kubelet[2439]: E0517 01:05:31.467035 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:31.467052 kubelet[2439]: W0517 01:05:31.467046 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:31.467106 kubelet[2439]: E0517 01:05:31.467054 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:31.467208 kubelet[2439]: E0517 01:05:31.467187 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:31.467208 kubelet[2439]: W0517 01:05:31.467199 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:31.467208 kubelet[2439]: E0517 01:05:31.467207 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:31.467358 kubelet[2439]: E0517 01:05:31.467337 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:31.467358 kubelet[2439]: W0517 01:05:31.467348 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:31.467358 kubelet[2439]: E0517 01:05:31.467357 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:31.467486 kubelet[2439]: E0517 01:05:31.467468 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:31.467486 kubelet[2439]: W0517 01:05:31.467479 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:31.467486 kubelet[2439]: E0517 01:05:31.467486 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:31.467595 kubelet[2439]: E0517 01:05:31.467585 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:31.467595 kubelet[2439]: W0517 01:05:31.467593 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:31.467641 kubelet[2439]: E0517 01:05:31.467599 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:31.467745 kubelet[2439]: E0517 01:05:31.467722 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:31.467745 kubelet[2439]: W0517 01:05:31.467736 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:31.467745 kubelet[2439]: E0517 01:05:31.467743 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:31.468169 kubelet[2439]: E0517 01:05:31.468136 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:31.468169 kubelet[2439]: W0517 01:05:31.468153 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:31.468169 kubelet[2439]: E0517 01:05:31.468163 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:31.468466 kubelet[2439]: E0517 01:05:31.468440 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:31.468466 kubelet[2439]: W0517 01:05:31.468465 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:31.468524 kubelet[2439]: E0517 01:05:31.468476 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:31.468641 kubelet[2439]: E0517 01:05:31.468621 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:31.468641 kubelet[2439]: W0517 01:05:31.468636 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:31.468699 kubelet[2439]: E0517 01:05:31.468645 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:31.468830 kubelet[2439]: E0517 01:05:31.468807 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:31.468830 kubelet[2439]: W0517 01:05:31.468821 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:31.468830 kubelet[2439]: E0517 01:05:31.468830 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:31.486954 kubelet[2439]: E0517 01:05:31.486841 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:31.486954 kubelet[2439]: W0517 01:05:31.486865 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:31.486954 kubelet[2439]: E0517 01:05:31.486893 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:31.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:31.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:31.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:31.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:31.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:31.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:31.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:31.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:31.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:31.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:31.517000 audit: BPF prog-id=120 op=LOAD May 17 01:05:31.517000 audit[2936]: AVC avc: denied { bpf } for pid=2936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:31.517000 audit[2936]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2926 pid=2936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:31.517000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535343364303237636239393038363135373139336238386661313965 May 17 01:05:31.517000 audit[2936]: AVC avc: denied { perfmon } for pid=2936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:31.517000 audit[2936]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2926 pid=2936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:31.517000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535343364303237636239393038363135373139336238386661313965 May 17 01:05:31.517000 audit[2936]: AVC avc: denied { bpf } for pid=2936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:31.517000 audit[2936]: AVC avc: denied { bpf } for pid=2936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:31.517000 audit[2936]: AVC avc: denied { bpf } for pid=2936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:31.517000 audit[2936]: AVC avc: denied { perfmon } for pid=2936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:31.517000 audit[2936]: AVC avc: denied { perfmon } for pid=2936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:31.517000 audit[2936]: AVC avc: denied { perfmon } for pid=2936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:31.517000 audit[2936]: AVC avc: denied { perfmon } for pid=2936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:31.517000 audit[2936]: AVC avc: denied { perfmon } for pid=2936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:31.517000 audit[2936]: AVC avc: denied { bpf } for pid=2936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:31.517000 audit[2936]: AVC avc: denied { bpf } for pid=2936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:31.517000 audit: BPF prog-id=121 op=LOAD May 17 01:05:31.517000 audit[2936]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2926 pid=2936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:31.517000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535343364303237636239393038363135373139336238386661313965 May 17 01:05:31.517000 audit[2936]: AVC avc: denied { bpf } for pid=2936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:31.517000 audit[2936]: AVC avc: denied { bpf } for pid=2936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:31.517000 audit[2936]: AVC avc: denied { perfmon } for pid=2936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:31.517000 audit[2936]: AVC avc: denied { perfmon } for pid=2936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:31.517000 audit[2936]: AVC avc: denied { perfmon } for pid=2936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:31.517000 audit[2936]: AVC avc: denied { perfmon } for pid=2936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:31.517000 audit[2936]: AVC avc: denied { perfmon } for pid=2936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:31.517000 audit[2936]: AVC avc: denied { bpf } for pid=2936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:31.517000 audit[2936]: AVC avc: denied { bpf } for pid=2936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:31.517000 audit: BPF prog-id=122 op=LOAD May 17 01:05:31.517000 audit[2936]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2926 pid=2936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:31.517000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535343364303237636239393038363135373139336238386661313965 May 17 01:05:31.517000 audit: BPF prog-id=122 op=UNLOAD May 17 01:05:31.517000 audit: BPF prog-id=121 op=UNLOAD May 17 01:05:31.517000 audit[2936]: AVC avc: denied { bpf } for pid=2936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:31.517000 audit[2936]: AVC avc: denied { bpf } for pid=2936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:31.517000 audit[2936]: AVC avc: denied { bpf } for pid=2936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:31.517000 audit[2936]: AVC avc: denied { perfmon } for pid=2936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:31.517000 audit[2936]: AVC avc: denied { perfmon } for pid=2936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:31.517000 audit[2936]: AVC avc: denied { perfmon } for pid=2936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:31.517000 audit[2936]: AVC avc: denied { perfmon } for pid=2936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:31.517000 audit[2936]: AVC avc: denied { perfmon } for pid=2936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:31.517000 audit[2936]: AVC avc: denied { bpf } for pid=2936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:31.517000 audit[2936]: AVC avc: denied { bpf } for pid=2936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:31.517000 audit: BPF prog-id=123 op=LOAD May 17 01:05:31.517000 audit[2936]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2926 pid=2936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:31.517000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535343364303237636239393038363135373139336238386661313965 May 17 01:05:31.539435 env[1453]: time="2025-05-17T01:05:31.539385145Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-r82np,Uid:232b4b77-66b9-4ac9-aa18-d824794fe50b,Namespace:calico-system,Attempt:0,} returns sandbox id \"5543d027cb99086157193b88fa19eaa7be9459f91cb96c5c0a86def50743465a\"" May 17 01:05:31.817000 audit[2987]: NETFILTER_CFG table=filter:100 family=2 entries=20 op=nft_register_rule pid=2987 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:05:31.817000 audit[2987]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8224 a0=3 a1=fffff4db7410 a2=0 a3=1 items=0 ppid=2540 pid=2987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:31.817000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:05:31.824000 audit[2987]: NETFILTER_CFG table=nat:101 family=2 entries=12 op=nft_register_rule pid=2987 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:05:31.824000 audit[2987]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=fffff4db7410 a2=0 a3=1 items=0 ppid=2540 pid=2987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:31.824000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:05:32.065330 systemd[1]: run-containerd-runc-k8s.io-ab4bba1ebba01b6e41d973b270a3476fae58d6c8412cbee6ec2e66ae1b0c78d9-runc.4RLrsI.mount: Deactivated successfully. May 17 01:05:32.684527 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1594740646.mount: Deactivated successfully. May 17 01:05:32.835000 audit[2989]: NETFILTER_CFG table=filter:102 family=2 entries=22 op=nft_register_rule pid=2989 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:05:32.835000 audit[2989]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8224 a0=3 a1=ffffd4a560a0 a2=0 a3=1 items=0 ppid=2540 pid=2989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:32.835000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:05:32.839000 audit[2989]: NETFILTER_CFG table=nat:103 family=2 entries=12 op=nft_register_rule pid=2989 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:05:32.839000 audit[2989]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffd4a560a0 a2=0 a3=1 items=0 ppid=2540 pid=2989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:32.839000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:05:33.120670 kubelet[2439]: E0517 01:05:33.120193 2439 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-92ktb" podUID="4d21f64d-bc3c-4fa5-8ad3-4aed6c59a824" May 17 01:05:33.915632 env[1453]: time="2025-05-17T01:05:33.915576059Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:05:33.924241 env[1453]: time="2025-05-17T01:05:33.924199847Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:05ca98cdd7b8267a0dc5550048c0a195c8d42f85d92f090a669493485d8a6beb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:05:33.929632 env[1453]: time="2025-05-17T01:05:33.929591900Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:05:33.937594 env[1453]: time="2025-05-17T01:05:33.937535956Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:d282f6c773c4631b9dc8379eb093c54ca34c7728d55d6509cb45da5e1f5baf8f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:05:33.937859 env[1453]: time="2025-05-17T01:05:33.937827321Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.0\" returns image reference \"sha256:05ca98cdd7b8267a0dc5550048c0a195c8d42f85d92f090a669493485d8a6beb\"" May 17 01:05:33.940209 env[1453]: time="2025-05-17T01:05:33.940166881Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0\"" May 17 01:05:33.959917 env[1453]: time="2025-05-17T01:05:33.959856740Z" level=info msg="CreateContainer within sandbox \"ab4bba1ebba01b6e41d973b270a3476fae58d6c8412cbee6ec2e66ae1b0c78d9\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" May 17 01:05:34.005118 env[1453]: time="2025-05-17T01:05:34.005064715Z" level=info msg="CreateContainer within sandbox \"ab4bba1ebba01b6e41d973b270a3476fae58d6c8412cbee6ec2e66ae1b0c78d9\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"ac8bd6b023b5a5b3db5badb0970497deed1a9087d8674cb5244e640ea69bcfa9\"" May 17 01:05:34.006141 env[1453]: time="2025-05-17T01:05:34.006104693Z" level=info msg="StartContainer for \"ac8bd6b023b5a5b3db5badb0970497deed1a9087d8674cb5244e640ea69bcfa9\"" May 17 01:05:34.033460 systemd[1]: Started cri-containerd-ac8bd6b023b5a5b3db5badb0970497deed1a9087d8674cb5244e640ea69bcfa9.scope. May 17 01:05:34.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:34.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:34.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:34.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:34.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:34.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:34.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:34.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:34.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:34.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:34.064000 audit: BPF prog-id=124 op=LOAD May 17 01:05:34.065000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:34.065000 audit[3000]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2830 pid=3000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:34.065000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163386264366230323362356135623364623562616462303937303439 May 17 01:05:34.065000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:34.065000 audit[3000]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2830 pid=3000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:34.065000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163386264366230323362356135623364623562616462303937303439 May 17 01:05:34.065000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:34.065000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:34.065000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:34.065000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:34.065000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:34.065000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:34.065000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:34.065000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:34.065000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:34.065000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:34.065000 audit: BPF prog-id=125 op=LOAD May 17 01:05:34.065000 audit[3000]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2830 pid=3000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:34.065000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163386264366230323362356135623364623562616462303937303439 May 17 01:05:34.065000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:34.065000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:34.065000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:34.065000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:34.065000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:34.065000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:34.065000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:34.065000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:34.065000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:34.065000 audit: BPF prog-id=126 op=LOAD May 17 01:05:34.065000 audit[3000]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2830 pid=3000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:34.065000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163386264366230323362356135623364623562616462303937303439 May 17 01:05:34.065000 audit: BPF prog-id=126 op=UNLOAD May 17 01:05:34.065000 audit: BPF prog-id=125 op=UNLOAD May 17 01:05:34.065000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:34.065000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:34.065000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:34.065000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:34.065000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:34.065000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:34.065000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:34.065000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:34.065000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:34.065000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:34.065000 audit: BPF prog-id=127 op=LOAD May 17 01:05:34.065000 audit[3000]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2830 pid=3000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:34.065000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163386264366230323362356135623364623562616462303937303439 May 17 01:05:34.093326 env[1453]: time="2025-05-17T01:05:34.093265962Z" level=info msg="StartContainer for \"ac8bd6b023b5a5b3db5badb0970497deed1a9087d8674cb5244e640ea69bcfa9\" returns successfully" May 17 01:05:34.256841 kubelet[2439]: I0517 01:05:34.256758 2439 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-57d4dc79d9-w8w5b" podStartSLOduration=1.657961406 podStartE2EDuration="4.256731079s" podCreationTimestamp="2025-05-17 01:05:30 +0000 UTC" firstStartedPulling="2025-05-17 01:05:31.340364871 +0000 UTC m=+28.340822219" lastFinishedPulling="2025-05-17 01:05:33.939134544 +0000 UTC m=+30.939591892" observedRunningTime="2025-05-17 01:05:34.256572396 +0000 UTC m=+31.257029784" watchObservedRunningTime="2025-05-17 01:05:34.256731079 +0000 UTC m=+31.257188467" May 17 01:05:34.321912 kubelet[2439]: E0517 01:05:34.321851 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:34.321912 kubelet[2439]: W0517 01:05:34.321887 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:34.321912 kubelet[2439]: E0517 01:05:34.321913 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:34.322349 kubelet[2439]: E0517 01:05:34.322325 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:34.322446 kubelet[2439]: W0517 01:05:34.322344 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:34.322446 kubelet[2439]: E0517 01:05:34.322405 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:34.322610 kubelet[2439]: E0517 01:05:34.322583 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:34.322610 kubelet[2439]: W0517 01:05:34.322605 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:34.322677 kubelet[2439]: E0517 01:05:34.322616 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:34.322794 kubelet[2439]: E0517 01:05:34.322776 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:34.322794 kubelet[2439]: W0517 01:05:34.322789 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:34.322858 kubelet[2439]: E0517 01:05:34.322798 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:34.323049 kubelet[2439]: E0517 01:05:34.323025 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:34.323049 kubelet[2439]: W0517 01:05:34.323046 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:34.323120 kubelet[2439]: E0517 01:05:34.323057 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:34.323239 kubelet[2439]: E0517 01:05:34.323211 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:34.323239 kubelet[2439]: W0517 01:05:34.323224 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:34.323239 kubelet[2439]: E0517 01:05:34.323233 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:34.323384 kubelet[2439]: E0517 01:05:34.323357 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:34.323384 kubelet[2439]: W0517 01:05:34.323375 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:34.323454 kubelet[2439]: E0517 01:05:34.323402 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:34.323568 kubelet[2439]: E0517 01:05:34.323532 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:34.323568 kubelet[2439]: W0517 01:05:34.323552 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:34.323568 kubelet[2439]: E0517 01:05:34.323561 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:34.323726 kubelet[2439]: E0517 01:05:34.323697 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:34.323726 kubelet[2439]: W0517 01:05:34.323717 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:34.323726 kubelet[2439]: E0517 01:05:34.323725 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:34.323878 kubelet[2439]: E0517 01:05:34.323859 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:34.323878 kubelet[2439]: W0517 01:05:34.323872 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:34.323964 kubelet[2439]: E0517 01:05:34.323885 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:34.324109 kubelet[2439]: E0517 01:05:34.324034 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:34.324109 kubelet[2439]: W0517 01:05:34.324047 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:34.324109 kubelet[2439]: E0517 01:05:34.324057 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:34.324291 kubelet[2439]: E0517 01:05:34.324261 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:34.324291 kubelet[2439]: W0517 01:05:34.324276 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:34.324291 kubelet[2439]: E0517 01:05:34.324285 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:34.324446 kubelet[2439]: E0517 01:05:34.324417 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:34.324446 kubelet[2439]: W0517 01:05:34.324437 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:34.324446 kubelet[2439]: E0517 01:05:34.324445 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:34.324604 kubelet[2439]: E0517 01:05:34.324586 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:34.324604 kubelet[2439]: W0517 01:05:34.324598 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:34.324604 kubelet[2439]: E0517 01:05:34.324606 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:34.324763 kubelet[2439]: E0517 01:05:34.324734 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:34.324763 kubelet[2439]: W0517 01:05:34.324753 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:34.324763 kubelet[2439]: E0517 01:05:34.324767 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:34.382117 kubelet[2439]: E0517 01:05:34.382075 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:34.382117 kubelet[2439]: W0517 01:05:34.382104 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:34.382117 kubelet[2439]: E0517 01:05:34.382126 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:34.382400 kubelet[2439]: E0517 01:05:34.382378 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:34.382400 kubelet[2439]: W0517 01:05:34.382392 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:34.382476 kubelet[2439]: E0517 01:05:34.382405 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:34.382623 kubelet[2439]: E0517 01:05:34.382604 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:34.382623 kubelet[2439]: W0517 01:05:34.382618 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:34.382701 kubelet[2439]: E0517 01:05:34.382630 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:34.382832 kubelet[2439]: E0517 01:05:34.382805 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:34.382832 kubelet[2439]: W0517 01:05:34.382819 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:34.382832 kubelet[2439]: E0517 01:05:34.382832 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:34.383015 kubelet[2439]: E0517 01:05:34.382995 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:34.383015 kubelet[2439]: W0517 01:05:34.383008 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:34.383073 kubelet[2439]: E0517 01:05:34.383021 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:34.383176 kubelet[2439]: E0517 01:05:34.383156 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:34.383176 kubelet[2439]: W0517 01:05:34.383168 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:34.383235 kubelet[2439]: E0517 01:05:34.383177 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:34.383358 kubelet[2439]: E0517 01:05:34.383338 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:34.383358 kubelet[2439]: W0517 01:05:34.383350 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:34.383426 kubelet[2439]: E0517 01:05:34.383369 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:34.383690 kubelet[2439]: E0517 01:05:34.383665 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:34.383690 kubelet[2439]: W0517 01:05:34.383680 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:34.383755 kubelet[2439]: E0517 01:05:34.383745 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:34.383863 kubelet[2439]: E0517 01:05:34.383843 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:34.383863 kubelet[2439]: W0517 01:05:34.383855 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:34.383945 kubelet[2439]: E0517 01:05:34.383917 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:34.384039 kubelet[2439]: E0517 01:05:34.384021 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:34.384039 kubelet[2439]: W0517 01:05:34.384033 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:34.384098 kubelet[2439]: E0517 01:05:34.384044 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:34.384221 kubelet[2439]: E0517 01:05:34.384200 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:34.384221 kubelet[2439]: W0517 01:05:34.384213 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:34.384221 kubelet[2439]: E0517 01:05:34.384225 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:34.384411 kubelet[2439]: E0517 01:05:34.384390 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:34.384411 kubelet[2439]: W0517 01:05:34.384403 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:34.384464 kubelet[2439]: E0517 01:05:34.384413 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:34.384589 kubelet[2439]: E0517 01:05:34.384569 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:34.384589 kubelet[2439]: W0517 01:05:34.384581 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:34.384589 kubelet[2439]: E0517 01:05:34.384590 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:34.387124 kubelet[2439]: E0517 01:05:34.387090 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:34.387124 kubelet[2439]: W0517 01:05:34.387111 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:34.387124 kubelet[2439]: E0517 01:05:34.387130 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:34.387321 kubelet[2439]: E0517 01:05:34.387299 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:34.387321 kubelet[2439]: W0517 01:05:34.387312 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:34.387321 kubelet[2439]: E0517 01:05:34.387322 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:34.387457 kubelet[2439]: E0517 01:05:34.387439 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:34.387457 kubelet[2439]: W0517 01:05:34.387450 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:34.387457 kubelet[2439]: E0517 01:05:34.387458 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:34.387620 kubelet[2439]: E0517 01:05:34.387599 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:34.387620 kubelet[2439]: W0517 01:05:34.387611 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:34.387620 kubelet[2439]: E0517 01:05:34.387620 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:34.388037 kubelet[2439]: E0517 01:05:34.388015 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:34.388037 kubelet[2439]: W0517 01:05:34.388030 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:34.388037 kubelet[2439]: E0517 01:05:34.388040 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:35.121206 kubelet[2439]: E0517 01:05:35.120123 2439 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-92ktb" podUID="4d21f64d-bc3c-4fa5-8ad3-4aed6c59a824" May 17 01:05:35.241675 kubelet[2439]: I0517 01:05:35.241541 2439 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 01:05:35.332158 kubelet[2439]: E0517 01:05:35.332111 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:35.332158 kubelet[2439]: W0517 01:05:35.332147 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:35.332526 kubelet[2439]: E0517 01:05:35.332169 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:35.332526 kubelet[2439]: E0517 01:05:35.332325 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:35.332526 kubelet[2439]: W0517 01:05:35.332332 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:35.332526 kubelet[2439]: E0517 01:05:35.332341 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:35.332526 kubelet[2439]: E0517 01:05:35.332464 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:35.332526 kubelet[2439]: W0517 01:05:35.332471 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:35.332526 kubelet[2439]: E0517 01:05:35.332478 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:35.332674 kubelet[2439]: E0517 01:05:35.332597 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:35.332674 kubelet[2439]: W0517 01:05:35.332603 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:35.332674 kubelet[2439]: E0517 01:05:35.332611 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:35.332734 kubelet[2439]: E0517 01:05:35.332730 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:35.332756 kubelet[2439]: W0517 01:05:35.332736 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:35.332756 kubelet[2439]: E0517 01:05:35.332744 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:35.332869 kubelet[2439]: E0517 01:05:35.332853 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:35.332869 kubelet[2439]: W0517 01:05:35.332866 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:35.332973 kubelet[2439]: E0517 01:05:35.332890 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:35.333208 kubelet[2439]: E0517 01:05:35.333186 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:35.333208 kubelet[2439]: W0517 01:05:35.333203 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:35.333302 kubelet[2439]: E0517 01:05:35.333214 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:35.333389 kubelet[2439]: E0517 01:05:35.333373 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:35.333389 kubelet[2439]: W0517 01:05:35.333386 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:35.333450 kubelet[2439]: E0517 01:05:35.333397 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:35.333570 kubelet[2439]: E0517 01:05:35.333550 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:35.333570 kubelet[2439]: W0517 01:05:35.333562 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:35.333570 kubelet[2439]: E0517 01:05:35.333570 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:35.333705 kubelet[2439]: E0517 01:05:35.333690 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:35.333705 kubelet[2439]: W0517 01:05:35.333701 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:35.333775 kubelet[2439]: E0517 01:05:35.333710 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:35.333849 kubelet[2439]: E0517 01:05:35.333828 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:35.333849 kubelet[2439]: W0517 01:05:35.333840 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:35.334458 kubelet[2439]: E0517 01:05:35.334402 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:35.334608 kubelet[2439]: E0517 01:05:35.334590 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:35.334608 kubelet[2439]: W0517 01:05:35.334604 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:35.336290 kubelet[2439]: E0517 01:05:35.334613 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:35.336290 kubelet[2439]: E0517 01:05:35.334815 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:35.336290 kubelet[2439]: W0517 01:05:35.334823 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:35.336290 kubelet[2439]: E0517 01:05:35.334832 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:35.336290 kubelet[2439]: E0517 01:05:35.334990 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:35.336290 kubelet[2439]: W0517 01:05:35.335000 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:35.336290 kubelet[2439]: E0517 01:05:35.335008 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:35.336290 kubelet[2439]: E0517 01:05:35.335184 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:35.336290 kubelet[2439]: W0517 01:05:35.335192 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:35.336290 kubelet[2439]: E0517 01:05:35.335200 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:35.390903 kubelet[2439]: E0517 01:05:35.390644 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:35.390903 kubelet[2439]: W0517 01:05:35.390672 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:35.390903 kubelet[2439]: E0517 01:05:35.390693 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:35.391415 kubelet[2439]: E0517 01:05:35.391185 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:35.391415 kubelet[2439]: W0517 01:05:35.391198 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:35.391415 kubelet[2439]: E0517 01:05:35.391223 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:35.391717 kubelet[2439]: E0517 01:05:35.391571 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:35.391717 kubelet[2439]: W0517 01:05:35.391584 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:35.391717 kubelet[2439]: E0517 01:05:35.391595 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:35.393352 kubelet[2439]: E0517 01:05:35.393205 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:35.393352 kubelet[2439]: W0517 01:05:35.393222 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:35.393352 kubelet[2439]: E0517 01:05:35.393321 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:35.393664 kubelet[2439]: E0517 01:05:35.393549 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:35.393664 kubelet[2439]: W0517 01:05:35.393560 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:35.393664 kubelet[2439]: E0517 01:05:35.393596 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:35.393881 kubelet[2439]: E0517 01:05:35.393821 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:35.393881 kubelet[2439]: W0517 01:05:35.393832 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:35.393881 kubelet[2439]: E0517 01:05:35.393855 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:35.394089 kubelet[2439]: E0517 01:05:35.394043 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:35.394089 kubelet[2439]: W0517 01:05:35.394055 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:35.394089 kubelet[2439]: E0517 01:05:35.394075 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:35.394226 kubelet[2439]: E0517 01:05:35.394206 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:35.394226 kubelet[2439]: W0517 01:05:35.394220 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:35.394226 kubelet[2439]: E0517 01:05:35.394229 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:35.394410 kubelet[2439]: E0517 01:05:35.394395 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:35.394410 kubelet[2439]: W0517 01:05:35.394407 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:35.394474 kubelet[2439]: E0517 01:05:35.394423 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:35.394728 kubelet[2439]: E0517 01:05:35.394680 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:35.394728 kubelet[2439]: W0517 01:05:35.394694 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:35.394728 kubelet[2439]: E0517 01:05:35.394706 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:35.394878 kubelet[2439]: E0517 01:05:35.394855 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:35.394878 kubelet[2439]: W0517 01:05:35.394870 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:35.394993 kubelet[2439]: E0517 01:05:35.394888 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:35.395080 kubelet[2439]: E0517 01:05:35.395064 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:35.395080 kubelet[2439]: W0517 01:05:35.395077 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:35.395170 kubelet[2439]: E0517 01:05:35.395092 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:35.395348 kubelet[2439]: E0517 01:05:35.395328 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:35.395348 kubelet[2439]: W0517 01:05:35.395344 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:35.395625 kubelet[2439]: E0517 01:05:35.395458 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:35.395625 kubelet[2439]: E0517 01:05:35.395508 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:35.395625 kubelet[2439]: W0517 01:05:35.395517 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:35.395625 kubelet[2439]: E0517 01:05:35.395526 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:35.395770 kubelet[2439]: E0517 01:05:35.395652 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:35.395770 kubelet[2439]: W0517 01:05:35.395664 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:35.395770 kubelet[2439]: E0517 01:05:35.395680 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:35.395831 kubelet[2439]: E0517 01:05:35.395824 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:35.395854 kubelet[2439]: W0517 01:05:35.395831 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:35.395854 kubelet[2439]: E0517 01:05:35.395840 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:35.396261 kubelet[2439]: E0517 01:05:35.396127 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:35.396261 kubelet[2439]: W0517 01:05:35.396141 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:35.396261 kubelet[2439]: E0517 01:05:35.396156 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:35.396483 kubelet[2439]: E0517 01:05:35.396437 2439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:05:35.396483 kubelet[2439]: W0517 01:05:35.396449 2439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:05:35.396483 kubelet[2439]: E0517 01:05:35.396460 2439 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:05:35.486698 env[1453]: time="2025-05-17T01:05:35.486644707Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:05:35.494395 env[1453]: time="2025-05-17T01:05:35.494349235Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:080eaf4c238c85534b61055c31b109c96ce3d20075391e58988541a442c7c701,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:05:35.499559 env[1453]: time="2025-05-17T01:05:35.499501880Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:05:35.504114 env[1453]: time="2025-05-17T01:05:35.504079836Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:ce76dd87f11d3fd0054c35ad2e0e9f833748d007f77a9bfe859d0ddcb66fcb2c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:05:35.504691 env[1453]: time="2025-05-17T01:05:35.504660805Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0\" returns image reference \"sha256:080eaf4c238c85534b61055c31b109c96ce3d20075391e58988541a442c7c701\"" May 17 01:05:35.507977 env[1453]: time="2025-05-17T01:05:35.507924659Z" level=info msg="CreateContainer within sandbox \"5543d027cb99086157193b88fa19eaa7be9459f91cb96c5c0a86def50743465a\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 17 01:05:35.541197 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2795745319.mount: Deactivated successfully. May 17 01:05:35.563516 env[1453]: time="2025-05-17T01:05:35.563466179Z" level=info msg="CreateContainer within sandbox \"5543d027cb99086157193b88fa19eaa7be9459f91cb96c5c0a86def50743465a\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"a2623cf5236fe0d12937025a679ac9432b95d87a81e8684eec1a7c3bf5347e0b\"" May 17 01:05:35.566142 env[1453]: time="2025-05-17T01:05:35.566100022Z" level=info msg="StartContainer for \"a2623cf5236fe0d12937025a679ac9432b95d87a81e8684eec1a7c3bf5347e0b\"" May 17 01:05:35.590540 systemd[1]: Started cri-containerd-a2623cf5236fe0d12937025a679ac9432b95d87a81e8684eec1a7c3bf5347e0b.scope. May 17 01:05:35.604000 audit[3106]: AVC avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:35.604000 audit[3106]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=2926 pid=3106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:35.604000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132363233636635323336666530643132393337303235613637396163 May 17 01:05:35.604000 audit[3106]: AVC avc: denied { bpf } for pid=3106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:35.604000 audit[3106]: AVC avc: denied { bpf } for pid=3106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:35.604000 audit[3106]: AVC avc: denied { bpf } for pid=3106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:35.604000 audit[3106]: AVC avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:35.604000 audit[3106]: AVC avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:35.604000 audit[3106]: AVC avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:35.604000 audit[3106]: AVC avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:35.604000 audit[3106]: AVC avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:35.604000 audit[3106]: AVC avc: denied { bpf } for pid=3106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:35.604000 audit[3106]: AVC avc: denied { bpf } for pid=3106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:35.604000 audit: BPF prog-id=128 op=LOAD May 17 01:05:35.604000 audit[3106]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=2926 pid=3106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:35.604000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132363233636635323336666530643132393337303235613637396163 May 17 01:05:35.604000 audit[3106]: AVC avc: denied { bpf } for pid=3106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:35.604000 audit[3106]: AVC avc: denied { bpf } for pid=3106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:35.604000 audit[3106]: AVC avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:35.604000 audit[3106]: AVC avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:35.604000 audit[3106]: AVC avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:35.604000 audit[3106]: AVC avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:35.604000 audit[3106]: AVC avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:35.604000 audit[3106]: AVC avc: denied { bpf } for pid=3106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:35.604000 audit[3106]: AVC avc: denied { bpf } for pid=3106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:35.604000 audit: BPF prog-id=129 op=LOAD May 17 01:05:35.604000 audit[3106]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=2926 pid=3106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:35.604000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132363233636635323336666530643132393337303235613637396163 May 17 01:05:35.604000 audit: BPF prog-id=129 op=UNLOAD May 17 01:05:35.604000 audit: BPF prog-id=128 op=UNLOAD May 17 01:05:35.604000 audit[3106]: AVC avc: denied { bpf } for pid=3106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:35.604000 audit[3106]: AVC avc: denied { bpf } for pid=3106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:35.604000 audit[3106]: AVC avc: denied { bpf } for pid=3106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:35.604000 audit[3106]: AVC avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:35.604000 audit[3106]: AVC avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:35.604000 audit[3106]: AVC avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:35.604000 audit[3106]: AVC avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:35.604000 audit[3106]: AVC avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:35.604000 audit[3106]: AVC avc: denied { bpf } for pid=3106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:35.604000 audit[3106]: AVC avc: denied { bpf } for pid=3106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:35.604000 audit: BPF prog-id=130 op=LOAD May 17 01:05:35.604000 audit[3106]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=2926 pid=3106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:35.604000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132363233636635323336666530643132393337303235613637396163 May 17 01:05:35.624767 env[1453]: time="2025-05-17T01:05:35.624706832Z" level=info msg="StartContainer for \"a2623cf5236fe0d12937025a679ac9432b95d87a81e8684eec1a7c3bf5347e0b\" returns successfully" May 17 01:05:35.635306 systemd[1]: cri-containerd-a2623cf5236fe0d12937025a679ac9432b95d87a81e8684eec1a7c3bf5347e0b.scope: Deactivated successfully. May 17 01:05:35.638000 audit: BPF prog-id=130 op=UNLOAD May 17 01:05:35.945836 systemd[1]: run-containerd-runc-k8s.io-a2623cf5236fe0d12937025a679ac9432b95d87a81e8684eec1a7c3bf5347e0b-runc.nzCmrp.mount: Deactivated successfully. May 17 01:05:35.945926 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-a2623cf5236fe0d12937025a679ac9432b95d87a81e8684eec1a7c3bf5347e0b-rootfs.mount: Deactivated successfully. May 17 01:05:36.699696 env[1453]: time="2025-05-17T01:05:36.699641936Z" level=info msg="shim disconnected" id=a2623cf5236fe0d12937025a679ac9432b95d87a81e8684eec1a7c3bf5347e0b May 17 01:05:36.699696 env[1453]: time="2025-05-17T01:05:36.699695617Z" level=warning msg="cleaning up after shim disconnected" id=a2623cf5236fe0d12937025a679ac9432b95d87a81e8684eec1a7c3bf5347e0b namespace=k8s.io May 17 01:05:36.700122 env[1453]: time="2025-05-17T01:05:36.699706257Z" level=info msg="cleaning up dead shim" May 17 01:05:36.707136 env[1453]: time="2025-05-17T01:05:36.707082737Z" level=warning msg="cleanup warnings time=\"2025-05-17T01:05:36Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3151 runtime=io.containerd.runc.v2\n" May 17 01:05:37.120398 kubelet[2439]: E0517 01:05:37.120354 2439 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-92ktb" podUID="4d21f64d-bc3c-4fa5-8ad3-4aed6c59a824" May 17 01:05:37.248174 env[1453]: time="2025-05-17T01:05:37.248123857Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.0\"" May 17 01:05:39.120887 kubelet[2439]: E0517 01:05:39.119576 2439 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-92ktb" podUID="4d21f64d-bc3c-4fa5-8ad3-4aed6c59a824" May 17 01:05:41.120953 kubelet[2439]: E0517 01:05:41.120887 2439 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-92ktb" podUID="4d21f64d-bc3c-4fa5-8ad3-4aed6c59a824" May 17 01:05:41.313392 env[1453]: time="2025-05-17T01:05:41.313333013Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:05:41.321013 env[1453]: time="2025-05-17T01:05:41.320983606Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0a1b3d5412de2974bc057a3463a132f935c307bc06d5b990ad54031e1f5a351d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:05:41.324792 env[1453]: time="2025-05-17T01:05:41.324760023Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:05:41.329469 env[1453]: time="2025-05-17T01:05:41.329436132Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:3dd06656abdc03fbd51782d5f6fe4d70e6825a1c0c5bce2a165bbd2ff9e0f7df,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:05:41.330189 env[1453]: time="2025-05-17T01:05:41.329814258Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.0\" returns image reference \"sha256:0a1b3d5412de2974bc057a3463a132f935c307bc06d5b990ad54031e1f5a351d\"" May 17 01:05:41.334102 env[1453]: time="2025-05-17T01:05:41.334063801Z" level=info msg="CreateContainer within sandbox \"5543d027cb99086157193b88fa19eaa7be9459f91cb96c5c0a86def50743465a\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 17 01:05:41.385441 env[1453]: time="2025-05-17T01:05:41.384920758Z" level=info msg="CreateContainer within sandbox \"5543d027cb99086157193b88fa19eaa7be9459f91cb96c5c0a86def50743465a\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"f88d2bab1e56b7656236dc90be13cc637237c53b834d084b0623def6b10a2683\"" May 17 01:05:41.386739 env[1453]: time="2025-05-17T01:05:41.385923093Z" level=info msg="StartContainer for \"f88d2bab1e56b7656236dc90be13cc637237c53b834d084b0623def6b10a2683\"" May 17 01:05:41.404269 systemd[1]: Started cri-containerd-f88d2bab1e56b7656236dc90be13cc637237c53b834d084b0623def6b10a2683.scope. May 17 01:05:41.453925 kernel: kauditd_printk_skb: 229 callbacks suppressed May 17 01:05:41.454462 kernel: audit: type=1400 audit(1747443941.423:881): avc: denied { perfmon } for pid=3176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:41.454497 kernel: audit: type=1300 audit(1747443941.423:881): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2926 pid=3176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:41.423000 audit[3176]: AVC avc: denied { perfmon } for pid=3176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:41.423000 audit[3176]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2926 pid=3176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:41.423000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638386432626162316535366237363536323336646339306265313363 May 17 01:05:41.501947 kernel: audit: type=1327 audit(1747443941.423:881): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638386432626162316535366237363536323336646339306265313363 May 17 01:05:41.423000 audit[3176]: AVC avc: denied { bpf } for pid=3176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:41.520107 kernel: audit: type=1400 audit(1747443941.423:882): avc: denied { bpf } for pid=3176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:41.423000 audit[3176]: AVC avc: denied { bpf } for pid=3176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:41.539766 kernel: audit: type=1400 audit(1747443941.423:882): avc: denied { bpf } for pid=3176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:41.539861 kernel: audit: type=1400 audit(1747443941.423:882): avc: denied { bpf } for pid=3176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:41.423000 audit[3176]: AVC avc: denied { bpf } for pid=3176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:41.423000 audit[3176]: AVC avc: denied { perfmon } for pid=3176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:41.574379 kernel: audit: type=1400 audit(1747443941.423:882): avc: denied { perfmon } for pid=3176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:41.574540 kernel: audit: type=1400 audit(1747443941.423:882): avc: denied { perfmon } for pid=3176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:41.423000 audit[3176]: AVC avc: denied { perfmon } for pid=3176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:41.423000 audit[3176]: AVC avc: denied { perfmon } for pid=3176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:41.592030 env[1453]: time="2025-05-17T01:05:41.591997039Z" level=info msg="StartContainer for \"f88d2bab1e56b7656236dc90be13cc637237c53b834d084b0623def6b10a2683\" returns successfully" May 17 01:05:41.609129 kernel: audit: type=1400 audit(1747443941.423:882): avc: denied { perfmon } for pid=3176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:41.423000 audit[3176]: AVC avc: denied { perfmon } for pid=3176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:41.626966 kernel: audit: type=1400 audit(1747443941.423:882): avc: denied { perfmon } for pid=3176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:41.423000 audit[3176]: AVC avc: denied { perfmon } for pid=3176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:41.423000 audit[3176]: AVC avc: denied { bpf } for pid=3176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:41.423000 audit[3176]: AVC avc: denied { bpf } for pid=3176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:41.423000 audit: BPF prog-id=131 op=LOAD May 17 01:05:41.423000 audit[3176]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2926 pid=3176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:41.423000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638386432626162316535366237363536323336646339306265313363 May 17 01:05:41.428000 audit[3176]: AVC avc: denied { bpf } for pid=3176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:41.428000 audit[3176]: AVC avc: denied { bpf } for pid=3176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:41.428000 audit[3176]: AVC avc: denied { perfmon } for pid=3176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:41.428000 audit[3176]: AVC avc: denied { perfmon } for pid=3176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:41.428000 audit[3176]: AVC avc: denied { perfmon } for pid=3176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:41.428000 audit[3176]: AVC avc: denied { perfmon } for pid=3176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:41.428000 audit[3176]: AVC avc: denied { perfmon } for pid=3176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:41.428000 audit[3176]: AVC avc: denied { bpf } for pid=3176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:41.428000 audit[3176]: AVC avc: denied { bpf } for pid=3176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:41.428000 audit: BPF prog-id=132 op=LOAD May 17 01:05:41.428000 audit[3176]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2926 pid=3176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:41.428000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638386432626162316535366237363536323336646339306265313363 May 17 01:05:41.446000 audit: BPF prog-id=132 op=UNLOAD May 17 01:05:41.446000 audit: BPF prog-id=131 op=UNLOAD May 17 01:05:41.446000 audit[3176]: AVC avc: denied { bpf } for pid=3176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:41.446000 audit[3176]: AVC avc: denied { bpf } for pid=3176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:41.446000 audit[3176]: AVC avc: denied { bpf } for pid=3176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:41.446000 audit[3176]: AVC avc: denied { perfmon } for pid=3176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:41.446000 audit[3176]: AVC avc: denied { perfmon } for pid=3176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:41.446000 audit[3176]: AVC avc: denied { perfmon } for pid=3176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:41.446000 audit[3176]: AVC avc: denied { perfmon } for pid=3176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:41.446000 audit[3176]: AVC avc: denied { perfmon } for pid=3176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:41.446000 audit[3176]: AVC avc: denied { bpf } for pid=3176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:41.446000 audit[3176]: AVC avc: denied { bpf } for pid=3176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:41.446000 audit: BPF prog-id=133 op=LOAD May 17 01:05:41.446000 audit[3176]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2926 pid=3176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:41.446000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638386432626162316535366237363536323336646339306265313363 May 17 01:05:43.027076 env[1453]: time="2025-05-17T01:05:43.026911327Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 17 01:05:43.029264 systemd[1]: cri-containerd-f88d2bab1e56b7656236dc90be13cc637237c53b834d084b0623def6b10a2683.scope: Deactivated successfully. May 17 01:05:43.033000 audit: BPF prog-id=133 op=UNLOAD May 17 01:05:43.046374 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-f88d2bab1e56b7656236dc90be13cc637237c53b834d084b0623def6b10a2683-rootfs.mount: Deactivated successfully. May 17 01:05:43.120736 kubelet[2439]: I0517 01:05:43.120709 2439 kubelet_node_status.go:501] "Fast updating node status as it just became ready" May 17 01:05:43.267690 kubelet[2439]: W0517 01:05:43.188168 2439 reflector.go:569] object-"calico-system"/"whisker-ca-bundle": failed to list *v1.ConfigMap: configmaps "whisker-ca-bundle" is forbidden: User "system:node:ci-3510.3.7-n-56b9a5cda4" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510.3.7-n-56b9a5cda4' and this object May 17 01:05:43.267690 kubelet[2439]: E0517 01:05:43.188202 2439 reflector.go:166] "Unhandled Error" err="object-\"calico-system\"/\"whisker-ca-bundle\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps \"whisker-ca-bundle\" is forbidden: User \"system:node:ci-3510.3.7-n-56b9a5cda4\" cannot list resource \"configmaps\" in API group \"\" in the namespace \"calico-system\": no relationship found between node 'ci-3510.3.7-n-56b9a5cda4' and this object" logger="UnhandledError" May 17 01:05:43.267690 kubelet[2439]: W0517 01:05:43.189372 2439 reflector.go:569] object-"calico-system"/"whisker-backend-key-pair": failed to list *v1.Secret: secrets "whisker-backend-key-pair" is forbidden: User "system:node:ci-3510.3.7-n-56b9a5cda4" cannot list resource "secrets" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510.3.7-n-56b9a5cda4' and this object May 17 01:05:43.267690 kubelet[2439]: E0517 01:05:43.189400 2439 reflector.go:166] "Unhandled Error" err="object-\"calico-system\"/\"whisker-backend-key-pair\": Failed to watch *v1.Secret: failed to list *v1.Secret: secrets \"whisker-backend-key-pair\" is forbidden: User \"system:node:ci-3510.3.7-n-56b9a5cda4\" cannot list resource \"secrets\" in API group \"\" in the namespace \"calico-system\": no relationship found between node 'ci-3510.3.7-n-56b9a5cda4' and this object" logger="UnhandledError" May 17 01:05:43.267690 kubelet[2439]: W0517 01:05:43.189456 2439 reflector.go:569] object-"calico-system"/"goldmane-key-pair": failed to list *v1.Secret: secrets "goldmane-key-pair" is forbidden: User "system:node:ci-3510.3.7-n-56b9a5cda4" cannot list resource "secrets" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510.3.7-n-56b9a5cda4' and this object May 17 01:05:43.127558 systemd[1]: Created slice kubepods-besteffort-pod4d21f64d_bc3c_4fa5_8ad3_4aed6c59a824.slice. May 17 01:05:43.268008 kubelet[2439]: E0517 01:05:43.189471 2439 reflector.go:166] "Unhandled Error" err="object-\"calico-system\"/\"goldmane-key-pair\": Failed to watch *v1.Secret: failed to list *v1.Secret: secrets \"goldmane-key-pair\" is forbidden: User \"system:node:ci-3510.3.7-n-56b9a5cda4\" cannot list resource \"secrets\" in API group \"\" in the namespace \"calico-system\": no relationship found between node 'ci-3510.3.7-n-56b9a5cda4' and this object" logger="UnhandledError" May 17 01:05:43.268008 kubelet[2439]: W0517 01:05:43.189612 2439 reflector.go:569] object-"calico-system"/"goldmane": failed to list *v1.ConfigMap: configmaps "goldmane" is forbidden: User "system:node:ci-3510.3.7-n-56b9a5cda4" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510.3.7-n-56b9a5cda4' and this object May 17 01:05:43.268008 kubelet[2439]: E0517 01:05:43.189631 2439 reflector.go:166] "Unhandled Error" err="object-\"calico-system\"/\"goldmane\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps \"goldmane\" is forbidden: User \"system:node:ci-3510.3.7-n-56b9a5cda4\" cannot list resource \"configmaps\" in API group \"\" in the namespace \"calico-system\": no relationship found between node 'ci-3510.3.7-n-56b9a5cda4' and this object" logger="UnhandledError" May 17 01:05:43.268008 kubelet[2439]: W0517 01:05:43.190051 2439 reflector.go:569] object-"calico-system"/"goldmane-ca-bundle": failed to list *v1.ConfigMap: configmaps "goldmane-ca-bundle" is forbidden: User "system:node:ci-3510.3.7-n-56b9a5cda4" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510.3.7-n-56b9a5cda4' and this object May 17 01:05:43.166074 systemd[1]: Created slice kubepods-besteffort-pod70b64262_db16_4665_bc8a_83aa2db3b33c.slice. May 17 01:05:43.268200 kubelet[2439]: E0517 01:05:43.190071 2439 reflector.go:166] "Unhandled Error" err="object-\"calico-system\"/\"goldmane-ca-bundle\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps \"goldmane-ca-bundle\" is forbidden: User \"system:node:ci-3510.3.7-n-56b9a5cda4\" cannot list resource \"configmaps\" in API group \"\" in the namespace \"calico-system\": no relationship found between node 'ci-3510.3.7-n-56b9a5cda4' and this object" logger="UnhandledError" May 17 01:05:43.268200 kubelet[2439]: I0517 01:05:43.259981 2439 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/70b64262-db16-4665-bc8a-83aa2db3b33c-calico-apiserver-certs\") pod \"calico-apiserver-7bb465f89b-nhrhw\" (UID: \"70b64262-db16-4665-bc8a-83aa2db3b33c\") " pod="calico-apiserver/calico-apiserver-7bb465f89b-nhrhw" May 17 01:05:43.268200 kubelet[2439]: I0517 01:05:43.260016 2439 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7mdm9\" (UniqueName: \"kubernetes.io/projected/c9fcf012-c9eb-4271-ada6-7659bcab9229-kube-api-access-7mdm9\") pod \"coredns-668d6bf9bc-pnnwz\" (UID: \"c9fcf012-c9eb-4271-ada6-7659bcab9229\") " pod="kube-system/coredns-668d6bf9bc-pnnwz" May 17 01:05:43.268200 kubelet[2439]: I0517 01:05:43.260064 2439 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/be9f8b9c-4d2a-4e7a-8d7f-060f8218c335-whisker-ca-bundle\") pod \"whisker-bdc7b675d-kkllc\" (UID: \"be9f8b9c-4d2a-4e7a-8d7f-060f8218c335\") " pod="calico-system/whisker-bdc7b675d-kkllc" May 17 01:05:43.268200 kubelet[2439]: I0517 01:05:43.260081 2439 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7dqvv\" (UniqueName: \"kubernetes.io/projected/9893c048-8d02-43b3-a0c7-1daf374b6950-kube-api-access-7dqvv\") pod \"coredns-668d6bf9bc-rpdwj\" (UID: \"9893c048-8d02-43b3-a0c7-1daf374b6950\") " pod="kube-system/coredns-668d6bf9bc-rpdwj" May 17 01:05:43.180502 systemd[1]: Created slice kubepods-burstable-podc9fcf012_c9eb_4271_ada6_7659bcab9229.slice. May 17 01:05:43.268359 kubelet[2439]: I0517 01:05:43.260128 2439 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/be9f8b9c-4d2a-4e7a-8d7f-060f8218c335-whisker-backend-key-pair\") pod \"whisker-bdc7b675d-kkllc\" (UID: \"be9f8b9c-4d2a-4e7a-8d7f-060f8218c335\") " pod="calico-system/whisker-bdc7b675d-kkllc" May 17 01:05:43.268359 kubelet[2439]: I0517 01:05:43.260147 2439 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/9893c048-8d02-43b3-a0c7-1daf374b6950-config-volume\") pod \"coredns-668d6bf9bc-rpdwj\" (UID: \"9893c048-8d02-43b3-a0c7-1daf374b6950\") " pod="kube-system/coredns-668d6bf9bc-rpdwj" May 17 01:05:43.268359 kubelet[2439]: I0517 01:05:43.260165 2439 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/c9fcf012-c9eb-4271-ada6-7659bcab9229-config-volume\") pod \"coredns-668d6bf9bc-pnnwz\" (UID: \"c9fcf012-c9eb-4271-ada6-7659bcab9229\") " pod="kube-system/coredns-668d6bf9bc-pnnwz" May 17 01:05:43.268359 kubelet[2439]: I0517 01:05:43.260207 2439 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qf2bk\" (UniqueName: \"kubernetes.io/projected/cbd568ae-4e42-43d9-8aad-56b7909a49ad-kube-api-access-qf2bk\") pod \"calico-kube-controllers-f6596879f-8tb74\" (UID: \"cbd568ae-4e42-43d9-8aad-56b7909a49ad\") " pod="calico-system/calico-kube-controllers-f6596879f-8tb74" May 17 01:05:43.268359 kubelet[2439]: I0517 01:05:43.260226 2439 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-r4547\" (UniqueName: \"kubernetes.io/projected/be9f8b9c-4d2a-4e7a-8d7f-060f8218c335-kube-api-access-r4547\") pod \"whisker-bdc7b675d-kkllc\" (UID: \"be9f8b9c-4d2a-4e7a-8d7f-060f8218c335\") " pod="calico-system/whisker-bdc7b675d-kkllc" May 17 01:05:43.191496 systemd[1]: Created slice kubepods-burstable-pod9893c048_8d02_43b3_a0c7_1daf374b6950.slice. May 17 01:05:43.268535 kubelet[2439]: I0517 01:05:43.260243 2439 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-88j4h\" (UniqueName: \"kubernetes.io/projected/70b64262-db16-4665-bc8a-83aa2db3b33c-kube-api-access-88j4h\") pod \"calico-apiserver-7bb465f89b-nhrhw\" (UID: \"70b64262-db16-4665-bc8a-83aa2db3b33c\") " pod="calico-apiserver/calico-apiserver-7bb465f89b-nhrhw" May 17 01:05:43.268535 kubelet[2439]: I0517 01:05:43.260284 2439 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/03203f23-8aa4-41b1-ba45-7088ffc7359f-goldmane-ca-bundle\") pod \"goldmane-78d55f7ddc-5zbrn\" (UID: \"03203f23-8aa4-41b1-ba45-7088ffc7359f\") " pod="calico-system/goldmane-78d55f7ddc-5zbrn" May 17 01:05:43.268535 kubelet[2439]: I0517 01:05:43.260305 2439 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5c46r\" (UniqueName: \"kubernetes.io/projected/03203f23-8aa4-41b1-ba45-7088ffc7359f-kube-api-access-5c46r\") pod \"goldmane-78d55f7ddc-5zbrn\" (UID: \"03203f23-8aa4-41b1-ba45-7088ffc7359f\") " pod="calico-system/goldmane-78d55f7ddc-5zbrn" May 17 01:05:43.268535 kubelet[2439]: I0517 01:05:43.260366 2439 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-w22fc\" (UniqueName: \"kubernetes.io/projected/76c2d8d7-3942-4d0e-bf68-64e138374d48-kube-api-access-w22fc\") pod \"calico-apiserver-7bb465f89b-fvt58\" (UID: \"76c2d8d7-3942-4d0e-bf68-64e138374d48\") " pod="calico-apiserver/calico-apiserver-7bb465f89b-fvt58" May 17 01:05:43.268535 kubelet[2439]: I0517 01:05:43.260384 2439 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config\" (UniqueName: \"kubernetes.io/configmap/03203f23-8aa4-41b1-ba45-7088ffc7359f-config\") pod \"goldmane-78d55f7ddc-5zbrn\" (UID: \"03203f23-8aa4-41b1-ba45-7088ffc7359f\") " pod="calico-system/goldmane-78d55f7ddc-5zbrn" May 17 01:05:43.196954 systemd[1]: Created slice kubepods-besteffort-podbe9f8b9c_4d2a_4e7a_8d7f_060f8218c335.slice. May 17 01:05:43.268688 kubelet[2439]: I0517 01:05:43.260401 2439 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/76c2d8d7-3942-4d0e-bf68-64e138374d48-calico-apiserver-certs\") pod \"calico-apiserver-7bb465f89b-fvt58\" (UID: \"76c2d8d7-3942-4d0e-bf68-64e138374d48\") " pod="calico-apiserver/calico-apiserver-7bb465f89b-fvt58" May 17 01:05:43.268688 kubelet[2439]: I0517 01:05:43.260780 2439 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-key-pair\" (UniqueName: \"kubernetes.io/secret/03203f23-8aa4-41b1-ba45-7088ffc7359f-goldmane-key-pair\") pod \"goldmane-78d55f7ddc-5zbrn\" (UID: \"03203f23-8aa4-41b1-ba45-7088ffc7359f\") " pod="calico-system/goldmane-78d55f7ddc-5zbrn" May 17 01:05:43.268688 kubelet[2439]: I0517 01:05:43.260816 2439 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/cbd568ae-4e42-43d9-8aad-56b7909a49ad-tigera-ca-bundle\") pod \"calico-kube-controllers-f6596879f-8tb74\" (UID: \"cbd568ae-4e42-43d9-8aad-56b7909a49ad\") " pod="calico-system/calico-kube-controllers-f6596879f-8tb74" May 17 01:05:43.201820 systemd[1]: Created slice kubepods-besteffort-pod76c2d8d7_3942_4d0e_bf68_64e138374d48.slice. May 17 01:05:43.209907 systemd[1]: Created slice kubepods-besteffort-pod03203f23_8aa4_41b1_ba45_7088ffc7359f.slice. May 17 01:05:43.215542 systemd[1]: Created slice kubepods-besteffort-podcbd568ae_4e42_43d9_8aad_56b7909a49ad.slice. May 17 01:05:43.316715 env[1453]: time="2025-05-17T01:05:43.316537175Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-92ktb,Uid:4d21f64d-bc3c-4fa5-8ad3-4aed6c59a824,Namespace:calico-system,Attempt:0,}" May 17 01:05:43.618017 env[1453]: time="2025-05-17T01:05:43.617662708Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7bb465f89b-nhrhw,Uid:70b64262-db16-4665-bc8a-83aa2db3b33c,Namespace:calico-apiserver,Attempt:0,}" May 17 01:05:43.619366 env[1453]: time="2025-05-17T01:05:43.618988487Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-f6596879f-8tb74,Uid:cbd568ae-4e42-43d9-8aad-56b7909a49ad,Namespace:calico-system,Attempt:0,}" May 17 01:05:43.619366 env[1453]: time="2025-05-17T01:05:43.619051968Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-pnnwz,Uid:c9fcf012-c9eb-4271-ada6-7659bcab9229,Namespace:kube-system,Attempt:0,}" May 17 01:05:43.619366 env[1453]: time="2025-05-17T01:05:43.618991367Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-rpdwj,Uid:9893c048-8d02-43b3-a0c7-1daf374b6950,Namespace:kube-system,Attempt:0,}" May 17 01:05:43.619366 env[1453]: time="2025-05-17T01:05:43.619268731Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7bb465f89b-fvt58,Uid:76c2d8d7-3942-4d0e-bf68-64e138374d48,Namespace:calico-apiserver,Attempt:0,}" May 17 01:05:43.633523 env[1453]: time="2025-05-17T01:05:43.633326693Z" level=info msg="shim disconnected" id=f88d2bab1e56b7656236dc90be13cc637237c53b834d084b0623def6b10a2683 May 17 01:05:43.633523 env[1453]: time="2025-05-17T01:05:43.633369894Z" level=warning msg="cleaning up after shim disconnected" id=f88d2bab1e56b7656236dc90be13cc637237c53b834d084b0623def6b10a2683 namespace=k8s.io May 17 01:05:43.633523 env[1453]: time="2025-05-17T01:05:43.633391934Z" level=info msg="cleaning up dead shim" May 17 01:05:43.640574 env[1453]: time="2025-05-17T01:05:43.640547237Z" level=warning msg="cleanup warnings time=\"2025-05-17T01:05:43Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3233 runtime=io.containerd.runc.v2\n" May 17 01:05:43.936616 env[1453]: time="2025-05-17T01:05:43.936086689Z" level=error msg="Failed to destroy network for sandbox \"d0fe4236d76d708298feebd63b43b6fd0cf876c07dcb9b984a060d5b0e2fa065\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 01:05:43.937192 env[1453]: time="2025-05-17T01:05:43.937157705Z" level=error msg="encountered an error cleaning up failed sandbox \"d0fe4236d76d708298feebd63b43b6fd0cf876c07dcb9b984a060d5b0e2fa065\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 01:05:43.937319 env[1453]: time="2025-05-17T01:05:43.937292987Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-pnnwz,Uid:c9fcf012-c9eb-4271-ada6-7659bcab9229,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"d0fe4236d76d708298feebd63b43b6fd0cf876c07dcb9b984a060d5b0e2fa065\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 01:05:43.937661 kubelet[2439]: E0517 01:05:43.937593 2439 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d0fe4236d76d708298feebd63b43b6fd0cf876c07dcb9b984a060d5b0e2fa065\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 01:05:43.937749 kubelet[2439]: E0517 01:05:43.937677 2439 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d0fe4236d76d708298feebd63b43b6fd0cf876c07dcb9b984a060d5b0e2fa065\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-pnnwz" May 17 01:05:43.937749 kubelet[2439]: E0517 01:05:43.937699 2439 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d0fe4236d76d708298feebd63b43b6fd0cf876c07dcb9b984a060d5b0e2fa065\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-pnnwz" May 17 01:05:43.937807 kubelet[2439]: E0517 01:05:43.937745 2439 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-668d6bf9bc-pnnwz_kube-system(c9fcf012-c9eb-4271-ada6-7659bcab9229)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-668d6bf9bc-pnnwz_kube-system(c9fcf012-c9eb-4271-ada6-7659bcab9229)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"d0fe4236d76d708298feebd63b43b6fd0cf876c07dcb9b984a060d5b0e2fa065\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-pnnwz" podUID="c9fcf012-c9eb-4271-ada6-7659bcab9229" May 17 01:05:43.948166 env[1453]: time="2025-05-17T01:05:43.948101462Z" level=error msg="Failed to destroy network for sandbox \"75f90dbe628597416a290bd0d8408ca492593ad2c9bf08de9fd7e56f91bc6e1e\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 01:05:43.948580 env[1453]: time="2025-05-17T01:05:43.948531508Z" level=error msg="encountered an error cleaning up failed sandbox \"75f90dbe628597416a290bd0d8408ca492593ad2c9bf08de9fd7e56f91bc6e1e\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 01:05:43.948640 env[1453]: time="2025-05-17T01:05:43.948598909Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-rpdwj,Uid:9893c048-8d02-43b3-a0c7-1daf374b6950,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"75f90dbe628597416a290bd0d8408ca492593ad2c9bf08de9fd7e56f91bc6e1e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 01:05:43.948996 kubelet[2439]: E0517 01:05:43.948799 2439 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"75f90dbe628597416a290bd0d8408ca492593ad2c9bf08de9fd7e56f91bc6e1e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 01:05:43.948996 kubelet[2439]: E0517 01:05:43.948862 2439 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"75f90dbe628597416a290bd0d8408ca492593ad2c9bf08de9fd7e56f91bc6e1e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-rpdwj" May 17 01:05:43.948996 kubelet[2439]: E0517 01:05:43.948883 2439 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"75f90dbe628597416a290bd0d8408ca492593ad2c9bf08de9fd7e56f91bc6e1e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-rpdwj" May 17 01:05:43.949141 kubelet[2439]: E0517 01:05:43.948927 2439 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-668d6bf9bc-rpdwj_kube-system(9893c048-8d02-43b3-a0c7-1daf374b6950)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-668d6bf9bc-rpdwj_kube-system(9893c048-8d02-43b3-a0c7-1daf374b6950)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"75f90dbe628597416a290bd0d8408ca492593ad2c9bf08de9fd7e56f91bc6e1e\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-rpdwj" podUID="9893c048-8d02-43b3-a0c7-1daf374b6950" May 17 01:05:43.982674 env[1453]: time="2025-05-17T01:05:43.982615559Z" level=error msg="Failed to destroy network for sandbox \"9072d164c4b0ab1b8fcbbc155386f04e51ae75d013e86d406f43955febebbded\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 01:05:43.983384 env[1453]: time="2025-05-17T01:05:43.983346009Z" level=error msg="encountered an error cleaning up failed sandbox \"9072d164c4b0ab1b8fcbbc155386f04e51ae75d013e86d406f43955febebbded\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 01:05:43.983532 env[1453]: time="2025-05-17T01:05:43.983504132Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-f6596879f-8tb74,Uid:cbd568ae-4e42-43d9-8aad-56b7909a49ad,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"9072d164c4b0ab1b8fcbbc155386f04e51ae75d013e86d406f43955febebbded\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 01:05:43.984198 kubelet[2439]: E0517 01:05:43.983846 2439 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9072d164c4b0ab1b8fcbbc155386f04e51ae75d013e86d406f43955febebbded\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 01:05:43.984198 kubelet[2439]: E0517 01:05:43.983894 2439 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9072d164c4b0ab1b8fcbbc155386f04e51ae75d013e86d406f43955febebbded\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-f6596879f-8tb74" May 17 01:05:43.984198 kubelet[2439]: E0517 01:05:43.983915 2439 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9072d164c4b0ab1b8fcbbc155386f04e51ae75d013e86d406f43955febebbded\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-f6596879f-8tb74" May 17 01:05:43.984382 kubelet[2439]: E0517 01:05:43.983978 2439 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-f6596879f-8tb74_calico-system(cbd568ae-4e42-43d9-8aad-56b7909a49ad)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-f6596879f-8tb74_calico-system(cbd568ae-4e42-43d9-8aad-56b7909a49ad)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"9072d164c4b0ab1b8fcbbc155386f04e51ae75d013e86d406f43955febebbded\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-f6596879f-8tb74" podUID="cbd568ae-4e42-43d9-8aad-56b7909a49ad" May 17 01:05:44.002278 env[1453]: time="2025-05-17T01:05:44.002220561Z" level=error msg="Failed to destroy network for sandbox \"610ba958463e0f9928b1a82a171a984c1ffe4522de3a9a7fa4a1256836f526e4\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 01:05:44.002809 env[1453]: time="2025-05-17T01:05:44.002775288Z" level=error msg="encountered an error cleaning up failed sandbox \"610ba958463e0f9928b1a82a171a984c1ffe4522de3a9a7fa4a1256836f526e4\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 01:05:44.003040 env[1453]: time="2025-05-17T01:05:44.003009812Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7bb465f89b-fvt58,Uid:76c2d8d7-3942-4d0e-bf68-64e138374d48,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"610ba958463e0f9928b1a82a171a984c1ffe4522de3a9a7fa4a1256836f526e4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 01:05:44.003717 kubelet[2439]: E0517 01:05:44.003327 2439 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"610ba958463e0f9928b1a82a171a984c1ffe4522de3a9a7fa4a1256836f526e4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 01:05:44.003717 kubelet[2439]: E0517 01:05:44.003386 2439 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"610ba958463e0f9928b1a82a171a984c1ffe4522de3a9a7fa4a1256836f526e4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7bb465f89b-fvt58" May 17 01:05:44.003717 kubelet[2439]: E0517 01:05:44.003405 2439 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"610ba958463e0f9928b1a82a171a984c1ffe4522de3a9a7fa4a1256836f526e4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7bb465f89b-fvt58" May 17 01:05:44.003864 kubelet[2439]: E0517 01:05:44.003445 2439 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-7bb465f89b-fvt58_calico-apiserver(76c2d8d7-3942-4d0e-bf68-64e138374d48)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-7bb465f89b-fvt58_calico-apiserver(76c2d8d7-3942-4d0e-bf68-64e138374d48)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"610ba958463e0f9928b1a82a171a984c1ffe4522de3a9a7fa4a1256836f526e4\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7bb465f89b-fvt58" podUID="76c2d8d7-3942-4d0e-bf68-64e138374d48" May 17 01:05:44.005975 env[1453]: time="2025-05-17T01:05:44.005912693Z" level=error msg="Failed to destroy network for sandbox \"ddb911fedf4c2ccf6ed8ac040a53a0054cd4be370b4614c6e3133824cbadd2ab\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 01:05:44.006295 env[1453]: time="2025-05-17T01:05:44.006261578Z" level=error msg="encountered an error cleaning up failed sandbox \"ddb911fedf4c2ccf6ed8ac040a53a0054cd4be370b4614c6e3133824cbadd2ab\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 01:05:44.006352 env[1453]: time="2025-05-17T01:05:44.006314299Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-92ktb,Uid:4d21f64d-bc3c-4fa5-8ad3-4aed6c59a824,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"ddb911fedf4c2ccf6ed8ac040a53a0054cd4be370b4614c6e3133824cbadd2ab\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 01:05:44.006636 kubelet[2439]: E0517 01:05:44.006492 2439 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ddb911fedf4c2ccf6ed8ac040a53a0054cd4be370b4614c6e3133824cbadd2ab\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 01:05:44.006636 kubelet[2439]: E0517 01:05:44.006542 2439 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ddb911fedf4c2ccf6ed8ac040a53a0054cd4be370b4614c6e3133824cbadd2ab\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-92ktb" May 17 01:05:44.006636 kubelet[2439]: E0517 01:05:44.006559 2439 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ddb911fedf4c2ccf6ed8ac040a53a0054cd4be370b4614c6e3133824cbadd2ab\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-92ktb" May 17 01:05:44.006764 kubelet[2439]: E0517 01:05:44.006593 2439 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-92ktb_calico-system(4d21f64d-bc3c-4fa5-8ad3-4aed6c59a824)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-92ktb_calico-system(4d21f64d-bc3c-4fa5-8ad3-4aed6c59a824)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"ddb911fedf4c2ccf6ed8ac040a53a0054cd4be370b4614c6e3133824cbadd2ab\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-92ktb" podUID="4d21f64d-bc3c-4fa5-8ad3-4aed6c59a824" May 17 01:05:44.015332 env[1453]: time="2025-05-17T01:05:44.015277865Z" level=error msg="Failed to destroy network for sandbox \"eaf4d6f751910ded5debcb0a407fe1647f085c1e88db7649e0bcc6fa4fbff0e0\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 01:05:44.015800 env[1453]: time="2025-05-17T01:05:44.015768672Z" level=error msg="encountered an error cleaning up failed sandbox \"eaf4d6f751910ded5debcb0a407fe1647f085c1e88db7649e0bcc6fa4fbff0e0\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 01:05:44.015929 env[1453]: time="2025-05-17T01:05:44.015900954Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7bb465f89b-nhrhw,Uid:70b64262-db16-4665-bc8a-83aa2db3b33c,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"eaf4d6f751910ded5debcb0a407fe1647f085c1e88db7649e0bcc6fa4fbff0e0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 01:05:44.016567 kubelet[2439]: E0517 01:05:44.016236 2439 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"eaf4d6f751910ded5debcb0a407fe1647f085c1e88db7649e0bcc6fa4fbff0e0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 01:05:44.016567 kubelet[2439]: E0517 01:05:44.016285 2439 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"eaf4d6f751910ded5debcb0a407fe1647f085c1e88db7649e0bcc6fa4fbff0e0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7bb465f89b-nhrhw" May 17 01:05:44.016567 kubelet[2439]: E0517 01:05:44.016306 2439 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"eaf4d6f751910ded5debcb0a407fe1647f085c1e88db7649e0bcc6fa4fbff0e0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7bb465f89b-nhrhw" May 17 01:05:44.016744 kubelet[2439]: E0517 01:05:44.016341 2439 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-7bb465f89b-nhrhw_calico-apiserver(70b64262-db16-4665-bc8a-83aa2db3b33c)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-7bb465f89b-nhrhw_calico-apiserver(70b64262-db16-4665-bc8a-83aa2db3b33c)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"eaf4d6f751910ded5debcb0a407fe1647f085c1e88db7649e0bcc6fa4fbff0e0\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7bb465f89b-nhrhw" podUID="70b64262-db16-4665-bc8a-83aa2db3b33c" May 17 01:05:44.218914 env[1453]: time="2025-05-17T01:05:44.218874827Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-bdc7b675d-kkllc,Uid:be9f8b9c-4d2a-4e7a-8d7f-060f8218c335,Namespace:calico-system,Attempt:0,}" May 17 01:05:44.279465 env[1453]: time="2025-05-17T01:05:44.279428405Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.0\"" May 17 01:05:44.286963 kubelet[2439]: I0517 01:05:44.285739 2439 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 01:05:44.286963 kubelet[2439]: I0517 01:05:44.286905 2439 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="75f90dbe628597416a290bd0d8408ca492593ad2c9bf08de9fd7e56f91bc6e1e" May 17 01:05:44.288270 env[1453]: time="2025-05-17T01:05:44.288232289Z" level=info msg="StopPodSandbox for \"75f90dbe628597416a290bd0d8408ca492593ad2c9bf08de9fd7e56f91bc6e1e\"" May 17 01:05:44.290964 kubelet[2439]: I0517 01:05:44.290905 2439 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="9072d164c4b0ab1b8fcbbc155386f04e51ae75d013e86d406f43955febebbded" May 17 01:05:44.291384 env[1453]: time="2025-05-17T01:05:44.291354293Z" level=info msg="StopPodSandbox for \"9072d164c4b0ab1b8fcbbc155386f04e51ae75d013e86d406f43955febebbded\"" May 17 01:05:44.295972 kubelet[2439]: I0517 01:05:44.294117 2439 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="eaf4d6f751910ded5debcb0a407fe1647f085c1e88db7649e0bcc6fa4fbff0e0" May 17 01:05:44.301969 kubelet[2439]: I0517 01:05:44.300799 2439 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="d0fe4236d76d708298feebd63b43b6fd0cf876c07dcb9b984a060d5b0e2fa065" May 17 01:05:44.302102 env[1453]: time="2025-05-17T01:05:44.301269194Z" level=info msg="StopPodSandbox for \"d0fe4236d76d708298feebd63b43b6fd0cf876c07dcb9b984a060d5b0e2fa065\"" May 17 01:05:44.302965 kubelet[2439]: I0517 01:05:44.302528 2439 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="ddb911fedf4c2ccf6ed8ac040a53a0054cd4be370b4614c6e3133824cbadd2ab" May 17 01:05:44.303131 env[1453]: time="2025-05-17T01:05:44.296042120Z" level=info msg="StopPodSandbox for \"eaf4d6f751910ded5debcb0a407fe1647f085c1e88db7649e0bcc6fa4fbff0e0\"" May 17 01:05:44.303653 env[1453]: time="2025-05-17T01:05:44.303622467Z" level=info msg="StopPodSandbox for \"ddb911fedf4c2ccf6ed8ac040a53a0054cd4be370b4614c6e3133824cbadd2ab\"" May 17 01:05:44.307838 kubelet[2439]: I0517 01:05:44.306188 2439 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="610ba958463e0f9928b1a82a171a984c1ffe4522de3a9a7fa4a1256836f526e4" May 17 01:05:44.307959 env[1453]: time="2025-05-17T01:05:44.306695590Z" level=info msg="StopPodSandbox for \"610ba958463e0f9928b1a82a171a984c1ffe4522de3a9a7fa4a1256836f526e4\"" May 17 01:05:44.348000 audit[3496]: NETFILTER_CFG table=filter:104 family=2 entries=21 op=nft_register_rule pid=3496 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:05:44.348000 audit[3496]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=7480 a0=3 a1=ffffce580880 a2=0 a3=1 items=0 ppid=2540 pid=3496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:44.348000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:05:44.357000 audit[3496]: NETFILTER_CFG table=nat:105 family=2 entries=19 op=nft_register_chain pid=3496 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:05:44.357000 audit[3496]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6276 a0=3 a1=ffffce580880 a2=0 a3=1 items=0 ppid=2540 pid=3496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:44.357000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:05:44.364530 kubelet[2439]: E0517 01:05:44.364427 2439 configmap.go:193] Couldn't get configMap calico-system/goldmane-ca-bundle: failed to sync configmap cache: timed out waiting for the condition May 17 01:05:44.364671 kubelet[2439]: E0517 01:05:44.364470 2439 secret.go:189] Couldn't get secret calico-system/goldmane-key-pair: failed to sync secret cache: timed out waiting for the condition May 17 01:05:44.364671 kubelet[2439]: E0517 01:05:44.364486 2439 configmap.go:193] Couldn't get configMap calico-system/goldmane: failed to sync configmap cache: timed out waiting for the condition May 17 01:05:44.366496 kubelet[2439]: E0517 01:05:44.364662 2439 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/configmap/03203f23-8aa4-41b1-ba45-7088ffc7359f-goldmane-ca-bundle podName:03203f23-8aa4-41b1-ba45-7088ffc7359f nodeName:}" failed. No retries permitted until 2025-05-17 01:05:44.86457653 +0000 UTC m=+41.865033918 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "goldmane-ca-bundle" (UniqueName: "kubernetes.io/configmap/03203f23-8aa4-41b1-ba45-7088ffc7359f-goldmane-ca-bundle") pod "goldmane-78d55f7ddc-5zbrn" (UID: "03203f23-8aa4-41b1-ba45-7088ffc7359f") : failed to sync configmap cache: timed out waiting for the condition May 17 01:05:44.366496 kubelet[2439]: E0517 01:05:44.365851 2439 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/03203f23-8aa4-41b1-ba45-7088ffc7359f-goldmane-key-pair podName:03203f23-8aa4-41b1-ba45-7088ffc7359f nodeName:}" failed. No retries permitted until 2025-05-17 01:05:44.865796867 +0000 UTC m=+41.866254255 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "goldmane-key-pair" (UniqueName: "kubernetes.io/secret/03203f23-8aa4-41b1-ba45-7088ffc7359f-goldmane-key-pair") pod "goldmane-78d55f7ddc-5zbrn" (UID: "03203f23-8aa4-41b1-ba45-7088ffc7359f") : failed to sync secret cache: timed out waiting for the condition May 17 01:05:44.366496 kubelet[2439]: E0517 01:05:44.365873 2439 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/configmap/03203f23-8aa4-41b1-ba45-7088ffc7359f-config podName:03203f23-8aa4-41b1-ba45-7088ffc7359f nodeName:}" failed. No retries permitted until 2025-05-17 01:05:44.865864788 +0000 UTC m=+41.866322176 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "config" (UniqueName: "kubernetes.io/configmap/03203f23-8aa4-41b1-ba45-7088ffc7359f-config") pod "goldmane-78d55f7ddc-5zbrn" (UID: "03203f23-8aa4-41b1-ba45-7088ffc7359f") : failed to sync configmap cache: timed out waiting for the condition May 17 01:05:44.367070 env[1453]: time="2025-05-17T01:05:44.367016484Z" level=error msg="StopPodSandbox for \"75f90dbe628597416a290bd0d8408ca492593ad2c9bf08de9fd7e56f91bc6e1e\" failed" error="failed to destroy network for sandbox \"75f90dbe628597416a290bd0d8408ca492593ad2c9bf08de9fd7e56f91bc6e1e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 01:05:44.367401 kubelet[2439]: E0517 01:05:44.367359 2439 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"75f90dbe628597416a290bd0d8408ca492593ad2c9bf08de9fd7e56f91bc6e1e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="75f90dbe628597416a290bd0d8408ca492593ad2c9bf08de9fd7e56f91bc6e1e" May 17 01:05:44.367477 kubelet[2439]: E0517 01:05:44.367427 2439 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"75f90dbe628597416a290bd0d8408ca492593ad2c9bf08de9fd7e56f91bc6e1e"} May 17 01:05:44.367506 kubelet[2439]: E0517 01:05:44.367495 2439 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"9893c048-8d02-43b3-a0c7-1daf374b6950\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"75f90dbe628597416a290bd0d8408ca492593ad2c9bf08de9fd7e56f91bc6e1e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 01:05:44.367603 kubelet[2439]: E0517 01:05:44.367518 2439 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"9893c048-8d02-43b3-a0c7-1daf374b6950\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"75f90dbe628597416a290bd0d8408ca492593ad2c9bf08de9fd7e56f91bc6e1e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-rpdwj" podUID="9893c048-8d02-43b3-a0c7-1daf374b6950" May 17 01:05:44.418779 env[1453]: time="2025-05-17T01:05:44.418710216Z" level=error msg="StopPodSandbox for \"9072d164c4b0ab1b8fcbbc155386f04e51ae75d013e86d406f43955febebbded\" failed" error="failed to destroy network for sandbox \"9072d164c4b0ab1b8fcbbc155386f04e51ae75d013e86d406f43955febebbded\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 01:05:44.419053 kubelet[2439]: E0517 01:05:44.418993 2439 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"9072d164c4b0ab1b8fcbbc155386f04e51ae75d013e86d406f43955febebbded\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="9072d164c4b0ab1b8fcbbc155386f04e51ae75d013e86d406f43955febebbded" May 17 01:05:44.419140 kubelet[2439]: E0517 01:05:44.419067 2439 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"9072d164c4b0ab1b8fcbbc155386f04e51ae75d013e86d406f43955febebbded"} May 17 01:05:44.419140 kubelet[2439]: E0517 01:05:44.419115 2439 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"cbd568ae-4e42-43d9-8aad-56b7909a49ad\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9072d164c4b0ab1b8fcbbc155386f04e51ae75d013e86d406f43955febebbded\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 01:05:44.419219 kubelet[2439]: E0517 01:05:44.419138 2439 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"cbd568ae-4e42-43d9-8aad-56b7909a49ad\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9072d164c4b0ab1b8fcbbc155386f04e51ae75d013e86d406f43955febebbded\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-f6596879f-8tb74" podUID="cbd568ae-4e42-43d9-8aad-56b7909a49ad" May 17 01:05:44.424405 env[1453]: time="2025-05-17T01:05:44.424275375Z" level=error msg="StopPodSandbox for \"eaf4d6f751910ded5debcb0a407fe1647f085c1e88db7649e0bcc6fa4fbff0e0\" failed" error="failed to destroy network for sandbox \"eaf4d6f751910ded5debcb0a407fe1647f085c1e88db7649e0bcc6fa4fbff0e0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 01:05:44.424743 kubelet[2439]: E0517 01:05:44.424693 2439 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"eaf4d6f751910ded5debcb0a407fe1647f085c1e88db7649e0bcc6fa4fbff0e0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="eaf4d6f751910ded5debcb0a407fe1647f085c1e88db7649e0bcc6fa4fbff0e0" May 17 01:05:44.424818 kubelet[2439]: E0517 01:05:44.424768 2439 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"eaf4d6f751910ded5debcb0a407fe1647f085c1e88db7649e0bcc6fa4fbff0e0"} May 17 01:05:44.424818 kubelet[2439]: E0517 01:05:44.424802 2439 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"70b64262-db16-4665-bc8a-83aa2db3b33c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"eaf4d6f751910ded5debcb0a407fe1647f085c1e88db7649e0bcc6fa4fbff0e0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 01:05:44.424901 kubelet[2439]: E0517 01:05:44.424822 2439 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"70b64262-db16-4665-bc8a-83aa2db3b33c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"eaf4d6f751910ded5debcb0a407fe1647f085c1e88db7649e0bcc6fa4fbff0e0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7bb465f89b-nhrhw" podUID="70b64262-db16-4665-bc8a-83aa2db3b33c" May 17 01:05:44.431280 env[1453]: time="2025-05-17T01:05:44.431201113Z" level=error msg="StopPodSandbox for \"d0fe4236d76d708298feebd63b43b6fd0cf876c07dcb9b984a060d5b0e2fa065\" failed" error="failed to destroy network for sandbox \"d0fe4236d76d708298feebd63b43b6fd0cf876c07dcb9b984a060d5b0e2fa065\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 01:05:44.431640 kubelet[2439]: E0517 01:05:44.431565 2439 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d0fe4236d76d708298feebd63b43b6fd0cf876c07dcb9b984a060d5b0e2fa065\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d0fe4236d76d708298feebd63b43b6fd0cf876c07dcb9b984a060d5b0e2fa065" May 17 01:05:44.431712 kubelet[2439]: E0517 01:05:44.431659 2439 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"d0fe4236d76d708298feebd63b43b6fd0cf876c07dcb9b984a060d5b0e2fa065"} May 17 01:05:44.431743 kubelet[2439]: E0517 01:05:44.431712 2439 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c9fcf012-c9eb-4271-ada6-7659bcab9229\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d0fe4236d76d708298feebd63b43b6fd0cf876c07dcb9b984a060d5b0e2fa065\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 01:05:44.431803 kubelet[2439]: E0517 01:05:44.431734 2439 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c9fcf012-c9eb-4271-ada6-7659bcab9229\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d0fe4236d76d708298feebd63b43b6fd0cf876c07dcb9b984a060d5b0e2fa065\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-pnnwz" podUID="c9fcf012-c9eb-4271-ada6-7659bcab9229" May 17 01:05:44.443418 env[1453]: time="2025-05-17T01:05:44.443346165Z" level=error msg="StopPodSandbox for \"610ba958463e0f9928b1a82a171a984c1ffe4522de3a9a7fa4a1256836f526e4\" failed" error="failed to destroy network for sandbox \"610ba958463e0f9928b1a82a171a984c1ffe4522de3a9a7fa4a1256836f526e4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 01:05:44.443834 env[1453]: time="2025-05-17T01:05:44.443725090Z" level=error msg="Failed to destroy network for sandbox \"d8d53e1ffbd96b36ed34faf1651e0037b61be31cf3b663b79071d8a7e1a490cb\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 01:05:44.444040 kubelet[2439]: E0517 01:05:44.443994 2439 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"610ba958463e0f9928b1a82a171a984c1ffe4522de3a9a7fa4a1256836f526e4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="610ba958463e0f9928b1a82a171a984c1ffe4522de3a9a7fa4a1256836f526e4" May 17 01:05:44.444110 kubelet[2439]: E0517 01:05:44.444068 2439 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"610ba958463e0f9928b1a82a171a984c1ffe4522de3a9a7fa4a1256836f526e4"} May 17 01:05:44.444142 kubelet[2439]: E0517 01:05:44.444100 2439 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"76c2d8d7-3942-4d0e-bf68-64e138374d48\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"610ba958463e0f9928b1a82a171a984c1ffe4522de3a9a7fa4a1256836f526e4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 01:05:44.444199 kubelet[2439]: E0517 01:05:44.444137 2439 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"76c2d8d7-3942-4d0e-bf68-64e138374d48\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"610ba958463e0f9928b1a82a171a984c1ffe4522de3a9a7fa4a1256836f526e4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7bb465f89b-fvt58" podUID="76c2d8d7-3942-4d0e-bf68-64e138374d48" May 17 01:05:44.446349 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-d8d53e1ffbd96b36ed34faf1651e0037b61be31cf3b663b79071d8a7e1a490cb-shm.mount: Deactivated successfully. May 17 01:05:44.448465 env[1453]: time="2025-05-17T01:05:44.448400396Z" level=error msg="encountered an error cleaning up failed sandbox \"d8d53e1ffbd96b36ed34faf1651e0037b61be31cf3b663b79071d8a7e1a490cb\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 01:05:44.448696 env[1453]: time="2025-05-17T01:05:44.448648640Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-bdc7b675d-kkllc,Uid:be9f8b9c-4d2a-4e7a-8d7f-060f8218c335,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"d8d53e1ffbd96b36ed34faf1651e0037b61be31cf3b663b79071d8a7e1a490cb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 01:05:44.452541 kubelet[2439]: E0517 01:05:44.452130 2439 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d8d53e1ffbd96b36ed34faf1651e0037b61be31cf3b663b79071d8a7e1a490cb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 01:05:44.452541 kubelet[2439]: E0517 01:05:44.452212 2439 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d8d53e1ffbd96b36ed34faf1651e0037b61be31cf3b663b79071d8a7e1a490cb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-bdc7b675d-kkllc" May 17 01:05:44.452541 kubelet[2439]: E0517 01:05:44.452239 2439 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d8d53e1ffbd96b36ed34faf1651e0037b61be31cf3b663b79071d8a7e1a490cb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-bdc7b675d-kkllc" May 17 01:05:44.452706 kubelet[2439]: E0517 01:05:44.452285 2439 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"whisker-bdc7b675d-kkllc_calico-system(be9f8b9c-4d2a-4e7a-8d7f-060f8218c335)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"whisker-bdc7b675d-kkllc_calico-system(be9f8b9c-4d2a-4e7a-8d7f-060f8218c335)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"d8d53e1ffbd96b36ed34faf1651e0037b61be31cf3b663b79071d8a7e1a490cb\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-bdc7b675d-kkllc" podUID="be9f8b9c-4d2a-4e7a-8d7f-060f8218c335" May 17 01:05:44.455467 env[1453]: time="2025-05-17T01:05:44.455419216Z" level=error msg="StopPodSandbox for \"ddb911fedf4c2ccf6ed8ac040a53a0054cd4be370b4614c6e3133824cbadd2ab\" failed" error="failed to destroy network for sandbox \"ddb911fedf4c2ccf6ed8ac040a53a0054cd4be370b4614c6e3133824cbadd2ab\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 01:05:44.456971 kubelet[2439]: E0517 01:05:44.456812 2439 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"ddb911fedf4c2ccf6ed8ac040a53a0054cd4be370b4614c6e3133824cbadd2ab\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="ddb911fedf4c2ccf6ed8ac040a53a0054cd4be370b4614c6e3133824cbadd2ab" May 17 01:05:44.456971 kubelet[2439]: E0517 01:05:44.456869 2439 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"ddb911fedf4c2ccf6ed8ac040a53a0054cd4be370b4614c6e3133824cbadd2ab"} May 17 01:05:44.456971 kubelet[2439]: E0517 01:05:44.456901 2439 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"4d21f64d-bc3c-4fa5-8ad3-4aed6c59a824\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ddb911fedf4c2ccf6ed8ac040a53a0054cd4be370b4614c6e3133824cbadd2ab\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 01:05:44.456971 kubelet[2439]: E0517 01:05:44.456921 2439 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"4d21f64d-bc3c-4fa5-8ad3-4aed6c59a824\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ddb911fedf4c2ccf6ed8ac040a53a0054cd4be370b4614c6e3133824cbadd2ab\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-92ktb" podUID="4d21f64d-bc3c-4fa5-8ad3-4aed6c59a824" May 17 01:05:45.119332 env[1453]: time="2025-05-17T01:05:45.119289786Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-78d55f7ddc-5zbrn,Uid:03203f23-8aa4-41b1-ba45-7088ffc7359f,Namespace:calico-system,Attempt:0,}" May 17 01:05:45.213348 env[1453]: time="2025-05-17T01:05:45.213293575Z" level=error msg="Failed to destroy network for sandbox \"b1d69c6ea57ab5399fb64a7de5f173e1b3eb308ec16c87aac2c83464f92652bb\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 01:05:45.215912 env[1453]: time="2025-05-17T01:05:45.215868691Z" level=error msg="encountered an error cleaning up failed sandbox \"b1d69c6ea57ab5399fb64a7de5f173e1b3eb308ec16c87aac2c83464f92652bb\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 01:05:45.216074 env[1453]: time="2025-05-17T01:05:45.216045294Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-78d55f7ddc-5zbrn,Uid:03203f23-8aa4-41b1-ba45-7088ffc7359f,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"b1d69c6ea57ab5399fb64a7de5f173e1b3eb308ec16c87aac2c83464f92652bb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 01:05:45.217457 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-b1d69c6ea57ab5399fb64a7de5f173e1b3eb308ec16c87aac2c83464f92652bb-shm.mount: Deactivated successfully. May 17 01:05:45.218968 kubelet[2439]: E0517 01:05:45.218777 2439 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b1d69c6ea57ab5399fb64a7de5f173e1b3eb308ec16c87aac2c83464f92652bb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 01:05:45.218968 kubelet[2439]: E0517 01:05:45.218839 2439 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b1d69c6ea57ab5399fb64a7de5f173e1b3eb308ec16c87aac2c83464f92652bb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-78d55f7ddc-5zbrn" May 17 01:05:45.218968 kubelet[2439]: E0517 01:05:45.218858 2439 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b1d69c6ea57ab5399fb64a7de5f173e1b3eb308ec16c87aac2c83464f92652bb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-78d55f7ddc-5zbrn" May 17 01:05:45.219100 kubelet[2439]: E0517 01:05:45.218910 2439 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"goldmane-78d55f7ddc-5zbrn_calico-system(03203f23-8aa4-41b1-ba45-7088ffc7359f)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"goldmane-78d55f7ddc-5zbrn_calico-system(03203f23-8aa4-41b1-ba45-7088ffc7359f)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"b1d69c6ea57ab5399fb64a7de5f173e1b3eb308ec16c87aac2c83464f92652bb\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-78d55f7ddc-5zbrn" podUID="03203f23-8aa4-41b1-ba45-7088ffc7359f" May 17 01:05:45.308526 kubelet[2439]: I0517 01:05:45.308489 2439 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="d8d53e1ffbd96b36ed34faf1651e0037b61be31cf3b663b79071d8a7e1a490cb" May 17 01:05:45.309993 env[1453]: time="2025-05-17T01:05:45.309958922Z" level=info msg="StopPodSandbox for \"d8d53e1ffbd96b36ed34faf1651e0037b61be31cf3b663b79071d8a7e1a490cb\"" May 17 01:05:45.310706 kubelet[2439]: I0517 01:05:45.310615 2439 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="b1d69c6ea57ab5399fb64a7de5f173e1b3eb308ec16c87aac2c83464f92652bb" May 17 01:05:45.311510 env[1453]: time="2025-05-17T01:05:45.311484903Z" level=info msg="StopPodSandbox for \"b1d69c6ea57ab5399fb64a7de5f173e1b3eb308ec16c87aac2c83464f92652bb\"" May 17 01:05:45.341453 env[1453]: time="2025-05-17T01:05:45.341396480Z" level=error msg="StopPodSandbox for \"d8d53e1ffbd96b36ed34faf1651e0037b61be31cf3b663b79071d8a7e1a490cb\" failed" error="failed to destroy network for sandbox \"d8d53e1ffbd96b36ed34faf1651e0037b61be31cf3b663b79071d8a7e1a490cb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 01:05:45.342183 kubelet[2439]: E0517 01:05:45.342036 2439 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d8d53e1ffbd96b36ed34faf1651e0037b61be31cf3b663b79071d8a7e1a490cb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d8d53e1ffbd96b36ed34faf1651e0037b61be31cf3b663b79071d8a7e1a490cb" May 17 01:05:45.342183 kubelet[2439]: E0517 01:05:45.342084 2439 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"d8d53e1ffbd96b36ed34faf1651e0037b61be31cf3b663b79071d8a7e1a490cb"} May 17 01:05:45.342183 kubelet[2439]: E0517 01:05:45.342120 2439 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"be9f8b9c-4d2a-4e7a-8d7f-060f8218c335\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d8d53e1ffbd96b36ed34faf1651e0037b61be31cf3b663b79071d8a7e1a490cb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 01:05:45.342183 kubelet[2439]: E0517 01:05:45.342140 2439 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"be9f8b9c-4d2a-4e7a-8d7f-060f8218c335\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d8d53e1ffbd96b36ed34faf1651e0037b61be31cf3b663b79071d8a7e1a490cb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-bdc7b675d-kkllc" podUID="be9f8b9c-4d2a-4e7a-8d7f-060f8218c335" May 17 01:05:45.345492 env[1453]: time="2025-05-17T01:05:45.345455176Z" level=error msg="StopPodSandbox for \"b1d69c6ea57ab5399fb64a7de5f173e1b3eb308ec16c87aac2c83464f92652bb\" failed" error="failed to destroy network for sandbox \"b1d69c6ea57ab5399fb64a7de5f173e1b3eb308ec16c87aac2c83464f92652bb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 01:05:45.345841 kubelet[2439]: E0517 01:05:45.345726 2439 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b1d69c6ea57ab5399fb64a7de5f173e1b3eb308ec16c87aac2c83464f92652bb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b1d69c6ea57ab5399fb64a7de5f173e1b3eb308ec16c87aac2c83464f92652bb" May 17 01:05:45.345841 kubelet[2439]: E0517 01:05:45.345764 2439 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"b1d69c6ea57ab5399fb64a7de5f173e1b3eb308ec16c87aac2c83464f92652bb"} May 17 01:05:45.345841 kubelet[2439]: E0517 01:05:45.345789 2439 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"03203f23-8aa4-41b1-ba45-7088ffc7359f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b1d69c6ea57ab5399fb64a7de5f173e1b3eb308ec16c87aac2c83464f92652bb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 01:05:45.345841 kubelet[2439]: E0517 01:05:45.345807 2439 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"03203f23-8aa4-41b1-ba45-7088ffc7359f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b1d69c6ea57ab5399fb64a7de5f173e1b3eb308ec16c87aac2c83464f92652bb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-78d55f7ddc-5zbrn" podUID="03203f23-8aa4-41b1-ba45-7088ffc7359f" May 17 01:05:52.101843 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2392899551.mount: Deactivated successfully. May 17 01:05:52.325415 env[1453]: time="2025-05-17T01:05:52.325354409Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:05:52.334625 env[1453]: time="2025-05-17T01:05:52.334567565Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f7148fde8e28b27da58f84cac134cdc53b5df321cda13c660192f06839670732,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:05:52.339110 env[1453]: time="2025-05-17T01:05:52.339069421Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:05:52.346034 env[1453]: time="2025-05-17T01:05:52.345992628Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:7cb61ea47ca0a8e6d0526a42da4f1e399b37ccd13339d0776d272465cb7ee012,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:05:52.346498 env[1453]: time="2025-05-17T01:05:52.346470034Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.0\" returns image reference \"sha256:f7148fde8e28b27da58f84cac134cdc53b5df321cda13c660192f06839670732\"" May 17 01:05:52.362711 env[1453]: time="2025-05-17T01:05:52.362232031Z" level=info msg="CreateContainer within sandbox \"5543d027cb99086157193b88fa19eaa7be9459f91cb96c5c0a86def50743465a\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 17 01:05:52.401173 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2007264002.mount: Deactivated successfully. May 17 01:05:52.417600 env[1453]: time="2025-05-17T01:05:52.417543324Z" level=info msg="CreateContainer within sandbox \"5543d027cb99086157193b88fa19eaa7be9459f91cb96c5c0a86def50743465a\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"96108ddebfbacf09ebf988c2935cb82538e0fa2ad63784d0abfa3728fb4f9143\"" May 17 01:05:52.419727 env[1453]: time="2025-05-17T01:05:52.418317774Z" level=info msg="StartContainer for \"96108ddebfbacf09ebf988c2935cb82538e0fa2ad63784d0abfa3728fb4f9143\"" May 17 01:05:52.473668 systemd[1]: Started cri-containerd-96108ddebfbacf09ebf988c2935cb82538e0fa2ad63784d0abfa3728fb4f9143.scope. May 17 01:05:52.494000 audit[3601]: AVC avc: denied { perfmon } for pid=3601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:52.501056 kernel: kauditd_printk_skb: 40 callbacks suppressed May 17 01:05:52.501152 kernel: audit: type=1400 audit(1747443952.494:890): avc: denied { perfmon } for pid=3601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:52.494000 audit[3601]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2926 pid=3601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:52.547006 kernel: audit: type=1300 audit(1747443952.494:890): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2926 pid=3601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:52.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936313038646465626662616366303965626639383863323933356362 May 17 01:05:52.573979 kernel: audit: type=1327 audit(1747443952.494:890): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936313038646465626662616366303965626639383863323933356362 May 17 01:05:52.494000 audit[3601]: AVC avc: denied { bpf } for pid=3601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:52.591980 kernel: audit: type=1400 audit(1747443952.494:891): avc: denied { bpf } for pid=3601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:52.494000 audit[3601]: AVC avc: denied { bpf } for pid=3601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:52.610883 kernel: audit: type=1400 audit(1747443952.494:891): avc: denied { bpf } for pid=3601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:52.494000 audit[3601]: AVC avc: denied { bpf } for pid=3601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:52.627941 kernel: audit: type=1400 audit(1747443952.494:891): avc: denied { bpf } for pid=3601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:52.494000 audit[3601]: AVC avc: denied { perfmon } for pid=3601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:52.648751 kernel: audit: type=1400 audit(1747443952.494:891): avc: denied { perfmon } for pid=3601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:52.494000 audit[3601]: AVC avc: denied { perfmon } for pid=3601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:52.667489 kernel: audit: type=1400 audit(1747443952.494:891): avc: denied { perfmon } for pid=3601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:52.667641 kernel: audit: type=1400 audit(1747443952.494:891): avc: denied { perfmon } for pid=3601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:52.494000 audit[3601]: AVC avc: denied { perfmon } for pid=3601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:52.494000 audit[3601]: AVC avc: denied { perfmon } for pid=3601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:52.687163 env[1453]: time="2025-05-17T01:05:52.687123022Z" level=info msg="StartContainer for \"96108ddebfbacf09ebf988c2935cb82538e0fa2ad63784d0abfa3728fb4f9143\" returns successfully" May 17 01:05:52.704616 kernel: audit: type=1400 audit(1747443952.494:891): avc: denied { perfmon } for pid=3601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:52.494000 audit[3601]: AVC avc: denied { perfmon } for pid=3601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:52.494000 audit[3601]: AVC avc: denied { bpf } for pid=3601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:52.494000 audit[3601]: AVC avc: denied { bpf } for pid=3601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:52.494000 audit: BPF prog-id=134 op=LOAD May 17 01:05:52.494000 audit[3601]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2926 pid=3601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:52.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936313038646465626662616366303965626639383863323933356362 May 17 01:05:52.500000 audit[3601]: AVC avc: denied { bpf } for pid=3601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:52.500000 audit[3601]: AVC avc: denied { bpf } for pid=3601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:52.500000 audit[3601]: AVC avc: denied { perfmon } for pid=3601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:52.500000 audit[3601]: AVC avc: denied { perfmon } for pid=3601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:52.500000 audit[3601]: AVC avc: denied { perfmon } for pid=3601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:52.500000 audit[3601]: AVC avc: denied { perfmon } for pid=3601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:52.500000 audit[3601]: AVC avc: denied { perfmon } for pid=3601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:52.500000 audit[3601]: AVC avc: denied { bpf } for pid=3601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:52.500000 audit[3601]: AVC avc: denied { bpf } for pid=3601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:52.500000 audit: BPF prog-id=135 op=LOAD May 17 01:05:52.500000 audit[3601]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2926 pid=3601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:52.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936313038646465626662616366303965626639383863323933356362 May 17 01:05:52.518000 audit: BPF prog-id=135 op=UNLOAD May 17 01:05:52.518000 audit: BPF prog-id=134 op=UNLOAD May 17 01:05:52.518000 audit[3601]: AVC avc: denied { bpf } for pid=3601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:52.518000 audit[3601]: AVC avc: denied { bpf } for pid=3601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:52.518000 audit[3601]: AVC avc: denied { bpf } for pid=3601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:52.518000 audit[3601]: AVC avc: denied { perfmon } for pid=3601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:52.518000 audit[3601]: AVC avc: denied { perfmon } for pid=3601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:52.518000 audit[3601]: AVC avc: denied { perfmon } for pid=3601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:52.518000 audit[3601]: AVC avc: denied { perfmon } for pid=3601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:52.518000 audit[3601]: AVC avc: denied { perfmon } for pid=3601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:52.518000 audit[3601]: AVC avc: denied { bpf } for pid=3601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:52.518000 audit[3601]: AVC avc: denied { bpf } for pid=3601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:52.518000 audit: BPF prog-id=136 op=LOAD May 17 01:05:52.518000 audit[3601]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2926 pid=3601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:52.518000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936313038646465626662616366303965626639383863323933356362 May 17 01:05:53.542862 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 17 01:05:53.543080 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 17 01:05:53.660797 kubelet[2439]: I0517 01:05:53.660707 2439 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-r82np" podStartSLOduration=1.853598022 podStartE2EDuration="22.660687225s" podCreationTimestamp="2025-05-17 01:05:31 +0000 UTC" firstStartedPulling="2025-05-17 01:05:31.540572046 +0000 UTC m=+28.541029434" lastFinishedPulling="2025-05-17 01:05:52.347661249 +0000 UTC m=+49.348118637" observedRunningTime="2025-05-17 01:05:53.351302243 +0000 UTC m=+50.351759671" watchObservedRunningTime="2025-05-17 01:05:53.660687225 +0000 UTC m=+50.661144573" May 17 01:05:53.661891 env[1453]: time="2025-05-17T01:05:53.661850599Z" level=info msg="StopPodSandbox for \"d8d53e1ffbd96b36ed34faf1651e0037b61be31cf3b663b79071d8a7e1a490cb\"" May 17 01:05:53.791479 env[1453]: 2025-05-17 01:05:53.736 [INFO][3649] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="d8d53e1ffbd96b36ed34faf1651e0037b61be31cf3b663b79071d8a7e1a490cb" May 17 01:05:53.791479 env[1453]: 2025-05-17 01:05:53.736 [INFO][3649] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="d8d53e1ffbd96b36ed34faf1651e0037b61be31cf3b663b79071d8a7e1a490cb" iface="eth0" netns="/var/run/netns/cni-731b57eb-bdd2-8f06-34d6-c13e5aa2d702" May 17 01:05:53.791479 env[1453]: 2025-05-17 01:05:53.737 [INFO][3649] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="d8d53e1ffbd96b36ed34faf1651e0037b61be31cf3b663b79071d8a7e1a490cb" iface="eth0" netns="/var/run/netns/cni-731b57eb-bdd2-8f06-34d6-c13e5aa2d702" May 17 01:05:53.791479 env[1453]: 2025-05-17 01:05:53.737 [INFO][3649] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="d8d53e1ffbd96b36ed34faf1651e0037b61be31cf3b663b79071d8a7e1a490cb" iface="eth0" netns="/var/run/netns/cni-731b57eb-bdd2-8f06-34d6-c13e5aa2d702" May 17 01:05:53.791479 env[1453]: 2025-05-17 01:05:53.737 [INFO][3649] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="d8d53e1ffbd96b36ed34faf1651e0037b61be31cf3b663b79071d8a7e1a490cb" May 17 01:05:53.791479 env[1453]: 2025-05-17 01:05:53.737 [INFO][3649] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d8d53e1ffbd96b36ed34faf1651e0037b61be31cf3b663b79071d8a7e1a490cb" May 17 01:05:53.791479 env[1453]: 2025-05-17 01:05:53.772 [INFO][3662] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d8d53e1ffbd96b36ed34faf1651e0037b61be31cf3b663b79071d8a7e1a490cb" HandleID="k8s-pod-network.d8d53e1ffbd96b36ed34faf1651e0037b61be31cf3b663b79071d8a7e1a490cb" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-whisker--bdc7b675d--kkllc-eth0" May 17 01:05:53.791479 env[1453]: 2025-05-17 01:05:53.772 [INFO][3662] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 01:05:53.791479 env[1453]: 2025-05-17 01:05:53.773 [INFO][3662] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 01:05:53.791479 env[1453]: 2025-05-17 01:05:53.781 [WARNING][3662] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d8d53e1ffbd96b36ed34faf1651e0037b61be31cf3b663b79071d8a7e1a490cb" HandleID="k8s-pod-network.d8d53e1ffbd96b36ed34faf1651e0037b61be31cf3b663b79071d8a7e1a490cb" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-whisker--bdc7b675d--kkllc-eth0" May 17 01:05:53.791479 env[1453]: 2025-05-17 01:05:53.782 [INFO][3662] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d8d53e1ffbd96b36ed34faf1651e0037b61be31cf3b663b79071d8a7e1a490cb" HandleID="k8s-pod-network.d8d53e1ffbd96b36ed34faf1651e0037b61be31cf3b663b79071d8a7e1a490cb" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-whisker--bdc7b675d--kkllc-eth0" May 17 01:05:53.791479 env[1453]: 2025-05-17 01:05:53.783 [INFO][3662] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 01:05:53.791479 env[1453]: 2025-05-17 01:05:53.788 [INFO][3649] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="d8d53e1ffbd96b36ed34faf1651e0037b61be31cf3b663b79071d8a7e1a490cb" May 17 01:05:53.795592 env[1453]: time="2025-05-17T01:05:53.794804042Z" level=info msg="TearDown network for sandbox \"d8d53e1ffbd96b36ed34faf1651e0037b61be31cf3b663b79071d8a7e1a490cb\" successfully" May 17 01:05:53.795592 env[1453]: time="2025-05-17T01:05:53.794846922Z" level=info msg="StopPodSandbox for \"d8d53e1ffbd96b36ed34faf1651e0037b61be31cf3b663b79071d8a7e1a490cb\" returns successfully" May 17 01:05:53.794959 systemd[1]: run-netns-cni\x2d731b57eb\x2dbdd2\x2d8f06\x2d34d6\x2dc13e5aa2d702.mount: Deactivated successfully. May 17 01:05:53.959864 kubelet[2439]: I0517 01:05:53.959367 2439 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/be9f8b9c-4d2a-4e7a-8d7f-060f8218c335-whisker-backend-key-pair\") pod \"be9f8b9c-4d2a-4e7a-8d7f-060f8218c335\" (UID: \"be9f8b9c-4d2a-4e7a-8d7f-060f8218c335\") " May 17 01:05:53.959864 kubelet[2439]: I0517 01:05:53.959423 2439 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/be9f8b9c-4d2a-4e7a-8d7f-060f8218c335-whisker-ca-bundle\") pod \"be9f8b9c-4d2a-4e7a-8d7f-060f8218c335\" (UID: \"be9f8b9c-4d2a-4e7a-8d7f-060f8218c335\") " May 17 01:05:53.959864 kubelet[2439]: I0517 01:05:53.959447 2439 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"kube-api-access-r4547\" (UniqueName: \"kubernetes.io/projected/be9f8b9c-4d2a-4e7a-8d7f-060f8218c335-kube-api-access-r4547\") pod \"be9f8b9c-4d2a-4e7a-8d7f-060f8218c335\" (UID: \"be9f8b9c-4d2a-4e7a-8d7f-060f8218c335\") " May 17 01:05:54.012293 kubelet[2439]: I0517 01:05:54.011761 2439 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/be9f8b9c-4d2a-4e7a-8d7f-060f8218c335-whisker-ca-bundle" (OuterVolumeSpecName: "whisker-ca-bundle") pod "be9f8b9c-4d2a-4e7a-8d7f-060f8218c335" (UID: "be9f8b9c-4d2a-4e7a-8d7f-060f8218c335"). InnerVolumeSpecName "whisker-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGIDValue "" May 17 01:05:54.016596 systemd[1]: var-lib-kubelet-pods-be9f8b9c\x2d4d2a\x2d4e7a\x2d8d7f\x2d060f8218c335-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dr4547.mount: Deactivated successfully. May 17 01:05:54.019615 systemd[1]: var-lib-kubelet-pods-be9f8b9c\x2d4d2a\x2d4e7a\x2d8d7f\x2d060f8218c335-volumes-kubernetes.io\x7esecret-whisker\x2dbackend\x2dkey\x2dpair.mount: Deactivated successfully. May 17 01:05:54.021420 kubelet[2439]: I0517 01:05:54.021388 2439 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/be9f8b9c-4d2a-4e7a-8d7f-060f8218c335-whisker-backend-key-pair" (OuterVolumeSpecName: "whisker-backend-key-pair") pod "be9f8b9c-4d2a-4e7a-8d7f-060f8218c335" (UID: "be9f8b9c-4d2a-4e7a-8d7f-060f8218c335"). InnerVolumeSpecName "whisker-backend-key-pair". PluginName "kubernetes.io/secret", VolumeGIDValue "" May 17 01:05:54.021641 kubelet[2439]: I0517 01:05:54.021622 2439 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/be9f8b9c-4d2a-4e7a-8d7f-060f8218c335-kube-api-access-r4547" (OuterVolumeSpecName: "kube-api-access-r4547") pod "be9f8b9c-4d2a-4e7a-8d7f-060f8218c335" (UID: "be9f8b9c-4d2a-4e7a-8d7f-060f8218c335"). InnerVolumeSpecName "kube-api-access-r4547". PluginName "kubernetes.io/projected", VolumeGIDValue "" May 17 01:05:54.060399 kubelet[2439]: I0517 01:05:54.059812 2439 reconciler_common.go:299] "Volume detached for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/be9f8b9c-4d2a-4e7a-8d7f-060f8218c335-whisker-backend-key-pair\") on node \"ci-3510.3.7-n-56b9a5cda4\" DevicePath \"\"" May 17 01:05:54.060573 kubelet[2439]: I0517 01:05:54.060554 2439 reconciler_common.go:299] "Volume detached for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/be9f8b9c-4d2a-4e7a-8d7f-060f8218c335-whisker-ca-bundle\") on node \"ci-3510.3.7-n-56b9a5cda4\" DevicePath \"\"" May 17 01:05:54.060668 kubelet[2439]: I0517 01:05:54.060656 2439 reconciler_common.go:299] "Volume detached for volume \"kube-api-access-r4547\" (UniqueName: \"kubernetes.io/projected/be9f8b9c-4d2a-4e7a-8d7f-060f8218c335-kube-api-access-r4547\") on node \"ci-3510.3.7-n-56b9a5cda4\" DevicePath \"\"" May 17 01:05:54.332821 systemd[1]: Removed slice kubepods-besteffort-podbe9f8b9c_4d2a_4e7a_8d7f_060f8218c335.slice. May 17 01:05:54.404047 systemd[1]: Created slice kubepods-besteffort-pode6dfc9d9_b9da_4002_976e_1b3ffcb7dc07.slice. May 17 01:05:54.462910 kubelet[2439]: I0517 01:05:54.462869 2439 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/e6dfc9d9-b9da-4002-976e-1b3ffcb7dc07-whisker-backend-key-pair\") pod \"whisker-7dd859898d-fckds\" (UID: \"e6dfc9d9-b9da-4002-976e-1b3ffcb7dc07\") " pod="calico-system/whisker-7dd859898d-fckds" May 17 01:05:54.463154 kubelet[2439]: I0517 01:05:54.463139 2439 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/e6dfc9d9-b9da-4002-976e-1b3ffcb7dc07-whisker-ca-bundle\") pod \"whisker-7dd859898d-fckds\" (UID: \"e6dfc9d9-b9da-4002-976e-1b3ffcb7dc07\") " pod="calico-system/whisker-7dd859898d-fckds" May 17 01:05:54.463253 kubelet[2439]: I0517 01:05:54.463240 2439 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8h7xc\" (UniqueName: \"kubernetes.io/projected/e6dfc9d9-b9da-4002-976e-1b3ffcb7dc07-kube-api-access-8h7xc\") pod \"whisker-7dd859898d-fckds\" (UID: \"e6dfc9d9-b9da-4002-976e-1b3ffcb7dc07\") " pod="calico-system/whisker-7dd859898d-fckds" May 17 01:05:54.707895 env[1453]: time="2025-05-17T01:05:54.707492037Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-7dd859898d-fckds,Uid:e6dfc9d9-b9da-4002-976e-1b3ffcb7dc07,Namespace:calico-system,Attempt:0,}" May 17 01:05:54.897696 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 01:05:54.897841 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali48da8e75ea3: link becomes ready May 17 01:05:54.903976 systemd-networkd[1616]: cali48da8e75ea3: Link UP May 17 01:05:54.904149 systemd-networkd[1616]: cali48da8e75ea3: Gained carrier May 17 01:05:54.922084 env[1453]: 2025-05-17 01:05:54.771 [INFO][3684] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 17 01:05:54.922084 env[1453]: 2025-05-17 01:05:54.784 [INFO][3684] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--56b9a5cda4-k8s-whisker--7dd859898d--fckds-eth0 whisker-7dd859898d- calico-system e6dfc9d9-b9da-4002-976e-1b3ffcb7dc07 935 0 2025-05-17 01:05:54 +0000 UTC map[app.kubernetes.io/name:whisker k8s-app:whisker pod-template-hash:7dd859898d projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:whisker] map[] [] [] []} {k8s ci-3510.3.7-n-56b9a5cda4 whisker-7dd859898d-fckds eth0 whisker [] [] [kns.calico-system ksa.calico-system.whisker] cali48da8e75ea3 [] [] }} ContainerID="c0c9a25256e0458304fb8dd26f2594ef09b89673a5fb8c5eb97d292d5d9c9acc" Namespace="calico-system" Pod="whisker-7dd859898d-fckds" WorkloadEndpoint="ci--3510.3.7--n--56b9a5cda4-k8s-whisker--7dd859898d--fckds-" May 17 01:05:54.922084 env[1453]: 2025-05-17 01:05:54.784 [INFO][3684] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="c0c9a25256e0458304fb8dd26f2594ef09b89673a5fb8c5eb97d292d5d9c9acc" Namespace="calico-system" Pod="whisker-7dd859898d-fckds" WorkloadEndpoint="ci--3510.3.7--n--56b9a5cda4-k8s-whisker--7dd859898d--fckds-eth0" May 17 01:05:54.922084 env[1453]: 2025-05-17 01:05:54.808 [INFO][3698] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c0c9a25256e0458304fb8dd26f2594ef09b89673a5fb8c5eb97d292d5d9c9acc" HandleID="k8s-pod-network.c0c9a25256e0458304fb8dd26f2594ef09b89673a5fb8c5eb97d292d5d9c9acc" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-whisker--7dd859898d--fckds-eth0" May 17 01:05:54.922084 env[1453]: 2025-05-17 01:05:54.808 [INFO][3698] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="c0c9a25256e0458304fb8dd26f2594ef09b89673a5fb8c5eb97d292d5d9c9acc" HandleID="k8s-pod-network.c0c9a25256e0458304fb8dd26f2594ef09b89673a5fb8c5eb97d292d5d9c9acc" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-whisker--7dd859898d--fckds-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002d7020), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.7-n-56b9a5cda4", "pod":"whisker-7dd859898d-fckds", "timestamp":"2025-05-17 01:05:54.80866939 +0000 UTC"}, Hostname:"ci-3510.3.7-n-56b9a5cda4", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 01:05:54.922084 env[1453]: 2025-05-17 01:05:54.808 [INFO][3698] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 01:05:54.922084 env[1453]: 2025-05-17 01:05:54.808 [INFO][3698] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 01:05:54.922084 env[1453]: 2025-05-17 01:05:54.809 [INFO][3698] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-56b9a5cda4' May 17 01:05:54.922084 env[1453]: 2025-05-17 01:05:54.817 [INFO][3698] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.c0c9a25256e0458304fb8dd26f2594ef09b89673a5fb8c5eb97d292d5d9c9acc" host="ci-3510.3.7-n-56b9a5cda4" May 17 01:05:54.922084 env[1453]: 2025-05-17 01:05:54.821 [INFO][3698] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.7-n-56b9a5cda4" May 17 01:05:54.922084 env[1453]: 2025-05-17 01:05:54.824 [INFO][3698] ipam/ipam.go 511: Trying affinity for 192.168.67.128/26 host="ci-3510.3.7-n-56b9a5cda4" May 17 01:05:54.922084 env[1453]: 2025-05-17 01:05:54.826 [INFO][3698] ipam/ipam.go 158: Attempting to load block cidr=192.168.67.128/26 host="ci-3510.3.7-n-56b9a5cda4" May 17 01:05:54.922084 env[1453]: 2025-05-17 01:05:54.828 [INFO][3698] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.67.128/26 host="ci-3510.3.7-n-56b9a5cda4" May 17 01:05:54.922084 env[1453]: 2025-05-17 01:05:54.828 [INFO][3698] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.67.128/26 handle="k8s-pod-network.c0c9a25256e0458304fb8dd26f2594ef09b89673a5fb8c5eb97d292d5d9c9acc" host="ci-3510.3.7-n-56b9a5cda4" May 17 01:05:54.922084 env[1453]: 2025-05-17 01:05:54.830 [INFO][3698] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.c0c9a25256e0458304fb8dd26f2594ef09b89673a5fb8c5eb97d292d5d9c9acc May 17 01:05:54.922084 env[1453]: 2025-05-17 01:05:54.835 [INFO][3698] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.67.128/26 handle="k8s-pod-network.c0c9a25256e0458304fb8dd26f2594ef09b89673a5fb8c5eb97d292d5d9c9acc" host="ci-3510.3.7-n-56b9a5cda4" May 17 01:05:54.922084 env[1453]: 2025-05-17 01:05:54.845 [INFO][3698] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.67.129/26] block=192.168.67.128/26 handle="k8s-pod-network.c0c9a25256e0458304fb8dd26f2594ef09b89673a5fb8c5eb97d292d5d9c9acc" host="ci-3510.3.7-n-56b9a5cda4" May 17 01:05:54.922084 env[1453]: 2025-05-17 01:05:54.845 [INFO][3698] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.67.129/26] handle="k8s-pod-network.c0c9a25256e0458304fb8dd26f2594ef09b89673a5fb8c5eb97d292d5d9c9acc" host="ci-3510.3.7-n-56b9a5cda4" May 17 01:05:54.922084 env[1453]: 2025-05-17 01:05:54.845 [INFO][3698] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 01:05:54.922084 env[1453]: 2025-05-17 01:05:54.845 [INFO][3698] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.67.129/26] IPv6=[] ContainerID="c0c9a25256e0458304fb8dd26f2594ef09b89673a5fb8c5eb97d292d5d9c9acc" HandleID="k8s-pod-network.c0c9a25256e0458304fb8dd26f2594ef09b89673a5fb8c5eb97d292d5d9c9acc" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-whisker--7dd859898d--fckds-eth0" May 17 01:05:54.922790 env[1453]: 2025-05-17 01:05:54.847 [INFO][3684] cni-plugin/k8s.go 418: Populated endpoint ContainerID="c0c9a25256e0458304fb8dd26f2594ef09b89673a5fb8c5eb97d292d5d9c9acc" Namespace="calico-system" Pod="whisker-7dd859898d-fckds" WorkloadEndpoint="ci--3510.3.7--n--56b9a5cda4-k8s-whisker--7dd859898d--fckds-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--56b9a5cda4-k8s-whisker--7dd859898d--fckds-eth0", GenerateName:"whisker-7dd859898d-", Namespace:"calico-system", SelfLink:"", UID:"e6dfc9d9-b9da-4002-976e-1b3ffcb7dc07", ResourceVersion:"935", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 1, 5, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"7dd859898d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-56b9a5cda4", ContainerID:"", Pod:"whisker-7dd859898d-fckds", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.67.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"cali48da8e75ea3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 01:05:54.922790 env[1453]: 2025-05-17 01:05:54.847 [INFO][3684] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.67.129/32] ContainerID="c0c9a25256e0458304fb8dd26f2594ef09b89673a5fb8c5eb97d292d5d9c9acc" Namespace="calico-system" Pod="whisker-7dd859898d-fckds" WorkloadEndpoint="ci--3510.3.7--n--56b9a5cda4-k8s-whisker--7dd859898d--fckds-eth0" May 17 01:05:54.922790 env[1453]: 2025-05-17 01:05:54.847 [INFO][3684] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali48da8e75ea3 ContainerID="c0c9a25256e0458304fb8dd26f2594ef09b89673a5fb8c5eb97d292d5d9c9acc" Namespace="calico-system" Pod="whisker-7dd859898d-fckds" WorkloadEndpoint="ci--3510.3.7--n--56b9a5cda4-k8s-whisker--7dd859898d--fckds-eth0" May 17 01:05:54.922790 env[1453]: 2025-05-17 01:05:54.885 [INFO][3684] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="c0c9a25256e0458304fb8dd26f2594ef09b89673a5fb8c5eb97d292d5d9c9acc" Namespace="calico-system" Pod="whisker-7dd859898d-fckds" WorkloadEndpoint="ci--3510.3.7--n--56b9a5cda4-k8s-whisker--7dd859898d--fckds-eth0" May 17 01:05:54.922790 env[1453]: 2025-05-17 01:05:54.898 [INFO][3684] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="c0c9a25256e0458304fb8dd26f2594ef09b89673a5fb8c5eb97d292d5d9c9acc" Namespace="calico-system" Pod="whisker-7dd859898d-fckds" WorkloadEndpoint="ci--3510.3.7--n--56b9a5cda4-k8s-whisker--7dd859898d--fckds-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--56b9a5cda4-k8s-whisker--7dd859898d--fckds-eth0", GenerateName:"whisker-7dd859898d-", Namespace:"calico-system", SelfLink:"", UID:"e6dfc9d9-b9da-4002-976e-1b3ffcb7dc07", ResourceVersion:"935", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 1, 5, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"7dd859898d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-56b9a5cda4", ContainerID:"c0c9a25256e0458304fb8dd26f2594ef09b89673a5fb8c5eb97d292d5d9c9acc", Pod:"whisker-7dd859898d-fckds", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.67.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"cali48da8e75ea3", MAC:"da:74:63:10:81:2f", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 01:05:54.922790 env[1453]: 2025-05-17 01:05:54.917 [INFO][3684] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="c0c9a25256e0458304fb8dd26f2594ef09b89673a5fb8c5eb97d292d5d9c9acc" Namespace="calico-system" Pod="whisker-7dd859898d-fckds" WorkloadEndpoint="ci--3510.3.7--n--56b9a5cda4-k8s-whisker--7dd859898d--fckds-eth0" May 17 01:05:54.924000 audit[3724]: AVC avc: denied { write } for pid=3724 comm="tee" name="fd" dev="proc" ino=25800 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 01:05:54.924000 audit[3724]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe290c7c4 a2=241 a3=1b6 items=1 ppid=3715 pid=3724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:54.924000 audit: CWD cwd="/etc/service/enabled/bird/log" May 17 01:05:54.924000 audit: PATH item=0 name="/dev/fd/63" inode=25797 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 01:05:54.924000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 01:05:54.939089 env[1453]: time="2025-05-17T01:05:54.939008018Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 01:05:54.939089 env[1453]: time="2025-05-17T01:05:54.939048859Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 01:05:54.939089 env[1453]: time="2025-05-17T01:05:54.939059259Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 01:05:54.939250 env[1453]: time="2025-05-17T01:05:54.939190820Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c0c9a25256e0458304fb8dd26f2594ef09b89673a5fb8c5eb97d292d5d9c9acc pid=3746 runtime=io.containerd.runc.v2 May 17 01:05:54.959972 systemd[1]: Started cri-containerd-c0c9a25256e0458304fb8dd26f2594ef09b89673a5fb8c5eb97d292d5d9c9acc.scope. May 17 01:05:54.967000 audit[3767]: AVC avc: denied { write } for pid=3767 comm="tee" name="fd" dev="proc" ino=25870 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 01:05:54.967000 audit[3767]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc5b3b7b4 a2=241 a3=1b6 items=1 ppid=3729 pid=3767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:54.967000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 17 01:05:54.967000 audit: PATH item=0 name="/dev/fd/63" inode=26728 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 01:05:54.967000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 01:05:55.004000 audit[3807]: AVC avc: denied { write } for pid=3807 comm="tee" name="fd" dev="proc" ino=26772 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 01:05:55.004000 audit[3807]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc59f17c3 a2=241 a3=1b6 items=1 ppid=3728 pid=3807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.004000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 17 01:05:55.004000 audit: PATH item=0 name="/dev/fd/63" inode=25905 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 01:05:55.004000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 01:05:55.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.006000 audit: BPF prog-id=137 op=LOAD May 17 01:05:55.007000 audit[3759]: AVC avc: denied { bpf } for pid=3759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.007000 audit[3759]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c5b38 a2=10 a3=0 items=0 ppid=3746 pid=3759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.007000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330633961323532353665303435383330346662386464323666323539 May 17 01:05:55.007000 audit[3759]: AVC avc: denied { perfmon } for pid=3759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.007000 audit[3759]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=3746 pid=3759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.007000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330633961323532353665303435383330346662386464323666323539 May 17 01:05:55.007000 audit[3759]: AVC avc: denied { bpf } for pid=3759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.007000 audit[3759]: AVC avc: denied { bpf } for pid=3759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.007000 audit[3759]: AVC avc: denied { bpf } for pid=3759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.007000 audit[3759]: AVC avc: denied { perfmon } for pid=3759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.007000 audit[3759]: AVC avc: denied { perfmon } for pid=3759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.007000 audit[3759]: AVC avc: denied { perfmon } for pid=3759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.007000 audit[3759]: AVC avc: denied { perfmon } for pid=3759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.007000 audit[3759]: AVC avc: denied { perfmon } for pid=3759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.007000 audit[3759]: AVC avc: denied { bpf } for pid=3759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.007000 audit[3759]: AVC avc: denied { bpf } for pid=3759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.007000 audit: BPF prog-id=138 op=LOAD May 17 01:05:55.007000 audit[3759]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=3746 pid=3759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.007000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330633961323532353665303435383330346662386464323666323539 May 17 01:05:55.007000 audit[3759]: AVC avc: denied { bpf } for pid=3759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.007000 audit[3759]: AVC avc: denied { bpf } for pid=3759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.007000 audit[3759]: AVC avc: denied { perfmon } for pid=3759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.007000 audit[3759]: AVC avc: denied { perfmon } for pid=3759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.007000 audit[3759]: AVC avc: denied { perfmon } for pid=3759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.007000 audit[3759]: AVC avc: denied { perfmon } for pid=3759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.007000 audit[3759]: AVC avc: denied { perfmon } for pid=3759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.007000 audit[3759]: AVC avc: denied { bpf } for pid=3759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.007000 audit[3759]: AVC avc: denied { bpf } for pid=3759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.007000 audit: BPF prog-id=139 op=LOAD May 17 01:05:55.007000 audit[3759]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=3746 pid=3759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.007000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330633961323532353665303435383330346662386464323666323539 May 17 01:05:55.008000 audit: BPF prog-id=139 op=UNLOAD May 17 01:05:55.008000 audit: BPF prog-id=138 op=UNLOAD May 17 01:05:55.008000 audit[3759]: AVC avc: denied { bpf } for pid=3759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.008000 audit[3759]: AVC avc: denied { bpf } for pid=3759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.008000 audit[3759]: AVC avc: denied { bpf } for pid=3759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.008000 audit[3759]: AVC avc: denied { perfmon } for pid=3759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.008000 audit[3759]: AVC avc: denied { perfmon } for pid=3759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.008000 audit[3759]: AVC avc: denied { perfmon } for pid=3759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.008000 audit[3759]: AVC avc: denied { perfmon } for pid=3759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.008000 audit[3759]: AVC avc: denied { perfmon } for pid=3759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.008000 audit[3759]: AVC avc: denied { bpf } for pid=3759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.008000 audit[3759]: AVC avc: denied { bpf } for pid=3759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.008000 audit: BPF prog-id=140 op=LOAD May 17 01:05:55.008000 audit[3759]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=3746 pid=3759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.008000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330633961323532353665303435383330346662386464323666323539 May 17 01:05:55.033000 audit[3787]: AVC avc: denied { write } for pid=3787 comm="tee" name="fd" dev="proc" ino=25942 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 01:05:55.033000 audit[3787]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff3caf7c3 a2=241 a3=1b6 items=1 ppid=3745 pid=3787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.033000 audit: CWD cwd="/etc/service/enabled/felix/log" May 17 01:05:55.033000 audit: PATH item=0 name="/dev/fd/63" inode=25886 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 01:05:55.033000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 01:05:55.046735 env[1453]: time="2025-05-17T01:05:55.046679962Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-7dd859898d-fckds,Uid:e6dfc9d9-b9da-4002-976e-1b3ffcb7dc07,Namespace:calico-system,Attempt:0,} returns sandbox id \"c0c9a25256e0458304fb8dd26f2594ef09b89673a5fb8c5eb97d292d5d9c9acc\"" May 17 01:05:55.048599 env[1453]: time="2025-05-17T01:05:55.048569745Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\"" May 17 01:05:55.058000 audit[3831]: AVC avc: denied { write } for pid=3831 comm="tee" name="fd" dev="proc" ino=25958 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 01:05:55.058000 audit[3831]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe00fa7c3 a2=241 a3=1b6 items=1 ppid=3726 pid=3831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.058000 audit: CWD cwd="/etc/service/enabled/confd/log" May 17 01:05:55.058000 audit: PATH item=0 name="/dev/fd/63" inode=25950 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 01:05:55.058000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 01:05:55.064000 audit[3834]: AVC avc: denied { write } for pid=3834 comm="tee" name="fd" dev="proc" ino=25962 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 01:05:55.064000 audit[3834]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe182f7c5 a2=241 a3=1b6 items=1 ppid=3734 pid=3834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.064000 audit: CWD cwd="/etc/service/enabled/cni/log" May 17 01:05:55.064000 audit: PATH item=0 name="/dev/fd/63" inode=25955 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 01:05:55.064000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 01:05:55.070000 audit[3800]: AVC avc: denied { write } for pid=3800 comm="tee" name="fd" dev="proc" ino=26796 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 01:05:55.070000 audit[3800]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffee8c17b3 a2=241 a3=1b6 items=1 ppid=3731 pid=3800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.070000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 17 01:05:55.070000 audit: PATH item=0 name="/dev/fd/63" inode=26763 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 01:05:55.070000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 01:05:55.122962 kubelet[2439]: I0517 01:05:55.122751 2439 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="be9f8b9c-4d2a-4e7a-8d7f-060f8218c335" path="/var/lib/kubelet/pods/be9f8b9c-4d2a-4e7a-8d7f-060f8218c335/volumes" May 17 01:05:55.244577 env[1453]: time="2025-05-17T01:05:55.244480380Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 01:05:55.248481 env[1453]: time="2025-05-17T01:05:55.248436427Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 01:05:55.249193 kubelet[2439]: E0517 01:05:55.248762 2439 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 01:05:55.249193 kubelet[2439]: E0517 01:05:55.248807 2439 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 01:05:55.249332 kubelet[2439]: E0517 01:05:55.248951 2439 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.0,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:e8f448703ed64084b96c12586cf5068a,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-8h7xc,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-7dd859898d-fckds_calico-system(e6dfc9d9-b9da-4002-976e-1b3ffcb7dc07): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 01:05:55.250961 env[1453]: time="2025-05-17T01:05:55.250920537Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\"" May 17 01:05:55.305000 audit[3868]: AVC avc: denied { bpf } for pid=3868 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.305000 audit[3868]: AVC avc: denied { bpf } for pid=3868 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.305000 audit[3868]: AVC avc: denied { perfmon } for pid=3868 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.305000 audit[3868]: AVC avc: denied { perfmon } for pid=3868 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.305000 audit[3868]: AVC avc: denied { perfmon } for pid=3868 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.305000 audit[3868]: AVC avc: denied { perfmon } for pid=3868 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.305000 audit[3868]: AVC avc: denied { perfmon } for pid=3868 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.305000 audit[3868]: AVC avc: denied { bpf } for pid=3868 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.305000 audit[3868]: AVC avc: denied { bpf } for pid=3868 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.305000 audit: BPF prog-id=141 op=LOAD May 17 01:05:55.305000 audit[3868]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc2efa8a8 a2=98 a3=ffffc2efa898 items=0 ppid=3752 pid=3868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.305000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 01:05:55.305000 audit: BPF prog-id=141 op=UNLOAD May 17 01:05:55.305000 audit[3868]: AVC avc: denied { bpf } for pid=3868 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.305000 audit[3868]: AVC avc: denied { bpf } for pid=3868 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.305000 audit[3868]: AVC avc: denied { perfmon } for pid=3868 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.305000 audit[3868]: AVC avc: denied { perfmon } for pid=3868 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.305000 audit[3868]: AVC avc: denied { perfmon } for pid=3868 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.305000 audit[3868]: AVC avc: denied { perfmon } for pid=3868 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.305000 audit[3868]: AVC avc: denied { perfmon } for pid=3868 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.305000 audit[3868]: AVC avc: denied { bpf } for pid=3868 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.305000 audit[3868]: AVC avc: denied { bpf } for pid=3868 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.305000 audit: BPF prog-id=142 op=LOAD May 17 01:05:55.305000 audit[3868]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc2efa538 a2=74 a3=95 items=0 ppid=3752 pid=3868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.305000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 01:05:55.305000 audit: BPF prog-id=142 op=UNLOAD May 17 01:05:55.305000 audit[3868]: AVC avc: denied { bpf } for pid=3868 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.305000 audit[3868]: AVC avc: denied { bpf } for pid=3868 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.305000 audit[3868]: AVC avc: denied { perfmon } for pid=3868 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.305000 audit[3868]: AVC avc: denied { perfmon } for pid=3868 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.305000 audit[3868]: AVC avc: denied { perfmon } for pid=3868 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.305000 audit[3868]: AVC avc: denied { perfmon } for pid=3868 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.305000 audit[3868]: AVC avc: denied { perfmon } for pid=3868 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.305000 audit[3868]: AVC avc: denied { bpf } for pid=3868 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.305000 audit[3868]: AVC avc: denied { bpf } for pid=3868 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.305000 audit: BPF prog-id=143 op=LOAD May 17 01:05:55.305000 audit[3868]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc2efa598 a2=94 a3=2 items=0 ppid=3752 pid=3868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.305000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 01:05:55.305000 audit: BPF prog-id=143 op=UNLOAD May 17 01:05:55.402000 audit[3868]: AVC avc: denied { bpf } for pid=3868 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.402000 audit[3868]: AVC avc: denied { bpf } for pid=3868 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.402000 audit[3868]: AVC avc: denied { perfmon } for pid=3868 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.402000 audit[3868]: AVC avc: denied { perfmon } for pid=3868 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.402000 audit[3868]: AVC avc: denied { perfmon } for pid=3868 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.402000 audit[3868]: AVC avc: denied { perfmon } for pid=3868 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.402000 audit[3868]: AVC avc: denied { perfmon } for pid=3868 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.402000 audit[3868]: AVC avc: denied { bpf } for pid=3868 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.402000 audit[3868]: AVC avc: denied { bpf } for pid=3868 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.402000 audit: BPF prog-id=144 op=LOAD May 17 01:05:55.402000 audit[3868]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc2efa558 a2=40 a3=ffffc2efa588 items=0 ppid=3752 pid=3868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.402000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 01:05:55.402000 audit: BPF prog-id=144 op=UNLOAD May 17 01:05:55.402000 audit[3868]: AVC avc: denied { perfmon } for pid=3868 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.402000 audit[3868]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffc2efa670 a2=50 a3=0 items=0 ppid=3752 pid=3868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.402000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 01:05:55.410000 audit[3868]: AVC avc: denied { bpf } for pid=3868 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.410000 audit[3868]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc2efa5c8 a2=28 a3=ffffc2efa6f8 items=0 ppid=3752 pid=3868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.410000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 01:05:55.410000 audit[3868]: AVC avc: denied { bpf } for pid=3868 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.410000 audit[3868]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc2efa5f8 a2=28 a3=ffffc2efa728 items=0 ppid=3752 pid=3868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.410000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 01:05:55.410000 audit[3868]: AVC avc: denied { bpf } for pid=3868 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.410000 audit[3868]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc2efa4a8 a2=28 a3=ffffc2efa5d8 items=0 ppid=3752 pid=3868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.410000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 01:05:55.410000 audit[3868]: AVC avc: denied { bpf } for pid=3868 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.410000 audit[3868]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc2efa618 a2=28 a3=ffffc2efa748 items=0 ppid=3752 pid=3868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.410000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 01:05:55.410000 audit[3868]: AVC avc: denied { bpf } for pid=3868 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.410000 audit[3868]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc2efa5f8 a2=28 a3=ffffc2efa728 items=0 ppid=3752 pid=3868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.410000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 01:05:55.410000 audit[3868]: AVC avc: denied { bpf } for pid=3868 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.410000 audit[3868]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc2efa5e8 a2=28 a3=ffffc2efa718 items=0 ppid=3752 pid=3868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.410000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 01:05:55.410000 audit[3868]: AVC avc: denied { bpf } for pid=3868 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.410000 audit[3868]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc2efa618 a2=28 a3=ffffc2efa748 items=0 ppid=3752 pid=3868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.410000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 01:05:55.410000 audit[3868]: AVC avc: denied { bpf } for pid=3868 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.410000 audit[3868]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc2efa5f8 a2=28 a3=ffffc2efa728 items=0 ppid=3752 pid=3868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.410000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 01:05:55.410000 audit[3868]: AVC avc: denied { bpf } for pid=3868 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.410000 audit[3868]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc2efa618 a2=28 a3=ffffc2efa748 items=0 ppid=3752 pid=3868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.410000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 01:05:55.410000 audit[3868]: AVC avc: denied { bpf } for pid=3868 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.410000 audit[3868]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc2efa5e8 a2=28 a3=ffffc2efa718 items=0 ppid=3752 pid=3868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.410000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 01:05:55.410000 audit[3868]: AVC avc: denied { bpf } for pid=3868 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.410000 audit[3868]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc2efa668 a2=28 a3=ffffc2efa7a8 items=0 ppid=3752 pid=3868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.410000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 01:05:55.410000 audit[3868]: AVC avc: denied { perfmon } for pid=3868 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.410000 audit[3868]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffc2efa3a0 a2=50 a3=0 items=0 ppid=3752 pid=3868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.410000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 01:05:55.411000 audit[3868]: AVC avc: denied { bpf } for pid=3868 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.411000 audit[3868]: AVC avc: denied { bpf } for pid=3868 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.411000 audit[3868]: AVC avc: denied { perfmon } for pid=3868 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.411000 audit[3868]: AVC avc: denied { perfmon } for pid=3868 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.411000 audit[3868]: AVC avc: denied { perfmon } for pid=3868 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.411000 audit[3868]: AVC avc: denied { perfmon } for pid=3868 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.411000 audit[3868]: AVC avc: denied { perfmon } for pid=3868 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.411000 audit[3868]: AVC avc: denied { bpf } for pid=3868 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.411000 audit[3868]: AVC avc: denied { bpf } for pid=3868 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.411000 audit: BPF prog-id=145 op=LOAD May 17 01:05:55.411000 audit[3868]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffc2efa3a8 a2=94 a3=5 items=0 ppid=3752 pid=3868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.411000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 01:05:55.411000 audit: BPF prog-id=145 op=UNLOAD May 17 01:05:55.411000 audit[3868]: AVC avc: denied { perfmon } for pid=3868 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.411000 audit[3868]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffc2efa4b0 a2=50 a3=0 items=0 ppid=3752 pid=3868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.411000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 01:05:55.411000 audit[3868]: AVC avc: denied { bpf } for pid=3868 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.411000 audit[3868]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffc2efa5f8 a2=4 a3=3 items=0 ppid=3752 pid=3868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.411000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 01:05:55.411000 audit[3868]: AVC avc: denied { bpf } for pid=3868 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.411000 audit[3868]: AVC avc: denied { bpf } for pid=3868 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.411000 audit[3868]: AVC avc: denied { perfmon } for pid=3868 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.411000 audit[3868]: AVC avc: denied { bpf } for pid=3868 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.411000 audit[3868]: AVC avc: denied { perfmon } for pid=3868 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.411000 audit[3868]: AVC avc: denied { perfmon } for pid=3868 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.411000 audit[3868]: AVC avc: denied { perfmon } for pid=3868 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.411000 audit[3868]: AVC avc: denied { perfmon } for pid=3868 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.411000 audit[3868]: AVC avc: denied { perfmon } for pid=3868 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.411000 audit[3868]: AVC avc: denied { bpf } for pid=3868 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.411000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:05:55.411000 audit[3868]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffc2efa5d8 a2=94 a3=6 items=0 ppid=3752 pid=3868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.411000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 01:05:55.411000 audit[3868]: AVC avc: denied { bpf } for pid=3868 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.411000 audit[3868]: AVC avc: denied { bpf } for pid=3868 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.411000 audit[3868]: AVC avc: denied { perfmon } for pid=3868 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.411000 audit[3868]: AVC avc: denied { bpf } for pid=3868 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.411000 audit[3868]: AVC avc: denied { perfmon } for pid=3868 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.411000 audit[3868]: AVC avc: denied { perfmon } for pid=3868 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.411000 audit[3868]: AVC avc: denied { perfmon } for pid=3868 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.411000 audit[3868]: AVC avc: denied { perfmon } for pid=3868 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.411000 audit[3868]: AVC avc: denied { perfmon } for pid=3868 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.411000 audit[3868]: AVC avc: denied { bpf } for pid=3868 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.411000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:05:55.411000 audit[3868]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffc2ef9da8 a2=94 a3=83 items=0 ppid=3752 pid=3868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.411000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 01:05:55.411000 audit[3868]: AVC avc: denied { bpf } for pid=3868 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.411000 audit[3868]: AVC avc: denied { bpf } for pid=3868 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.411000 audit[3868]: AVC avc: denied { perfmon } for pid=3868 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.411000 audit[3868]: AVC avc: denied { bpf } for pid=3868 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.411000 audit[3868]: AVC avc: denied { perfmon } for pid=3868 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.411000 audit[3868]: AVC avc: denied { perfmon } for pid=3868 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.411000 audit[3868]: AVC avc: denied { perfmon } for pid=3868 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.411000 audit[3868]: AVC avc: denied { perfmon } for pid=3868 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.411000 audit[3868]: AVC avc: denied { perfmon } for pid=3868 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.411000 audit[3868]: AVC avc: denied { bpf } for pid=3868 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.411000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:05:55.411000 audit[3868]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffc2ef9da8 a2=94 a3=83 items=0 ppid=3752 pid=3868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.411000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 01:05:55.422000 audit[3871]: AVC avc: denied { bpf } for pid=3871 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.422000 audit[3871]: AVC avc: denied { bpf } for pid=3871 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.422000 audit[3871]: AVC avc: denied { perfmon } for pid=3871 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.422000 audit[3871]: AVC avc: denied { perfmon } for pid=3871 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.422000 audit[3871]: AVC avc: denied { perfmon } for pid=3871 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.422000 audit[3871]: AVC avc: denied { perfmon } for pid=3871 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.422000 audit[3871]: AVC avc: denied { perfmon } for pid=3871 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.422000 audit[3871]: AVC avc: denied { bpf } for pid=3871 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.422000 audit[3871]: AVC avc: denied { bpf } for pid=3871 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.422000 audit: BPF prog-id=146 op=LOAD May 17 01:05:55.422000 audit[3871]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc7bf1c08 a2=98 a3=ffffc7bf1bf8 items=0 ppid=3752 pid=3871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.422000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 01:05:55.422000 audit: BPF prog-id=146 op=UNLOAD May 17 01:05:55.422000 audit[3871]: AVC avc: denied { bpf } for pid=3871 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.422000 audit[3871]: AVC avc: denied { bpf } for pid=3871 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.422000 audit[3871]: AVC avc: denied { perfmon } for pid=3871 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.422000 audit[3871]: AVC avc: denied { perfmon } for pid=3871 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.422000 audit[3871]: AVC avc: denied { perfmon } for pid=3871 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.422000 audit[3871]: AVC avc: denied { perfmon } for pid=3871 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.422000 audit[3871]: AVC avc: denied { perfmon } for pid=3871 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.422000 audit[3871]: AVC avc: denied { bpf } for pid=3871 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.422000 audit[3871]: AVC avc: denied { bpf } for pid=3871 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.422000 audit: BPF prog-id=147 op=LOAD May 17 01:05:55.422000 audit[3871]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc7bf1ab8 a2=74 a3=95 items=0 ppid=3752 pid=3871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.422000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 01:05:55.422000 audit: BPF prog-id=147 op=UNLOAD May 17 01:05:55.422000 audit[3871]: AVC avc: denied { bpf } for pid=3871 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.422000 audit[3871]: AVC avc: denied { bpf } for pid=3871 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.422000 audit[3871]: AVC avc: denied { perfmon } for pid=3871 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.422000 audit[3871]: AVC avc: denied { perfmon } for pid=3871 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.422000 audit[3871]: AVC avc: denied { perfmon } for pid=3871 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.422000 audit[3871]: AVC avc: denied { perfmon } for pid=3871 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.422000 audit[3871]: AVC avc: denied { perfmon } for pid=3871 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.422000 audit[3871]: AVC avc: denied { bpf } for pid=3871 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.422000 audit[3871]: AVC avc: denied { bpf } for pid=3871 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.422000 audit: BPF prog-id=148 op=LOAD May 17 01:05:55.422000 audit[3871]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc7bf1ae8 a2=40 a3=ffffc7bf1b18 items=0 ppid=3752 pid=3871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.422000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 01:05:55.422000 audit: BPF prog-id=148 op=UNLOAD May 17 01:05:55.510626 env[1453]: time="2025-05-17T01:05:55.510517177Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 01:05:55.514354 env[1453]: time="2025-05-17T01:05:55.514302743Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 01:05:55.515032 kubelet[2439]: E0517 01:05:55.514584 2439 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 01:05:55.515032 kubelet[2439]: E0517 01:05:55.514636 2439 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 01:05:55.515164 kubelet[2439]: E0517 01:05:55.514983 2439 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-8h7xc,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-7dd859898d-fckds_calico-system(e6dfc9d9-b9da-4002-976e-1b3ffcb7dc07): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 01:05:55.516199 kubelet[2439]: E0517 01:05:55.516147 2439 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-7dd859898d-fckds" podUID="e6dfc9d9-b9da-4002-976e-1b3ffcb7dc07" May 17 01:05:55.638199 systemd-networkd[1616]: vxlan.calico: Link UP May 17 01:05:55.638208 systemd-networkd[1616]: vxlan.calico: Gained carrier May 17 01:05:55.658000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.658000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.658000 audit[3897]: AVC avc: denied { perfmon } for pid=3897 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.658000 audit[3897]: AVC avc: denied { perfmon } for pid=3897 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.658000 audit[3897]: AVC avc: denied { perfmon } for pid=3897 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.658000 audit[3897]: AVC avc: denied { perfmon } for pid=3897 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.658000 audit[3897]: AVC avc: denied { perfmon } for pid=3897 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.658000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.658000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.658000 audit: BPF prog-id=149 op=LOAD May 17 01:05:55.658000 audit[3897]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc7c6b258 a2=98 a3=ffffc7c6b248 items=0 ppid=3752 pid=3897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.658000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 01:05:55.661000 audit: BPF prog-id=149 op=UNLOAD May 17 01:05:55.661000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.661000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.661000 audit[3897]: AVC avc: denied { perfmon } for pid=3897 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.661000 audit[3897]: AVC avc: denied { perfmon } for pid=3897 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.661000 audit[3897]: AVC avc: denied { perfmon } for pid=3897 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.661000 audit[3897]: AVC avc: denied { perfmon } for pid=3897 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.661000 audit[3897]: AVC avc: denied { perfmon } for pid=3897 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.661000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.661000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.661000 audit: BPF prog-id=150 op=LOAD May 17 01:05:55.661000 audit[3897]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc7c6af38 a2=74 a3=95 items=0 ppid=3752 pid=3897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.661000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 01:05:55.661000 audit: BPF prog-id=150 op=UNLOAD May 17 01:05:55.661000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.661000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.661000 audit[3897]: AVC avc: denied { perfmon } for pid=3897 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.661000 audit[3897]: AVC avc: denied { perfmon } for pid=3897 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.661000 audit[3897]: AVC avc: denied { perfmon } for pid=3897 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.661000 audit[3897]: AVC avc: denied { perfmon } for pid=3897 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.661000 audit[3897]: AVC avc: denied { perfmon } for pid=3897 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.661000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.661000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.661000 audit: BPF prog-id=151 op=LOAD May 17 01:05:55.661000 audit[3897]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc7c6af98 a2=94 a3=2 items=0 ppid=3752 pid=3897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.661000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 01:05:55.662000 audit: BPF prog-id=151 op=UNLOAD May 17 01:05:55.662000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.662000 audit[3897]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffc7c6afc8 a2=28 a3=ffffc7c6b0f8 items=0 ppid=3752 pid=3897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.662000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 01:05:55.662000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.662000 audit[3897]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc7c6aff8 a2=28 a3=ffffc7c6b128 items=0 ppid=3752 pid=3897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.662000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 01:05:55.662000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.662000 audit[3897]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc7c6aea8 a2=28 a3=ffffc7c6afd8 items=0 ppid=3752 pid=3897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.662000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 01:05:55.662000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.662000 audit[3897]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffc7c6b018 a2=28 a3=ffffc7c6b148 items=0 ppid=3752 pid=3897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.662000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 01:05:55.662000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.662000 audit[3897]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffc7c6aff8 a2=28 a3=ffffc7c6b128 items=0 ppid=3752 pid=3897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.662000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 01:05:55.662000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.662000 audit[3897]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffc7c6afe8 a2=28 a3=ffffc7c6b118 items=0 ppid=3752 pid=3897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.662000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 01:05:55.662000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.662000 audit[3897]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffc7c6b018 a2=28 a3=ffffc7c6b148 items=0 ppid=3752 pid=3897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.662000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 01:05:55.662000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.662000 audit[3897]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc7c6aff8 a2=28 a3=ffffc7c6b128 items=0 ppid=3752 pid=3897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.662000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 01:05:55.662000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.662000 audit[3897]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc7c6b018 a2=28 a3=ffffc7c6b148 items=0 ppid=3752 pid=3897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.662000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 01:05:55.662000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.662000 audit[3897]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc7c6afe8 a2=28 a3=ffffc7c6b118 items=0 ppid=3752 pid=3897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.662000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 01:05:55.662000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.662000 audit[3897]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffc7c6b068 a2=28 a3=ffffc7c6b1a8 items=0 ppid=3752 pid=3897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.662000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 01:05:55.662000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.662000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.662000 audit[3897]: AVC avc: denied { perfmon } for pid=3897 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.662000 audit[3897]: AVC avc: denied { perfmon } for pid=3897 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.662000 audit[3897]: AVC avc: denied { perfmon } for pid=3897 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.662000 audit[3897]: AVC avc: denied { perfmon } for pid=3897 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.662000 audit[3897]: AVC avc: denied { perfmon } for pid=3897 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.662000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.662000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.662000 audit: BPF prog-id=152 op=LOAD May 17 01:05:55.662000 audit[3897]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffc7c6ae88 a2=40 a3=ffffc7c6aeb8 items=0 ppid=3752 pid=3897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.662000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 01:05:55.662000 audit: BPF prog-id=152 op=UNLOAD May 17 01:05:55.662000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.662000 audit[3897]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=ffffc7c6aeb0 a2=50 a3=0 items=0 ppid=3752 pid=3897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.662000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 01:05:55.662000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.662000 audit[3897]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=0 a1=ffffc7c6aeb0 a2=50 a3=0 items=0 ppid=3752 pid=3897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.662000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 01:05:55.663000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.663000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.663000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.663000 audit[3897]: AVC avc: denied { perfmon } for pid=3897 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.663000 audit[3897]: AVC avc: denied { perfmon } for pid=3897 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.663000 audit[3897]: AVC avc: denied { perfmon } for pid=3897 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.663000 audit[3897]: AVC avc: denied { perfmon } for pid=3897 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.663000 audit[3897]: AVC avc: denied { perfmon } for pid=3897 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.663000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.663000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.663000 audit: BPF prog-id=153 op=LOAD May 17 01:05:55.663000 audit[3897]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffc7c6a618 a2=94 a3=2 items=0 ppid=3752 pid=3897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.663000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 01:05:55.663000 audit: BPF prog-id=153 op=UNLOAD May 17 01:05:55.663000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.663000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.663000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.663000 audit[3897]: AVC avc: denied { perfmon } for pid=3897 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.663000 audit[3897]: AVC avc: denied { perfmon } for pid=3897 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.663000 audit[3897]: AVC avc: denied { perfmon } for pid=3897 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.663000 audit[3897]: AVC avc: denied { perfmon } for pid=3897 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.663000 audit[3897]: AVC avc: denied { perfmon } for pid=3897 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.663000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.663000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.663000 audit: BPF prog-id=154 op=LOAD May 17 01:05:55.663000 audit[3897]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffc7c6a7a8 a2=94 a3=30 items=0 ppid=3752 pid=3897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.663000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 01:05:55.665000 audit[3899]: AVC avc: denied { bpf } for pid=3899 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.665000 audit[3899]: AVC avc: denied { bpf } for pid=3899 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.665000 audit[3899]: AVC avc: denied { perfmon } for pid=3899 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.665000 audit[3899]: AVC avc: denied { perfmon } for pid=3899 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.665000 audit[3899]: AVC avc: denied { perfmon } for pid=3899 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.665000 audit[3899]: AVC avc: denied { perfmon } for pid=3899 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.665000 audit[3899]: AVC avc: denied { perfmon } for pid=3899 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.665000 audit[3899]: AVC avc: denied { bpf } for pid=3899 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.665000 audit[3899]: AVC avc: denied { bpf } for pid=3899 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.665000 audit: BPF prog-id=155 op=LOAD May 17 01:05:55.665000 audit[3899]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe012f6e8 a2=98 a3=ffffe012f6d8 items=0 ppid=3752 pid=3899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.665000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 01:05:55.665000 audit: BPF prog-id=155 op=UNLOAD May 17 01:05:55.665000 audit[3899]: AVC avc: denied { bpf } for pid=3899 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.665000 audit[3899]: AVC avc: denied { bpf } for pid=3899 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.665000 audit[3899]: AVC avc: denied { perfmon } for pid=3899 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.665000 audit[3899]: AVC avc: denied { perfmon } for pid=3899 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.665000 audit[3899]: AVC avc: denied { perfmon } for pid=3899 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.665000 audit[3899]: AVC avc: denied { perfmon } for pid=3899 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.665000 audit[3899]: AVC avc: denied { perfmon } for pid=3899 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.665000 audit[3899]: AVC avc: denied { bpf } for pid=3899 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.665000 audit[3899]: AVC avc: denied { bpf } for pid=3899 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.665000 audit: BPF prog-id=156 op=LOAD May 17 01:05:55.665000 audit[3899]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffe012f378 a2=74 a3=95 items=0 ppid=3752 pid=3899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.665000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 01:05:55.665000 audit: BPF prog-id=156 op=UNLOAD May 17 01:05:55.665000 audit[3899]: AVC avc: denied { bpf } for pid=3899 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.665000 audit[3899]: AVC avc: denied { bpf } for pid=3899 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.665000 audit[3899]: AVC avc: denied { perfmon } for pid=3899 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.665000 audit[3899]: AVC avc: denied { perfmon } for pid=3899 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.665000 audit[3899]: AVC avc: denied { perfmon } for pid=3899 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.665000 audit[3899]: AVC avc: denied { perfmon } for pid=3899 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.665000 audit[3899]: AVC avc: denied { perfmon } for pid=3899 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.665000 audit[3899]: AVC avc: denied { bpf } for pid=3899 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.665000 audit[3899]: AVC avc: denied { bpf } for pid=3899 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.665000 audit: BPF prog-id=157 op=LOAD May 17 01:05:55.665000 audit[3899]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffe012f3d8 a2=94 a3=2 items=0 ppid=3752 pid=3899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.665000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 01:05:55.665000 audit: BPF prog-id=157 op=UNLOAD May 17 01:05:55.764000 audit[3899]: AVC avc: denied { bpf } for pid=3899 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.764000 audit[3899]: AVC avc: denied { bpf } for pid=3899 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.764000 audit[3899]: AVC avc: denied { perfmon } for pid=3899 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.764000 audit[3899]: AVC avc: denied { perfmon } for pid=3899 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.764000 audit[3899]: AVC avc: denied { perfmon } for pid=3899 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.764000 audit[3899]: AVC avc: denied { perfmon } for pid=3899 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.764000 audit[3899]: AVC avc: denied { perfmon } for pid=3899 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.764000 audit[3899]: AVC avc: denied { bpf } for pid=3899 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.764000 audit[3899]: AVC avc: denied { bpf } for pid=3899 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.764000 audit: BPF prog-id=158 op=LOAD May 17 01:05:55.764000 audit[3899]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffe012f398 a2=40 a3=ffffe012f3c8 items=0 ppid=3752 pid=3899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.764000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 01:05:55.765000 audit: BPF prog-id=158 op=UNLOAD May 17 01:05:55.765000 audit[3899]: AVC avc: denied { perfmon } for pid=3899 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.765000 audit[3899]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffe012f4b0 a2=50 a3=0 items=0 ppid=3752 pid=3899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.765000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 01:05:55.775000 audit[3899]: AVC avc: denied { bpf } for pid=3899 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.775000 audit[3899]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe012f408 a2=28 a3=ffffe012f538 items=0 ppid=3752 pid=3899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.775000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 01:05:55.775000 audit[3899]: AVC avc: denied { bpf } for pid=3899 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.775000 audit[3899]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe012f438 a2=28 a3=ffffe012f568 items=0 ppid=3752 pid=3899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.775000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 01:05:55.775000 audit[3899]: AVC avc: denied { bpf } for pid=3899 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.775000 audit[3899]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe012f2e8 a2=28 a3=ffffe012f418 items=0 ppid=3752 pid=3899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.775000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 01:05:55.775000 audit[3899]: AVC avc: denied { bpf } for pid=3899 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.775000 audit[3899]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe012f458 a2=28 a3=ffffe012f588 items=0 ppid=3752 pid=3899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.775000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 01:05:55.775000 audit[3899]: AVC avc: denied { bpf } for pid=3899 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.775000 audit[3899]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe012f438 a2=28 a3=ffffe012f568 items=0 ppid=3752 pid=3899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.775000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 01:05:55.775000 audit[3899]: AVC avc: denied { bpf } for pid=3899 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.775000 audit[3899]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe012f428 a2=28 a3=ffffe012f558 items=0 ppid=3752 pid=3899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.775000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 01:05:55.775000 audit[3899]: AVC avc: denied { bpf } for pid=3899 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.775000 audit[3899]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe012f458 a2=28 a3=ffffe012f588 items=0 ppid=3752 pid=3899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.775000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 01:05:55.775000 audit[3899]: AVC avc: denied { bpf } for pid=3899 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.775000 audit[3899]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe012f438 a2=28 a3=ffffe012f568 items=0 ppid=3752 pid=3899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.775000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 01:05:55.775000 audit[3899]: AVC avc: denied { bpf } for pid=3899 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.775000 audit[3899]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe012f458 a2=28 a3=ffffe012f588 items=0 ppid=3752 pid=3899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.775000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 01:05:55.775000 audit[3899]: AVC avc: denied { bpf } for pid=3899 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.775000 audit[3899]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe012f428 a2=28 a3=ffffe012f558 items=0 ppid=3752 pid=3899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.775000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 01:05:55.775000 audit[3899]: AVC avc: denied { bpf } for pid=3899 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.775000 audit[3899]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe012f4a8 a2=28 a3=ffffe012f5e8 items=0 ppid=3752 pid=3899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.775000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 01:05:55.775000 audit[3899]: AVC avc: denied { perfmon } for pid=3899 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.775000 audit[3899]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffe012f1e0 a2=50 a3=0 items=0 ppid=3752 pid=3899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.775000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 01:05:55.775000 audit[3899]: AVC avc: denied { bpf } for pid=3899 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.775000 audit[3899]: AVC avc: denied { bpf } for pid=3899 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.775000 audit[3899]: AVC avc: denied { perfmon } for pid=3899 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.775000 audit[3899]: AVC avc: denied { perfmon } for pid=3899 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.775000 audit[3899]: AVC avc: denied { perfmon } for pid=3899 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.775000 audit[3899]: AVC avc: denied { perfmon } for pid=3899 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.775000 audit[3899]: AVC avc: denied { perfmon } for pid=3899 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.775000 audit[3899]: AVC avc: denied { bpf } for pid=3899 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.775000 audit[3899]: AVC avc: denied { bpf } for pid=3899 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.775000 audit: BPF prog-id=159 op=LOAD May 17 01:05:55.775000 audit[3899]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffe012f1e8 a2=94 a3=5 items=0 ppid=3752 pid=3899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.775000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 01:05:55.775000 audit: BPF prog-id=159 op=UNLOAD May 17 01:05:55.775000 audit[3899]: AVC avc: denied { perfmon } for pid=3899 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.775000 audit[3899]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffe012f2f0 a2=50 a3=0 items=0 ppid=3752 pid=3899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.775000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 01:05:55.775000 audit[3899]: AVC avc: denied { bpf } for pid=3899 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.775000 audit[3899]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffe012f438 a2=4 a3=3 items=0 ppid=3752 pid=3899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.775000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 01:05:55.775000 audit[3899]: AVC avc: denied { bpf } for pid=3899 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.775000 audit[3899]: AVC avc: denied { bpf } for pid=3899 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.775000 audit[3899]: AVC avc: denied { perfmon } for pid=3899 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.775000 audit[3899]: AVC avc: denied { bpf } for pid=3899 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.775000 audit[3899]: AVC avc: denied { perfmon } for pid=3899 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.775000 audit[3899]: AVC avc: denied { perfmon } for pid=3899 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.775000 audit[3899]: AVC avc: denied { perfmon } for pid=3899 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.775000 audit[3899]: AVC avc: denied { perfmon } for pid=3899 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.775000 audit[3899]: AVC avc: denied { perfmon } for pid=3899 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.775000 audit[3899]: AVC avc: denied { bpf } for pid=3899 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.775000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:05:55.775000 audit[3899]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffe012f418 a2=94 a3=6 items=0 ppid=3752 pid=3899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.775000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 01:05:55.775000 audit[3899]: AVC avc: denied { bpf } for pid=3899 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.775000 audit[3899]: AVC avc: denied { bpf } for pid=3899 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.775000 audit[3899]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffe012ebe8 a2=94 a3=83 items=0 ppid=3752 pid=3899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.775000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 01:05:55.776000 audit[3899]: AVC avc: denied { bpf } for pid=3899 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.776000 audit[3899]: AVC avc: denied { bpf } for pid=3899 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.776000 audit[3899]: AVC avc: denied { perfmon } for pid=3899 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.776000 audit[3899]: AVC avc: denied { bpf } for pid=3899 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.776000 audit[3899]: AVC avc: denied { perfmon } for pid=3899 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.776000 audit[3899]: AVC avc: denied { perfmon } for pid=3899 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.776000 audit[3899]: AVC avc: denied { perfmon } for pid=3899 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.776000 audit[3899]: AVC avc: denied { perfmon } for pid=3899 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.776000 audit[3899]: AVC avc: denied { perfmon } for pid=3899 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.776000 audit[3899]: AVC avc: denied { bpf } for pid=3899 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.776000 audit[3899]: AVC avc: denied { confidentiality } for pid=3899 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:05:55.776000 audit[3899]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffe012ebe8 a2=94 a3=83 items=0 ppid=3752 pid=3899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.776000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 01:05:55.776000 audit[3899]: AVC avc: denied { bpf } for pid=3899 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.776000 audit[3899]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffe0130628 a2=10 a3=ffffe0130718 items=0 ppid=3752 pid=3899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.776000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 01:05:55.776000 audit[3899]: AVC avc: denied { bpf } for pid=3899 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.776000 audit[3899]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffe01304e8 a2=10 a3=ffffe01305d8 items=0 ppid=3752 pid=3899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.776000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 01:05:55.776000 audit[3899]: AVC avc: denied { bpf } for pid=3899 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.776000 audit[3899]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffe0130458 a2=10 a3=ffffe01305d8 items=0 ppid=3752 pid=3899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.776000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 01:05:55.776000 audit[3899]: AVC avc: denied { bpf } for pid=3899 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:55.776000 audit[3899]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffe0130458 a2=10 a3=ffffe01305d8 items=0 ppid=3752 pid=3899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.776000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 01:05:55.784000 audit: BPF prog-id=154 op=UNLOAD May 17 01:05:55.968000 audit[3928]: NETFILTER_CFG table=mangle:106 family=2 entries=16 op=nft_register_chain pid=3928 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 01:05:55.968000 audit[3928]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=ffffd3cdd200 a2=0 a3=ffffbe036fa8 items=0 ppid=3752 pid=3928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.968000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 01:05:55.992000 audit[3926]: NETFILTER_CFG table=nat:107 family=2 entries=15 op=nft_register_chain pid=3926 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 01:05:55.992000 audit[3926]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=fffffc562640 a2=0 a3=ffffb6c72fa8 items=0 ppid=3752 pid=3926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:55.992000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 01:05:56.075000 audit[3925]: NETFILTER_CFG table=raw:108 family=2 entries=21 op=nft_register_chain pid=3925 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 01:05:56.075000 audit[3925]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8452 a0=3 a1=ffffe060af30 a2=0 a3=ffff88db9fa8 items=0 ppid=3752 pid=3925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:56.075000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 01:05:56.113000 audit[3929]: NETFILTER_CFG table=filter:109 family=2 entries=94 op=nft_register_chain pid=3929 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 01:05:56.113000 audit[3929]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=53116 a0=3 a1=ffffd2d9c730 a2=0 a3=ffff96f59fa8 items=0 ppid=3752 pid=3929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:56.113000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 01:05:56.122276 env[1453]: time="2025-05-17T01:05:56.122237390Z" level=info msg="StopPodSandbox for \"75f90dbe628597416a290bd0d8408ca492593ad2c9bf08de9fd7e56f91bc6e1e\"" May 17 01:05:56.213639 env[1453]: 2025-05-17 01:05:56.172 [INFO][3951] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="75f90dbe628597416a290bd0d8408ca492593ad2c9bf08de9fd7e56f91bc6e1e" May 17 01:05:56.213639 env[1453]: 2025-05-17 01:05:56.172 [INFO][3951] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="75f90dbe628597416a290bd0d8408ca492593ad2c9bf08de9fd7e56f91bc6e1e" iface="eth0" netns="/var/run/netns/cni-db748d9f-9201-5304-2918-d3673dd87928" May 17 01:05:56.213639 env[1453]: 2025-05-17 01:05:56.172 [INFO][3951] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="75f90dbe628597416a290bd0d8408ca492593ad2c9bf08de9fd7e56f91bc6e1e" iface="eth0" netns="/var/run/netns/cni-db748d9f-9201-5304-2918-d3673dd87928" May 17 01:05:56.213639 env[1453]: 2025-05-17 01:05:56.172 [INFO][3951] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="75f90dbe628597416a290bd0d8408ca492593ad2c9bf08de9fd7e56f91bc6e1e" iface="eth0" netns="/var/run/netns/cni-db748d9f-9201-5304-2918-d3673dd87928" May 17 01:05:56.213639 env[1453]: 2025-05-17 01:05:56.172 [INFO][3951] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="75f90dbe628597416a290bd0d8408ca492593ad2c9bf08de9fd7e56f91bc6e1e" May 17 01:05:56.213639 env[1453]: 2025-05-17 01:05:56.173 [INFO][3951] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="75f90dbe628597416a290bd0d8408ca492593ad2c9bf08de9fd7e56f91bc6e1e" May 17 01:05:56.213639 env[1453]: 2025-05-17 01:05:56.200 [INFO][3959] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="75f90dbe628597416a290bd0d8408ca492593ad2c9bf08de9fd7e56f91bc6e1e" HandleID="k8s-pod-network.75f90dbe628597416a290bd0d8408ca492593ad2c9bf08de9fd7e56f91bc6e1e" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-coredns--668d6bf9bc--rpdwj-eth0" May 17 01:05:56.213639 env[1453]: 2025-05-17 01:05:56.201 [INFO][3959] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 01:05:56.213639 env[1453]: 2025-05-17 01:05:56.201 [INFO][3959] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 01:05:56.213639 env[1453]: 2025-05-17 01:05:56.209 [WARNING][3959] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="75f90dbe628597416a290bd0d8408ca492593ad2c9bf08de9fd7e56f91bc6e1e" HandleID="k8s-pod-network.75f90dbe628597416a290bd0d8408ca492593ad2c9bf08de9fd7e56f91bc6e1e" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-coredns--668d6bf9bc--rpdwj-eth0" May 17 01:05:56.213639 env[1453]: 2025-05-17 01:05:56.209 [INFO][3959] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="75f90dbe628597416a290bd0d8408ca492593ad2c9bf08de9fd7e56f91bc6e1e" HandleID="k8s-pod-network.75f90dbe628597416a290bd0d8408ca492593ad2c9bf08de9fd7e56f91bc6e1e" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-coredns--668d6bf9bc--rpdwj-eth0" May 17 01:05:56.213639 env[1453]: 2025-05-17 01:05:56.210 [INFO][3959] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 01:05:56.213639 env[1453]: 2025-05-17 01:05:56.212 [INFO][3951] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="75f90dbe628597416a290bd0d8408ca492593ad2c9bf08de9fd7e56f91bc6e1e" May 17 01:05:56.217618 env[1453]: time="2025-05-17T01:05:56.216212625Z" level=info msg="TearDown network for sandbox \"75f90dbe628597416a290bd0d8408ca492593ad2c9bf08de9fd7e56f91bc6e1e\" successfully" May 17 01:05:56.217618 env[1453]: time="2025-05-17T01:05:56.216251105Z" level=info msg="StopPodSandbox for \"75f90dbe628597416a290bd0d8408ca492593ad2c9bf08de9fd7e56f91bc6e1e\" returns successfully" May 17 01:05:56.215988 systemd[1]: run-netns-cni\x2ddb748d9f\x2d9201\x2d5304\x2d2918\x2dd3673dd87928.mount: Deactivated successfully. May 17 01:05:56.218748 env[1453]: time="2025-05-17T01:05:56.218712855Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-rpdwj,Uid:9893c048-8d02-43b3-a0c7-1daf374b6950,Namespace:kube-system,Attempt:1,}" May 17 01:05:56.334707 kubelet[2439]: E0517 01:05:56.334569 2439 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-7dd859898d-fckds" podUID="e6dfc9d9-b9da-4002-976e-1b3ffcb7dc07" May 17 01:05:56.393101 systemd-networkd[1616]: cali48da8e75ea3: Gained IPv6LL May 17 01:05:56.439803 systemd-networkd[1616]: cali7ac9755a16c: Link UP May 17 01:05:56.451551 systemd-networkd[1616]: cali7ac9755a16c: Gained carrier May 17 01:05:56.452603 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali7ac9755a16c: link becomes ready May 17 01:05:56.486671 env[1453]: 2025-05-17 01:05:56.302 [INFO][3966] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--56b9a5cda4-k8s-coredns--668d6bf9bc--rpdwj-eth0 coredns-668d6bf9bc- kube-system 9893c048-8d02-43b3-a0c7-1daf374b6950 952 0 2025-05-17 01:05:09 +0000 UTC map[k8s-app:kube-dns pod-template-hash:668d6bf9bc projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.7-n-56b9a5cda4 coredns-668d6bf9bc-rpdwj eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali7ac9755a16c [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] [] }} ContainerID="58dbe1f122d46fd44c2375ffd36ef9ccbf80c0b4d1fcd024d2ed81329822361f" Namespace="kube-system" Pod="coredns-668d6bf9bc-rpdwj" WorkloadEndpoint="ci--3510.3.7--n--56b9a5cda4-k8s-coredns--668d6bf9bc--rpdwj-" May 17 01:05:56.486671 env[1453]: 2025-05-17 01:05:56.302 [INFO][3966] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="58dbe1f122d46fd44c2375ffd36ef9ccbf80c0b4d1fcd024d2ed81329822361f" Namespace="kube-system" Pod="coredns-668d6bf9bc-rpdwj" WorkloadEndpoint="ci--3510.3.7--n--56b9a5cda4-k8s-coredns--668d6bf9bc--rpdwj-eth0" May 17 01:05:56.486671 env[1453]: 2025-05-17 01:05:56.329 [INFO][3978] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="58dbe1f122d46fd44c2375ffd36ef9ccbf80c0b4d1fcd024d2ed81329822361f" HandleID="k8s-pod-network.58dbe1f122d46fd44c2375ffd36ef9ccbf80c0b4d1fcd024d2ed81329822361f" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-coredns--668d6bf9bc--rpdwj-eth0" May 17 01:05:56.486671 env[1453]: 2025-05-17 01:05:56.329 [INFO][3978] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="58dbe1f122d46fd44c2375ffd36ef9ccbf80c0b4d1fcd024d2ed81329822361f" HandleID="k8s-pod-network.58dbe1f122d46fd44c2375ffd36ef9ccbf80c0b4d1fcd024d2ed81329822361f" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-coredns--668d6bf9bc--rpdwj-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002d7660), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.7-n-56b9a5cda4", "pod":"coredns-668d6bf9bc-rpdwj", "timestamp":"2025-05-17 01:05:56.329177285 +0000 UTC"}, Hostname:"ci-3510.3.7-n-56b9a5cda4", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 01:05:56.486671 env[1453]: 2025-05-17 01:05:56.329 [INFO][3978] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 01:05:56.486671 env[1453]: 2025-05-17 01:05:56.329 [INFO][3978] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 01:05:56.486671 env[1453]: 2025-05-17 01:05:56.329 [INFO][3978] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-56b9a5cda4' May 17 01:05:56.486671 env[1453]: 2025-05-17 01:05:56.345 [INFO][3978] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.58dbe1f122d46fd44c2375ffd36ef9ccbf80c0b4d1fcd024d2ed81329822361f" host="ci-3510.3.7-n-56b9a5cda4" May 17 01:05:56.486671 env[1453]: 2025-05-17 01:05:56.365 [INFO][3978] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.7-n-56b9a5cda4" May 17 01:05:56.486671 env[1453]: 2025-05-17 01:05:56.393 [INFO][3978] ipam/ipam.go 511: Trying affinity for 192.168.67.128/26 host="ci-3510.3.7-n-56b9a5cda4" May 17 01:05:56.486671 env[1453]: 2025-05-17 01:05:56.396 [INFO][3978] ipam/ipam.go 158: Attempting to load block cidr=192.168.67.128/26 host="ci-3510.3.7-n-56b9a5cda4" May 17 01:05:56.486671 env[1453]: 2025-05-17 01:05:56.406 [INFO][3978] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.67.128/26 host="ci-3510.3.7-n-56b9a5cda4" May 17 01:05:56.486671 env[1453]: 2025-05-17 01:05:56.406 [INFO][3978] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.67.128/26 handle="k8s-pod-network.58dbe1f122d46fd44c2375ffd36ef9ccbf80c0b4d1fcd024d2ed81329822361f" host="ci-3510.3.7-n-56b9a5cda4" May 17 01:05:56.486671 env[1453]: 2025-05-17 01:05:56.408 [INFO][3978] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.58dbe1f122d46fd44c2375ffd36ef9ccbf80c0b4d1fcd024d2ed81329822361f May 17 01:05:56.486671 env[1453]: 2025-05-17 01:05:56.419 [INFO][3978] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.67.128/26 handle="k8s-pod-network.58dbe1f122d46fd44c2375ffd36ef9ccbf80c0b4d1fcd024d2ed81329822361f" host="ci-3510.3.7-n-56b9a5cda4" May 17 01:05:56.486671 env[1453]: 2025-05-17 01:05:56.430 [INFO][3978] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.67.130/26] block=192.168.67.128/26 handle="k8s-pod-network.58dbe1f122d46fd44c2375ffd36ef9ccbf80c0b4d1fcd024d2ed81329822361f" host="ci-3510.3.7-n-56b9a5cda4" May 17 01:05:56.486671 env[1453]: 2025-05-17 01:05:56.430 [INFO][3978] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.67.130/26] handle="k8s-pod-network.58dbe1f122d46fd44c2375ffd36ef9ccbf80c0b4d1fcd024d2ed81329822361f" host="ci-3510.3.7-n-56b9a5cda4" May 17 01:05:56.486671 env[1453]: 2025-05-17 01:05:56.430 [INFO][3978] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 01:05:56.486671 env[1453]: 2025-05-17 01:05:56.431 [INFO][3978] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.67.130/26] IPv6=[] ContainerID="58dbe1f122d46fd44c2375ffd36ef9ccbf80c0b4d1fcd024d2ed81329822361f" HandleID="k8s-pod-network.58dbe1f122d46fd44c2375ffd36ef9ccbf80c0b4d1fcd024d2ed81329822361f" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-coredns--668d6bf9bc--rpdwj-eth0" May 17 01:05:56.487313 env[1453]: 2025-05-17 01:05:56.432 [INFO][3966] cni-plugin/k8s.go 418: Populated endpoint ContainerID="58dbe1f122d46fd44c2375ffd36ef9ccbf80c0b4d1fcd024d2ed81329822361f" Namespace="kube-system" Pod="coredns-668d6bf9bc-rpdwj" WorkloadEndpoint="ci--3510.3.7--n--56b9a5cda4-k8s-coredns--668d6bf9bc--rpdwj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--56b9a5cda4-k8s-coredns--668d6bf9bc--rpdwj-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"9893c048-8d02-43b3-a0c7-1daf374b6950", ResourceVersion:"952", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 1, 5, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-56b9a5cda4", ContainerID:"", Pod:"coredns-668d6bf9bc-rpdwj", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.67.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali7ac9755a16c", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 01:05:56.487313 env[1453]: 2025-05-17 01:05:56.433 [INFO][3966] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.67.130/32] ContainerID="58dbe1f122d46fd44c2375ffd36ef9ccbf80c0b4d1fcd024d2ed81329822361f" Namespace="kube-system" Pod="coredns-668d6bf9bc-rpdwj" WorkloadEndpoint="ci--3510.3.7--n--56b9a5cda4-k8s-coredns--668d6bf9bc--rpdwj-eth0" May 17 01:05:56.487313 env[1453]: 2025-05-17 01:05:56.433 [INFO][3966] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali7ac9755a16c ContainerID="58dbe1f122d46fd44c2375ffd36ef9ccbf80c0b4d1fcd024d2ed81329822361f" Namespace="kube-system" Pod="coredns-668d6bf9bc-rpdwj" WorkloadEndpoint="ci--3510.3.7--n--56b9a5cda4-k8s-coredns--668d6bf9bc--rpdwj-eth0" May 17 01:05:56.487313 env[1453]: 2025-05-17 01:05:56.451 [INFO][3966] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="58dbe1f122d46fd44c2375ffd36ef9ccbf80c0b4d1fcd024d2ed81329822361f" Namespace="kube-system" Pod="coredns-668d6bf9bc-rpdwj" WorkloadEndpoint="ci--3510.3.7--n--56b9a5cda4-k8s-coredns--668d6bf9bc--rpdwj-eth0" May 17 01:05:56.487313 env[1453]: 2025-05-17 01:05:56.453 [INFO][3966] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="58dbe1f122d46fd44c2375ffd36ef9ccbf80c0b4d1fcd024d2ed81329822361f" Namespace="kube-system" Pod="coredns-668d6bf9bc-rpdwj" WorkloadEndpoint="ci--3510.3.7--n--56b9a5cda4-k8s-coredns--668d6bf9bc--rpdwj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--56b9a5cda4-k8s-coredns--668d6bf9bc--rpdwj-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"9893c048-8d02-43b3-a0c7-1daf374b6950", ResourceVersion:"952", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 1, 5, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-56b9a5cda4", ContainerID:"58dbe1f122d46fd44c2375ffd36ef9ccbf80c0b4d1fcd024d2ed81329822361f", Pod:"coredns-668d6bf9bc-rpdwj", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.67.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali7ac9755a16c", MAC:"06:8c:d8:67:03:ed", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 01:05:56.487313 env[1453]: 2025-05-17 01:05:56.483 [INFO][3966] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="58dbe1f122d46fd44c2375ffd36ef9ccbf80c0b4d1fcd024d2ed81329822361f" Namespace="kube-system" Pod="coredns-668d6bf9bc-rpdwj" WorkloadEndpoint="ci--3510.3.7--n--56b9a5cda4-k8s-coredns--668d6bf9bc--rpdwj-eth0" May 17 01:05:56.515871 env[1453]: time="2025-05-17T01:05:56.515670216Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 01:05:56.515871 env[1453]: time="2025-05-17T01:05:56.515715177Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 01:05:56.515871 env[1453]: time="2025-05-17T01:05:56.515725657Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 01:05:56.516243 env[1453]: time="2025-05-17T01:05:56.516153222Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/58dbe1f122d46fd44c2375ffd36ef9ccbf80c0b4d1fcd024d2ed81329822361f pid=4000 runtime=io.containerd.runc.v2 May 17 01:05:56.531000 audit[4012]: NETFILTER_CFG table=filter:110 family=2 entries=20 op=nft_register_rule pid=4012 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:05:56.531000 audit[4012]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=7480 a0=3 a1=fffff03eccc0 a2=0 a3=1 items=0 ppid=2540 pid=4012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:56.531000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:05:56.537000 audit[4012]: NETFILTER_CFG table=nat:111 family=2 entries=14 op=nft_register_rule pid=4012 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:05:56.537000 audit[4012]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3468 a0=3 a1=fffff03eccc0 a2=0 a3=1 items=0 ppid=2540 pid=4012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:56.537000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:05:56.543830 systemd[1]: Started cri-containerd-58dbe1f122d46fd44c2375ffd36ef9ccbf80c0b4d1fcd024d2ed81329822361f.scope. May 17 01:05:56.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:56.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:56.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:56.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:56.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:56.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:56.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:56.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:56.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:56.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:56.563000 audit: BPF prog-id=160 op=LOAD May 17 01:05:56.564000 audit[4011]: AVC avc: denied { bpf } for pid=4011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:56.564000 audit[4011]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4000 pid=4011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:56.564000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538646265316631323264343666643434633233373566666433366566 May 17 01:05:56.564000 audit[4011]: AVC avc: denied { perfmon } for pid=4011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:56.564000 audit[4011]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4000 pid=4011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:56.564000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538646265316631323264343666643434633233373566666433366566 May 17 01:05:56.564000 audit[4011]: AVC avc: denied { bpf } for pid=4011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:56.564000 audit[4011]: AVC avc: denied { bpf } for pid=4011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:56.564000 audit[4011]: AVC avc: denied { bpf } for pid=4011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:56.564000 audit[4011]: AVC avc: denied { perfmon } for pid=4011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:56.564000 audit[4011]: AVC avc: denied { perfmon } for pid=4011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:56.564000 audit[4011]: AVC avc: denied { perfmon } for pid=4011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:56.564000 audit[4011]: AVC avc: denied { perfmon } for pid=4011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:56.564000 audit[4011]: AVC avc: denied { perfmon } for pid=4011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:56.564000 audit[4011]: AVC avc: denied { bpf } for pid=4011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:56.564000 audit[4011]: AVC avc: denied { bpf } for pid=4011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:56.564000 audit: BPF prog-id=161 op=LOAD May 17 01:05:56.564000 audit[4011]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4000 pid=4011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:56.564000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538646265316631323264343666643434633233373566666433366566 May 17 01:05:56.565000 audit[4011]: AVC avc: denied { bpf } for pid=4011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:56.565000 audit[4011]: AVC avc: denied { bpf } for pid=4011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:56.565000 audit[4011]: AVC avc: denied { perfmon } for pid=4011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:56.565000 audit[4011]: AVC avc: denied { perfmon } for pid=4011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:56.565000 audit[4011]: AVC avc: denied { perfmon } for pid=4011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:56.565000 audit[4011]: AVC avc: denied { perfmon } for pid=4011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:56.565000 audit[4011]: AVC avc: denied { perfmon } for pid=4011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:56.565000 audit[4011]: AVC avc: denied { bpf } for pid=4011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:56.565000 audit[4011]: AVC avc: denied { bpf } for pid=4011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:56.565000 audit: BPF prog-id=162 op=LOAD May 17 01:05:56.565000 audit[4011]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4000 pid=4011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:56.565000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538646265316631323264343666643434633233373566666433366566 May 17 01:05:56.565000 audit: BPF prog-id=162 op=UNLOAD May 17 01:05:56.565000 audit: BPF prog-id=161 op=UNLOAD May 17 01:05:56.565000 audit[4011]: AVC avc: denied { bpf } for pid=4011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:56.565000 audit[4011]: AVC avc: denied { bpf } for pid=4011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:56.565000 audit[4011]: AVC avc: denied { bpf } for pid=4011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:56.565000 audit[4011]: AVC avc: denied { perfmon } for pid=4011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:56.565000 audit[4011]: AVC avc: denied { perfmon } for pid=4011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:56.565000 audit[4011]: AVC avc: denied { perfmon } for pid=4011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:56.565000 audit[4011]: AVC avc: denied { perfmon } for pid=4011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:56.565000 audit[4011]: AVC avc: denied { perfmon } for pid=4011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:56.565000 audit[4011]: AVC avc: denied { bpf } for pid=4011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:56.565000 audit[4011]: AVC avc: denied { bpf } for pid=4011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:56.565000 audit: BPF prog-id=163 op=LOAD May 17 01:05:56.565000 audit[4011]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4000 pid=4011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:56.565000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538646265316631323264343666643434633233373566666433366566 May 17 01:05:56.594000 audit[4030]: NETFILTER_CFG table=filter:112 family=2 entries=42 op=nft_register_chain pid=4030 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 01:05:56.594000 audit[4030]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=22552 a0=3 a1=ffffc0fa0da0 a2=0 a3=ffffba000fa8 items=0 ppid=3752 pid=4030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:56.594000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 01:05:56.599893 env[1453]: time="2025-05-17T01:05:56.599854655Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-rpdwj,Uid:9893c048-8d02-43b3-a0c7-1daf374b6950,Namespace:kube-system,Attempt:1,} returns sandbox id \"58dbe1f122d46fd44c2375ffd36ef9ccbf80c0b4d1fcd024d2ed81329822361f\"" May 17 01:05:56.606425 env[1453]: time="2025-05-17T01:05:56.606376372Z" level=info msg="CreateContainer within sandbox \"58dbe1f122d46fd44c2375ffd36ef9ccbf80c0b4d1fcd024d2ed81329822361f\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 17 01:05:56.658305 env[1453]: time="2025-05-17T01:05:56.658234907Z" level=info msg="CreateContainer within sandbox \"58dbe1f122d46fd44c2375ffd36ef9ccbf80c0b4d1fcd024d2ed81329822361f\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"a3d8b0b6c00691fe60478640565210b551117c8c5a7df5fbd1b848bf13beab56\"" May 17 01:05:56.659066 env[1453]: time="2025-05-17T01:05:56.659021517Z" level=info msg="StartContainer for \"a3d8b0b6c00691fe60478640565210b551117c8c5a7df5fbd1b848bf13beab56\"" May 17 01:05:56.681312 systemd[1]: Started cri-containerd-a3d8b0b6c00691fe60478640565210b551117c8c5a7df5fbd1b848bf13beab56.scope. May 17 01:05:56.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:56.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:56.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:56.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:56.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:56.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:56.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:56.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:56.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:56.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:56.698000 audit: BPF prog-id=164 op=LOAD May 17 01:05:56.699000 audit[4045]: AVC avc: denied { bpf } for pid=4045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:56.699000 audit[4045]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=4000 pid=4045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:56.699000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133643862306236633030363931666536303437383634303536353231 May 17 01:05:56.699000 audit[4045]: AVC avc: denied { perfmon } for pid=4045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:56.699000 audit[4045]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=4000 pid=4045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:56.699000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133643862306236633030363931666536303437383634303536353231 May 17 01:05:56.699000 audit[4045]: AVC avc: denied { bpf } for pid=4045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:56.699000 audit[4045]: AVC avc: denied { bpf } for pid=4045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:56.699000 audit[4045]: AVC avc: denied { bpf } for pid=4045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:56.699000 audit[4045]: AVC avc: denied { perfmon } for pid=4045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:56.699000 audit[4045]: AVC avc: denied { perfmon } for pid=4045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:56.699000 audit[4045]: AVC avc: denied { perfmon } for pid=4045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:56.699000 audit[4045]: AVC avc: denied { perfmon } for pid=4045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:56.699000 audit[4045]: AVC avc: denied { perfmon } for pid=4045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:56.699000 audit[4045]: AVC avc: denied { bpf } for pid=4045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:56.699000 audit[4045]: AVC avc: denied { bpf } for pid=4045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:56.699000 audit: BPF prog-id=165 op=LOAD May 17 01:05:56.699000 audit[4045]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=4000 pid=4045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:56.699000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133643862306236633030363931666536303437383634303536353231 May 17 01:05:56.700000 audit[4045]: AVC avc: denied { bpf } for pid=4045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:56.700000 audit[4045]: AVC avc: denied { bpf } for pid=4045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:56.700000 audit[4045]: AVC avc: denied { perfmon } for pid=4045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:56.700000 audit[4045]: AVC avc: denied { perfmon } for pid=4045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:56.700000 audit[4045]: AVC avc: denied { perfmon } for pid=4045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:56.700000 audit[4045]: AVC avc: denied { perfmon } for pid=4045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:56.700000 audit[4045]: AVC avc: denied { perfmon } for pid=4045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:56.700000 audit[4045]: AVC avc: denied { bpf } for pid=4045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:56.700000 audit[4045]: AVC avc: denied { bpf } for pid=4045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:56.700000 audit: BPF prog-id=166 op=LOAD May 17 01:05:56.700000 audit[4045]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=4000 pid=4045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:56.700000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133643862306236633030363931666536303437383634303536353231 May 17 01:05:56.701000 audit: BPF prog-id=166 op=UNLOAD May 17 01:05:56.701000 audit: BPF prog-id=165 op=UNLOAD May 17 01:05:56.701000 audit[4045]: AVC avc: denied { bpf } for pid=4045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:56.701000 audit[4045]: AVC avc: denied { bpf } for pid=4045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:56.701000 audit[4045]: AVC avc: denied { bpf } for pid=4045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:56.701000 audit[4045]: AVC avc: denied { perfmon } for pid=4045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:56.701000 audit[4045]: AVC avc: denied { perfmon } for pid=4045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:56.701000 audit[4045]: AVC avc: denied { perfmon } for pid=4045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:56.701000 audit[4045]: AVC avc: denied { perfmon } for pid=4045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:56.701000 audit[4045]: AVC avc: denied { perfmon } for pid=4045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:56.701000 audit[4045]: AVC avc: denied { bpf } for pid=4045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:56.701000 audit[4045]: AVC avc: denied { bpf } for pid=4045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:56.701000 audit: BPF prog-id=167 op=LOAD May 17 01:05:56.701000 audit[4045]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=4000 pid=4045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:56.701000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133643862306236633030363931666536303437383634303536353231 May 17 01:05:56.722428 env[1453]: time="2025-05-17T01:05:56.722368428Z" level=info msg="StartContainer for \"a3d8b0b6c00691fe60478640565210b551117c8c5a7df5fbd1b848bf13beab56\" returns successfully" May 17 01:05:56.728000 audit[4056]: AVC avc: denied { getattr } for pid=4056 comm="coredns" path="cgroup:[4026532649]" dev="nsfs" ino=4026532649 scontext=system_u:system_r:svirt_lxc_net_t:s0:c298,c722 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 May 17 01:05:56.728000 audit[4056]: SYSCALL arch=c00000b7 syscall=79 success=no exit=-13 a0=ffffffffffffff9c a1=4000056450 a2=400014e578 a3=0 items=0 ppid=4000 pid=4056 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c298,c722 key=(null) May 17 01:05:56.728000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 May 17 01:05:57.122875 env[1453]: time="2025-05-17T01:05:57.122257992Z" level=info msg="StopPodSandbox for \"9072d164c4b0ab1b8fcbbc155386f04e51ae75d013e86d406f43955febebbded\"" May 17 01:05:57.123530 env[1453]: time="2025-05-17T01:05:57.123493966Z" level=info msg="StopPodSandbox for \"eaf4d6f751910ded5debcb0a407fe1647f085c1e88db7649e0bcc6fa4fbff0e0\"" May 17 01:05:57.123999 env[1453]: time="2025-05-17T01:05:57.123973732Z" level=info msg="StopPodSandbox for \"610ba958463e0f9928b1a82a171a984c1ffe4522de3a9a7fa4a1256836f526e4\"" May 17 01:05:57.124413 env[1453]: time="2025-05-17T01:05:57.124382736Z" level=info msg="StopPodSandbox for \"ddb911fedf4c2ccf6ed8ac040a53a0054cd4be370b4614c6e3133824cbadd2ab\"" May 17 01:05:57.333649 env[1453]: 2025-05-17 01:05:57.246 [INFO][4102] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="9072d164c4b0ab1b8fcbbc155386f04e51ae75d013e86d406f43955febebbded" May 17 01:05:57.333649 env[1453]: 2025-05-17 01:05:57.246 [INFO][4102] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="9072d164c4b0ab1b8fcbbc155386f04e51ae75d013e86d406f43955febebbded" iface="eth0" netns="/var/run/netns/cni-b401ca26-98da-2864-d3aa-a17520707f0c" May 17 01:05:57.333649 env[1453]: 2025-05-17 01:05:57.246 [INFO][4102] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="9072d164c4b0ab1b8fcbbc155386f04e51ae75d013e86d406f43955febebbded" iface="eth0" netns="/var/run/netns/cni-b401ca26-98da-2864-d3aa-a17520707f0c" May 17 01:05:57.333649 env[1453]: 2025-05-17 01:05:57.246 [INFO][4102] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="9072d164c4b0ab1b8fcbbc155386f04e51ae75d013e86d406f43955febebbded" iface="eth0" netns="/var/run/netns/cni-b401ca26-98da-2864-d3aa-a17520707f0c" May 17 01:05:57.333649 env[1453]: 2025-05-17 01:05:57.246 [INFO][4102] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="9072d164c4b0ab1b8fcbbc155386f04e51ae75d013e86d406f43955febebbded" May 17 01:05:57.333649 env[1453]: 2025-05-17 01:05:57.246 [INFO][4102] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9072d164c4b0ab1b8fcbbc155386f04e51ae75d013e86d406f43955febebbded" May 17 01:05:57.333649 env[1453]: 2025-05-17 01:05:57.309 [INFO][4136] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9072d164c4b0ab1b8fcbbc155386f04e51ae75d013e86d406f43955febebbded" HandleID="k8s-pod-network.9072d164c4b0ab1b8fcbbc155386f04e51ae75d013e86d406f43955febebbded" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-calico--kube--controllers--f6596879f--8tb74-eth0" May 17 01:05:57.333649 env[1453]: 2025-05-17 01:05:57.310 [INFO][4136] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 01:05:57.333649 env[1453]: 2025-05-17 01:05:57.310 [INFO][4136] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 01:05:57.333649 env[1453]: 2025-05-17 01:05:57.322 [WARNING][4136] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9072d164c4b0ab1b8fcbbc155386f04e51ae75d013e86d406f43955febebbded" HandleID="k8s-pod-network.9072d164c4b0ab1b8fcbbc155386f04e51ae75d013e86d406f43955febebbded" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-calico--kube--controllers--f6596879f--8tb74-eth0" May 17 01:05:57.333649 env[1453]: 2025-05-17 01:05:57.323 [INFO][4136] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9072d164c4b0ab1b8fcbbc155386f04e51ae75d013e86d406f43955febebbded" HandleID="k8s-pod-network.9072d164c4b0ab1b8fcbbc155386f04e51ae75d013e86d406f43955febebbded" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-calico--kube--controllers--f6596879f--8tb74-eth0" May 17 01:05:57.333649 env[1453]: 2025-05-17 01:05:57.328 [INFO][4136] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 01:05:57.333649 env[1453]: 2025-05-17 01:05:57.331 [INFO][4102] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="9072d164c4b0ab1b8fcbbc155386f04e51ae75d013e86d406f43955febebbded" May 17 01:05:57.334766 env[1453]: time="2025-05-17T01:05:57.334725318Z" level=info msg="TearDown network for sandbox \"9072d164c4b0ab1b8fcbbc155386f04e51ae75d013e86d406f43955febebbded\" successfully" May 17 01:05:57.334920 env[1453]: time="2025-05-17T01:05:57.334902241Z" level=info msg="StopPodSandbox for \"9072d164c4b0ab1b8fcbbc155386f04e51ae75d013e86d406f43955febebbded\" returns successfully" May 17 01:05:57.336019 env[1453]: time="2025-05-17T01:05:57.335982293Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-f6596879f-8tb74,Uid:cbd568ae-4e42-43d9-8aad-56b7909a49ad,Namespace:calico-system,Attempt:1,}" May 17 01:05:57.375900 kubelet[2439]: I0517 01:05:57.375777 2439 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-668d6bf9bc-rpdwj" podStartSLOduration=48.375750999 podStartE2EDuration="48.375750999s" podCreationTimestamp="2025-05-17 01:05:09 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 01:05:57.375153992 +0000 UTC m=+54.375611420" watchObservedRunningTime="2025-05-17 01:05:57.375750999 +0000 UTC m=+54.376208427" May 17 01:05:57.395959 env[1453]: 2025-05-17 01:05:57.280 [INFO][4118] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="610ba958463e0f9928b1a82a171a984c1ffe4522de3a9a7fa4a1256836f526e4" May 17 01:05:57.395959 env[1453]: 2025-05-17 01:05:57.280 [INFO][4118] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="610ba958463e0f9928b1a82a171a984c1ffe4522de3a9a7fa4a1256836f526e4" iface="eth0" netns="/var/run/netns/cni-e142f51d-6a1e-89c3-00c4-5084315ac246" May 17 01:05:57.395959 env[1453]: 2025-05-17 01:05:57.280 [INFO][4118] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="610ba958463e0f9928b1a82a171a984c1ffe4522de3a9a7fa4a1256836f526e4" iface="eth0" netns="/var/run/netns/cni-e142f51d-6a1e-89c3-00c4-5084315ac246" May 17 01:05:57.395959 env[1453]: 2025-05-17 01:05:57.282 [INFO][4118] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="610ba958463e0f9928b1a82a171a984c1ffe4522de3a9a7fa4a1256836f526e4" iface="eth0" netns="/var/run/netns/cni-e142f51d-6a1e-89c3-00c4-5084315ac246" May 17 01:05:57.395959 env[1453]: 2025-05-17 01:05:57.282 [INFO][4118] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="610ba958463e0f9928b1a82a171a984c1ffe4522de3a9a7fa4a1256836f526e4" May 17 01:05:57.395959 env[1453]: 2025-05-17 01:05:57.282 [INFO][4118] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="610ba958463e0f9928b1a82a171a984c1ffe4522de3a9a7fa4a1256836f526e4" May 17 01:05:57.395959 env[1453]: 2025-05-17 01:05:57.353 [INFO][4144] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="610ba958463e0f9928b1a82a171a984c1ffe4522de3a9a7fa4a1256836f526e4" HandleID="k8s-pod-network.610ba958463e0f9928b1a82a171a984c1ffe4522de3a9a7fa4a1256836f526e4" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-calico--apiserver--7bb465f89b--fvt58-eth0" May 17 01:05:57.395959 env[1453]: 2025-05-17 01:05:57.354 [INFO][4144] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 01:05:57.395959 env[1453]: 2025-05-17 01:05:57.354 [INFO][4144] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 01:05:57.395959 env[1453]: 2025-05-17 01:05:57.377 [WARNING][4144] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="610ba958463e0f9928b1a82a171a984c1ffe4522de3a9a7fa4a1256836f526e4" HandleID="k8s-pod-network.610ba958463e0f9928b1a82a171a984c1ffe4522de3a9a7fa4a1256836f526e4" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-calico--apiserver--7bb465f89b--fvt58-eth0" May 17 01:05:57.395959 env[1453]: 2025-05-17 01:05:57.377 [INFO][4144] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="610ba958463e0f9928b1a82a171a984c1ffe4522de3a9a7fa4a1256836f526e4" HandleID="k8s-pod-network.610ba958463e0f9928b1a82a171a984c1ffe4522de3a9a7fa4a1256836f526e4" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-calico--apiserver--7bb465f89b--fvt58-eth0" May 17 01:05:57.395959 env[1453]: 2025-05-17 01:05:57.383 [INFO][4144] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 01:05:57.395959 env[1453]: 2025-05-17 01:05:57.392 [INFO][4118] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="610ba958463e0f9928b1a82a171a984c1ffe4522de3a9a7fa4a1256836f526e4" May 17 01:05:57.396617 env[1453]: time="2025-05-17T01:05:57.396576042Z" level=info msg="TearDown network for sandbox \"610ba958463e0f9928b1a82a171a984c1ffe4522de3a9a7fa4a1256836f526e4\" successfully" May 17 01:05:57.396703 env[1453]: time="2025-05-17T01:05:57.396687804Z" level=info msg="StopPodSandbox for \"610ba958463e0f9928b1a82a171a984c1ffe4522de3a9a7fa4a1256836f526e4\" returns successfully" May 17 01:05:57.399002 env[1453]: time="2025-05-17T01:05:57.398959390Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7bb465f89b-fvt58,Uid:76c2d8d7-3942-4d0e-bf68-64e138374d48,Namespace:calico-apiserver,Attempt:1,}" May 17 01:05:57.426640 env[1453]: 2025-05-17 01:05:57.302 [INFO][4116] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="eaf4d6f751910ded5debcb0a407fe1647f085c1e88db7649e0bcc6fa4fbff0e0" May 17 01:05:57.426640 env[1453]: 2025-05-17 01:05:57.303 [INFO][4116] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="eaf4d6f751910ded5debcb0a407fe1647f085c1e88db7649e0bcc6fa4fbff0e0" iface="eth0" netns="/var/run/netns/cni-ae4bfc4a-99b6-4222-a93b-8b4eb02d6554" May 17 01:05:57.426640 env[1453]: 2025-05-17 01:05:57.303 [INFO][4116] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="eaf4d6f751910ded5debcb0a407fe1647f085c1e88db7649e0bcc6fa4fbff0e0" iface="eth0" netns="/var/run/netns/cni-ae4bfc4a-99b6-4222-a93b-8b4eb02d6554" May 17 01:05:57.426640 env[1453]: 2025-05-17 01:05:57.303 [INFO][4116] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="eaf4d6f751910ded5debcb0a407fe1647f085c1e88db7649e0bcc6fa4fbff0e0" iface="eth0" netns="/var/run/netns/cni-ae4bfc4a-99b6-4222-a93b-8b4eb02d6554" May 17 01:05:57.426640 env[1453]: 2025-05-17 01:05:57.303 [INFO][4116] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="eaf4d6f751910ded5debcb0a407fe1647f085c1e88db7649e0bcc6fa4fbff0e0" May 17 01:05:57.426640 env[1453]: 2025-05-17 01:05:57.303 [INFO][4116] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="eaf4d6f751910ded5debcb0a407fe1647f085c1e88db7649e0bcc6fa4fbff0e0" May 17 01:05:57.426640 env[1453]: 2025-05-17 01:05:57.362 [INFO][4150] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="eaf4d6f751910ded5debcb0a407fe1647f085c1e88db7649e0bcc6fa4fbff0e0" HandleID="k8s-pod-network.eaf4d6f751910ded5debcb0a407fe1647f085c1e88db7649e0bcc6fa4fbff0e0" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-calico--apiserver--7bb465f89b--nhrhw-eth0" May 17 01:05:57.426640 env[1453]: 2025-05-17 01:05:57.363 [INFO][4150] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 01:05:57.426640 env[1453]: 2025-05-17 01:05:57.383 [INFO][4150] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 01:05:57.426640 env[1453]: 2025-05-17 01:05:57.413 [WARNING][4150] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="eaf4d6f751910ded5debcb0a407fe1647f085c1e88db7649e0bcc6fa4fbff0e0" HandleID="k8s-pod-network.eaf4d6f751910ded5debcb0a407fe1647f085c1e88db7649e0bcc6fa4fbff0e0" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-calico--apiserver--7bb465f89b--nhrhw-eth0" May 17 01:05:57.426640 env[1453]: 2025-05-17 01:05:57.413 [INFO][4150] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="eaf4d6f751910ded5debcb0a407fe1647f085c1e88db7649e0bcc6fa4fbff0e0" HandleID="k8s-pod-network.eaf4d6f751910ded5debcb0a407fe1647f085c1e88db7649e0bcc6fa4fbff0e0" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-calico--apiserver--7bb465f89b--nhrhw-eth0" May 17 01:05:57.426640 env[1453]: 2025-05-17 01:05:57.419 [INFO][4150] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 01:05:57.426640 env[1453]: 2025-05-17 01:05:57.420 [INFO][4116] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="eaf4d6f751910ded5debcb0a407fe1647f085c1e88db7649e0bcc6fa4fbff0e0" May 17 01:05:57.427205 env[1453]: time="2025-05-17T01:05:57.427154880Z" level=info msg="TearDown network for sandbox \"eaf4d6f751910ded5debcb0a407fe1647f085c1e88db7649e0bcc6fa4fbff0e0\" successfully" May 17 01:05:57.427205 env[1453]: time="2025-05-17T01:05:57.427200201Z" level=info msg="StopPodSandbox for \"eaf4d6f751910ded5debcb0a407fe1647f085c1e88db7649e0bcc6fa4fbff0e0\" returns successfully" May 17 01:05:57.429220 env[1453]: time="2025-05-17T01:05:57.429166544Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7bb465f89b-nhrhw,Uid:70b64262-db16-4665-bc8a-83aa2db3b33c,Namespace:calico-apiserver,Attempt:1,}" May 17 01:05:57.446000 audit[4173]: NETFILTER_CFG table=filter:113 family=2 entries=20 op=nft_register_rule pid=4173 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:05:57.446000 audit[4173]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=7480 a0=3 a1=ffffd53db870 a2=0 a3=1 items=0 ppid=2540 pid=4173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:57.446000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:05:57.453000 audit[4173]: NETFILTER_CFG table=nat:114 family=2 entries=14 op=nft_register_rule pid=4173 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:05:57.453000 audit[4173]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3468 a0=3 a1=ffffd53db870 a2=0 a3=1 items=0 ppid=2540 pid=4173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:57.453000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:05:57.464668 env[1453]: 2025-05-17 01:05:57.318 [INFO][4119] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="ddb911fedf4c2ccf6ed8ac040a53a0054cd4be370b4614c6e3133824cbadd2ab" May 17 01:05:57.464668 env[1453]: 2025-05-17 01:05:57.318 [INFO][4119] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="ddb911fedf4c2ccf6ed8ac040a53a0054cd4be370b4614c6e3133824cbadd2ab" iface="eth0" netns="/var/run/netns/cni-f044c35b-6a41-ebeb-dcfa-ced00faaabd9" May 17 01:05:57.464668 env[1453]: 2025-05-17 01:05:57.318 [INFO][4119] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="ddb911fedf4c2ccf6ed8ac040a53a0054cd4be370b4614c6e3133824cbadd2ab" iface="eth0" netns="/var/run/netns/cni-f044c35b-6a41-ebeb-dcfa-ced00faaabd9" May 17 01:05:57.464668 env[1453]: 2025-05-17 01:05:57.318 [INFO][4119] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="ddb911fedf4c2ccf6ed8ac040a53a0054cd4be370b4614c6e3133824cbadd2ab" iface="eth0" netns="/var/run/netns/cni-f044c35b-6a41-ebeb-dcfa-ced00faaabd9" May 17 01:05:57.464668 env[1453]: 2025-05-17 01:05:57.318 [INFO][4119] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="ddb911fedf4c2ccf6ed8ac040a53a0054cd4be370b4614c6e3133824cbadd2ab" May 17 01:05:57.464668 env[1453]: 2025-05-17 01:05:57.318 [INFO][4119] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ddb911fedf4c2ccf6ed8ac040a53a0054cd4be370b4614c6e3133824cbadd2ab" May 17 01:05:57.464668 env[1453]: 2025-05-17 01:05:57.419 [INFO][4157] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ddb911fedf4c2ccf6ed8ac040a53a0054cd4be370b4614c6e3133824cbadd2ab" HandleID="k8s-pod-network.ddb911fedf4c2ccf6ed8ac040a53a0054cd4be370b4614c6e3133824cbadd2ab" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-csi--node--driver--92ktb-eth0" May 17 01:05:57.464668 env[1453]: 2025-05-17 01:05:57.419 [INFO][4157] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 01:05:57.464668 env[1453]: 2025-05-17 01:05:57.420 [INFO][4157] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 01:05:57.464668 env[1453]: 2025-05-17 01:05:57.451 [WARNING][4157] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ddb911fedf4c2ccf6ed8ac040a53a0054cd4be370b4614c6e3133824cbadd2ab" HandleID="k8s-pod-network.ddb911fedf4c2ccf6ed8ac040a53a0054cd4be370b4614c6e3133824cbadd2ab" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-csi--node--driver--92ktb-eth0" May 17 01:05:57.464668 env[1453]: 2025-05-17 01:05:57.451 [INFO][4157] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ddb911fedf4c2ccf6ed8ac040a53a0054cd4be370b4614c6e3133824cbadd2ab" HandleID="k8s-pod-network.ddb911fedf4c2ccf6ed8ac040a53a0054cd4be370b4614c6e3133824cbadd2ab" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-csi--node--driver--92ktb-eth0" May 17 01:05:57.464668 env[1453]: 2025-05-17 01:05:57.459 [INFO][4157] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 01:05:57.464668 env[1453]: 2025-05-17 01:05:57.462 [INFO][4119] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="ddb911fedf4c2ccf6ed8ac040a53a0054cd4be370b4614c6e3133824cbadd2ab" May 17 01:05:57.467317 env[1453]: time="2025-05-17T01:05:57.467281190Z" level=info msg="TearDown network for sandbox \"ddb911fedf4c2ccf6ed8ac040a53a0054cd4be370b4614c6e3133824cbadd2ab\" successfully" May 17 01:05:57.467773 env[1453]: time="2025-05-17T01:05:57.467380911Z" level=info msg="StopPodSandbox for \"ddb911fedf4c2ccf6ed8ac040a53a0054cd4be370b4614c6e3133824cbadd2ab\" returns successfully" May 17 01:05:57.468131 env[1453]: time="2025-05-17T01:05:57.468098480Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-92ktb,Uid:4d21f64d-bc3c-4fa5-8ad3-4aed6c59a824,Namespace:calico-system,Attempt:1,}" May 17 01:05:57.487000 audit[4192]: NETFILTER_CFG table=filter:115 family=2 entries=17 op=nft_register_rule pid=4192 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:05:57.487000 audit[4192]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5248 a0=3 a1=ffffc421ba10 a2=0 a3=1 items=0 ppid=2540 pid=4192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:57.487000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:05:57.499000 audit[4192]: NETFILTER_CFG table=nat:116 family=2 entries=35 op=nft_register_chain pid=4192 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:05:57.506030 kernel: kauditd_printk_skb: 758 callbacks suppressed May 17 01:05:57.506114 kernel: audit: type=1325 audit(1747443957.499:1059): table=nat:116 family=2 entries=35 op=nft_register_chain pid=4192 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:05:57.530973 kernel: audit: type=1300 audit(1747443957.499:1059): arch=c00000b7 syscall=211 success=yes exit=14196 a0=3 a1=ffffc421ba10 a2=0 a3=1 items=0 ppid=2540 pid=4192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:57.499000 audit[4192]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14196 a0=3 a1=ffffc421ba10 a2=0 a3=1 items=0 ppid=2540 pid=4192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:57.499000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:05:57.580660 kernel: audit: type=1327 audit(1747443957.499:1059): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:05:57.585737 systemd[1]: run-netns-cni\x2de142f51d\x2d6a1e\x2d89c3\x2d00c4\x2d5084315ac246.mount: Deactivated successfully. May 17 01:05:57.585821 systemd[1]: run-netns-cni\x2db401ca26\x2d98da\x2d2864\x2dd3aa\x2da17520707f0c.mount: Deactivated successfully. May 17 01:05:57.585870 systemd[1]: run-netns-cni\x2dae4bfc4a\x2d99b6\x2d4222\x2da93b\x2d8b4eb02d6554.mount: Deactivated successfully. May 17 01:05:57.585916 systemd[1]: run-netns-cni\x2df044c35b\x2d6a41\x2debeb\x2ddcfa\x2dced00faaabd9.mount: Deactivated successfully. May 17 01:05:57.612239 systemd-networkd[1616]: vxlan.calico: Gained IPv6LL May 17 01:05:57.673171 systemd-networkd[1616]: cali7ac9755a16c: Gained IPv6LL May 17 01:05:57.710535 systemd-networkd[1616]: cali9483adea922: Link UP May 17 01:05:57.720955 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 01:05:57.721061 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali9483adea922: link becomes ready May 17 01:05:57.725994 systemd-networkd[1616]: cali9483adea922: Gained carrier May 17 01:05:57.753592 env[1453]: 2025-05-17 01:05:57.490 [INFO][4166] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--56b9a5cda4-k8s-calico--kube--controllers--f6596879f--8tb74-eth0 calico-kube-controllers-f6596879f- calico-system cbd568ae-4e42-43d9-8aad-56b7909a49ad 973 0 2025-05-17 01:05:31 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:f6596879f projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510.3.7-n-56b9a5cda4 calico-kube-controllers-f6596879f-8tb74 eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali9483adea922 [] [] }} ContainerID="44353239d42685c072fdcb8fa672e01b108759db2637eb09642f287487464d04" Namespace="calico-system" Pod="calico-kube-controllers-f6596879f-8tb74" WorkloadEndpoint="ci--3510.3.7--n--56b9a5cda4-k8s-calico--kube--controllers--f6596879f--8tb74-" May 17 01:05:57.753592 env[1453]: 2025-05-17 01:05:57.490 [INFO][4166] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="44353239d42685c072fdcb8fa672e01b108759db2637eb09642f287487464d04" Namespace="calico-system" Pod="calico-kube-controllers-f6596879f-8tb74" WorkloadEndpoint="ci--3510.3.7--n--56b9a5cda4-k8s-calico--kube--controllers--f6596879f--8tb74-eth0" May 17 01:05:57.753592 env[1453]: 2025-05-17 01:05:57.632 [INFO][4206] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="44353239d42685c072fdcb8fa672e01b108759db2637eb09642f287487464d04" HandleID="k8s-pod-network.44353239d42685c072fdcb8fa672e01b108759db2637eb09642f287487464d04" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-calico--kube--controllers--f6596879f--8tb74-eth0" May 17 01:05:57.753592 env[1453]: 2025-05-17 01:05:57.632 [INFO][4206] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="44353239d42685c072fdcb8fa672e01b108759db2637eb09642f287487464d04" HandleID="k8s-pod-network.44353239d42685c072fdcb8fa672e01b108759db2637eb09642f287487464d04" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-calico--kube--controllers--f6596879f--8tb74-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000237020), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.7-n-56b9a5cda4", "pod":"calico-kube-controllers-f6596879f-8tb74", "timestamp":"2025-05-17 01:05:57.632355482 +0000 UTC"}, Hostname:"ci-3510.3.7-n-56b9a5cda4", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 01:05:57.753592 env[1453]: 2025-05-17 01:05:57.632 [INFO][4206] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 01:05:57.753592 env[1453]: 2025-05-17 01:05:57.633 [INFO][4206] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 01:05:57.753592 env[1453]: 2025-05-17 01:05:57.633 [INFO][4206] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-56b9a5cda4' May 17 01:05:57.753592 env[1453]: 2025-05-17 01:05:57.645 [INFO][4206] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.44353239d42685c072fdcb8fa672e01b108759db2637eb09642f287487464d04" host="ci-3510.3.7-n-56b9a5cda4" May 17 01:05:57.753592 env[1453]: 2025-05-17 01:05:57.649 [INFO][4206] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.7-n-56b9a5cda4" May 17 01:05:57.753592 env[1453]: 2025-05-17 01:05:57.653 [INFO][4206] ipam/ipam.go 511: Trying affinity for 192.168.67.128/26 host="ci-3510.3.7-n-56b9a5cda4" May 17 01:05:57.753592 env[1453]: 2025-05-17 01:05:57.664 [INFO][4206] ipam/ipam.go 158: Attempting to load block cidr=192.168.67.128/26 host="ci-3510.3.7-n-56b9a5cda4" May 17 01:05:57.753592 env[1453]: 2025-05-17 01:05:57.666 [INFO][4206] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.67.128/26 host="ci-3510.3.7-n-56b9a5cda4" May 17 01:05:57.753592 env[1453]: 2025-05-17 01:05:57.666 [INFO][4206] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.67.128/26 handle="k8s-pod-network.44353239d42685c072fdcb8fa672e01b108759db2637eb09642f287487464d04" host="ci-3510.3.7-n-56b9a5cda4" May 17 01:05:57.753592 env[1453]: 2025-05-17 01:05:57.669 [INFO][4206] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.44353239d42685c072fdcb8fa672e01b108759db2637eb09642f287487464d04 May 17 01:05:57.753592 env[1453]: 2025-05-17 01:05:57.680 [INFO][4206] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.67.128/26 handle="k8s-pod-network.44353239d42685c072fdcb8fa672e01b108759db2637eb09642f287487464d04" host="ci-3510.3.7-n-56b9a5cda4" May 17 01:05:57.753592 env[1453]: 2025-05-17 01:05:57.688 [INFO][4206] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.67.131/26] block=192.168.67.128/26 handle="k8s-pod-network.44353239d42685c072fdcb8fa672e01b108759db2637eb09642f287487464d04" host="ci-3510.3.7-n-56b9a5cda4" May 17 01:05:57.753592 env[1453]: 2025-05-17 01:05:57.688 [INFO][4206] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.67.131/26] handle="k8s-pod-network.44353239d42685c072fdcb8fa672e01b108759db2637eb09642f287487464d04" host="ci-3510.3.7-n-56b9a5cda4" May 17 01:05:57.753592 env[1453]: 2025-05-17 01:05:57.688 [INFO][4206] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 01:05:57.753592 env[1453]: 2025-05-17 01:05:57.688 [INFO][4206] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.67.131/26] IPv6=[] ContainerID="44353239d42685c072fdcb8fa672e01b108759db2637eb09642f287487464d04" HandleID="k8s-pod-network.44353239d42685c072fdcb8fa672e01b108759db2637eb09642f287487464d04" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-calico--kube--controllers--f6596879f--8tb74-eth0" May 17 01:05:57.754493 env[1453]: 2025-05-17 01:05:57.693 [INFO][4166] cni-plugin/k8s.go 418: Populated endpoint ContainerID="44353239d42685c072fdcb8fa672e01b108759db2637eb09642f287487464d04" Namespace="calico-system" Pod="calico-kube-controllers-f6596879f-8tb74" WorkloadEndpoint="ci--3510.3.7--n--56b9a5cda4-k8s-calico--kube--controllers--f6596879f--8tb74-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--56b9a5cda4-k8s-calico--kube--controllers--f6596879f--8tb74-eth0", GenerateName:"calico-kube-controllers-f6596879f-", Namespace:"calico-system", SelfLink:"", UID:"cbd568ae-4e42-43d9-8aad-56b7909a49ad", ResourceVersion:"973", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 1, 5, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"f6596879f", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-56b9a5cda4", ContainerID:"", Pod:"calico-kube-controllers-f6596879f-8tb74", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.67.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali9483adea922", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 01:05:57.754493 env[1453]: 2025-05-17 01:05:57.693 [INFO][4166] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.67.131/32] ContainerID="44353239d42685c072fdcb8fa672e01b108759db2637eb09642f287487464d04" Namespace="calico-system" Pod="calico-kube-controllers-f6596879f-8tb74" WorkloadEndpoint="ci--3510.3.7--n--56b9a5cda4-k8s-calico--kube--controllers--f6596879f--8tb74-eth0" May 17 01:05:57.754493 env[1453]: 2025-05-17 01:05:57.693 [INFO][4166] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali9483adea922 ContainerID="44353239d42685c072fdcb8fa672e01b108759db2637eb09642f287487464d04" Namespace="calico-system" Pod="calico-kube-controllers-f6596879f-8tb74" WorkloadEndpoint="ci--3510.3.7--n--56b9a5cda4-k8s-calico--kube--controllers--f6596879f--8tb74-eth0" May 17 01:05:57.754493 env[1453]: 2025-05-17 01:05:57.725 [INFO][4166] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="44353239d42685c072fdcb8fa672e01b108759db2637eb09642f287487464d04" Namespace="calico-system" Pod="calico-kube-controllers-f6596879f-8tb74" WorkloadEndpoint="ci--3510.3.7--n--56b9a5cda4-k8s-calico--kube--controllers--f6596879f--8tb74-eth0" May 17 01:05:57.754493 env[1453]: 2025-05-17 01:05:57.726 [INFO][4166] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="44353239d42685c072fdcb8fa672e01b108759db2637eb09642f287487464d04" Namespace="calico-system" Pod="calico-kube-controllers-f6596879f-8tb74" WorkloadEndpoint="ci--3510.3.7--n--56b9a5cda4-k8s-calico--kube--controllers--f6596879f--8tb74-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--56b9a5cda4-k8s-calico--kube--controllers--f6596879f--8tb74-eth0", GenerateName:"calico-kube-controllers-f6596879f-", Namespace:"calico-system", SelfLink:"", UID:"cbd568ae-4e42-43d9-8aad-56b7909a49ad", ResourceVersion:"973", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 1, 5, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"f6596879f", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-56b9a5cda4", ContainerID:"44353239d42685c072fdcb8fa672e01b108759db2637eb09642f287487464d04", Pod:"calico-kube-controllers-f6596879f-8tb74", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.67.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali9483adea922", MAC:"06:47:78:0e:47:47", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 01:05:57.754493 env[1453]: 2025-05-17 01:05:57.752 [INFO][4166] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="44353239d42685c072fdcb8fa672e01b108759db2637eb09642f287487464d04" Namespace="calico-system" Pod="calico-kube-controllers-f6596879f-8tb74" WorkloadEndpoint="ci--3510.3.7--n--56b9a5cda4-k8s-calico--kube--controllers--f6596879f--8tb74-eth0" May 17 01:05:57.799691 env[1453]: time="2025-05-17T01:05:57.793764611Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 01:05:57.799691 env[1453]: time="2025-05-17T01:05:57.793827252Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 01:05:57.799691 env[1453]: time="2025-05-17T01:05:57.793837412Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 01:05:57.799691 env[1453]: time="2025-05-17T01:05:57.794100055Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/44353239d42685c072fdcb8fa672e01b108759db2637eb09642f287487464d04 pid=4263 runtime=io.containerd.runc.v2 May 17 01:05:57.819699 systemd-networkd[1616]: cali6e19ad380a9: Link UP May 17 01:05:57.828000 audit[4260]: NETFILTER_CFG table=filter:117 family=2 entries=40 op=nft_register_chain pid=4260 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 01:05:57.830376 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali6e19ad380a9: link becomes ready May 17 01:05:57.830455 kernel: audit: type=1325 audit(1747443957.828:1060): table=filter:117 family=2 entries=40 op=nft_register_chain pid=4260 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 01:05:57.829744 systemd-networkd[1616]: cali6e19ad380a9: Gained carrier May 17 01:05:57.828000 audit[4260]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20764 a0=3 a1=ffffddf6e2a0 a2=0 a3=ffffa2669fa8 items=0 ppid=3752 pid=4260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:57.879622 kernel: audit: type=1300 audit(1747443957.828:1060): arch=c00000b7 syscall=211 success=yes exit=20764 a0=3 a1=ffffddf6e2a0 a2=0 a3=ffffa2669fa8 items=0 ppid=3752 pid=4260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:57.828000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 01:05:57.906686 kernel: audit: type=1327 audit(1747443957.828:1060): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 01:05:57.906801 env[1453]: 2025-05-17 01:05:57.566 [INFO][4194] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--56b9a5cda4-k8s-calico--apiserver--7bb465f89b--nhrhw-eth0 calico-apiserver-7bb465f89b- calico-apiserver 70b64262-db16-4665-bc8a-83aa2db3b33c 975 0 2025-05-17 01:05:26 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:7bb465f89b projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.7-n-56b9a5cda4 calico-apiserver-7bb465f89b-nhrhw eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali6e19ad380a9 [] [] }} ContainerID="e5b87d20810f62b922f355486e36fd392536e7386a21dac4aa825af6fa3957f3" Namespace="calico-apiserver" Pod="calico-apiserver-7bb465f89b-nhrhw" WorkloadEndpoint="ci--3510.3.7--n--56b9a5cda4-k8s-calico--apiserver--7bb465f89b--nhrhw-" May 17 01:05:57.906801 env[1453]: 2025-05-17 01:05:57.567 [INFO][4194] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="e5b87d20810f62b922f355486e36fd392536e7386a21dac4aa825af6fa3957f3" Namespace="calico-apiserver" Pod="calico-apiserver-7bb465f89b-nhrhw" WorkloadEndpoint="ci--3510.3.7--n--56b9a5cda4-k8s-calico--apiserver--7bb465f89b--nhrhw-eth0" May 17 01:05:57.906801 env[1453]: 2025-05-17 01:05:57.668 [INFO][4217] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e5b87d20810f62b922f355486e36fd392536e7386a21dac4aa825af6fa3957f3" HandleID="k8s-pod-network.e5b87d20810f62b922f355486e36fd392536e7386a21dac4aa825af6fa3957f3" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-calico--apiserver--7bb465f89b--nhrhw-eth0" May 17 01:05:57.906801 env[1453]: 2025-05-17 01:05:57.669 [INFO][4217] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="e5b87d20810f62b922f355486e36fd392536e7386a21dac4aa825af6fa3957f3" HandleID="k8s-pod-network.e5b87d20810f62b922f355486e36fd392536e7386a21dac4aa825af6fa3957f3" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-calico--apiserver--7bb465f89b--nhrhw-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400022f020), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.7-n-56b9a5cda4", "pod":"calico-apiserver-7bb465f89b-nhrhw", "timestamp":"2025-05-17 01:05:57.66892987 +0000 UTC"}, Hostname:"ci-3510.3.7-n-56b9a5cda4", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 01:05:57.906801 env[1453]: 2025-05-17 01:05:57.669 [INFO][4217] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 01:05:57.906801 env[1453]: 2025-05-17 01:05:57.688 [INFO][4217] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 01:05:57.906801 env[1453]: 2025-05-17 01:05:57.688 [INFO][4217] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-56b9a5cda4' May 17 01:05:57.906801 env[1453]: 2025-05-17 01:05:57.746 [INFO][4217] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.e5b87d20810f62b922f355486e36fd392536e7386a21dac4aa825af6fa3957f3" host="ci-3510.3.7-n-56b9a5cda4" May 17 01:05:57.906801 env[1453]: 2025-05-17 01:05:57.756 [INFO][4217] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.7-n-56b9a5cda4" May 17 01:05:57.906801 env[1453]: 2025-05-17 01:05:57.762 [INFO][4217] ipam/ipam.go 511: Trying affinity for 192.168.67.128/26 host="ci-3510.3.7-n-56b9a5cda4" May 17 01:05:57.906801 env[1453]: 2025-05-17 01:05:57.768 [INFO][4217] ipam/ipam.go 158: Attempting to load block cidr=192.168.67.128/26 host="ci-3510.3.7-n-56b9a5cda4" May 17 01:05:57.906801 env[1453]: 2025-05-17 01:05:57.771 [INFO][4217] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.67.128/26 host="ci-3510.3.7-n-56b9a5cda4" May 17 01:05:57.906801 env[1453]: 2025-05-17 01:05:57.771 [INFO][4217] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.67.128/26 handle="k8s-pod-network.e5b87d20810f62b922f355486e36fd392536e7386a21dac4aa825af6fa3957f3" host="ci-3510.3.7-n-56b9a5cda4" May 17 01:05:57.906801 env[1453]: 2025-05-17 01:05:57.773 [INFO][4217] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.e5b87d20810f62b922f355486e36fd392536e7386a21dac4aa825af6fa3957f3 May 17 01:05:57.906801 env[1453]: 2025-05-17 01:05:57.778 [INFO][4217] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.67.128/26 handle="k8s-pod-network.e5b87d20810f62b922f355486e36fd392536e7386a21dac4aa825af6fa3957f3" host="ci-3510.3.7-n-56b9a5cda4" May 17 01:05:57.906801 env[1453]: 2025-05-17 01:05:57.789 [INFO][4217] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.67.132/26] block=192.168.67.128/26 handle="k8s-pod-network.e5b87d20810f62b922f355486e36fd392536e7386a21dac4aa825af6fa3957f3" host="ci-3510.3.7-n-56b9a5cda4" May 17 01:05:57.906801 env[1453]: 2025-05-17 01:05:57.790 [INFO][4217] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.67.132/26] handle="k8s-pod-network.e5b87d20810f62b922f355486e36fd392536e7386a21dac4aa825af6fa3957f3" host="ci-3510.3.7-n-56b9a5cda4" May 17 01:05:57.906801 env[1453]: 2025-05-17 01:05:57.790 [INFO][4217] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 01:05:57.906801 env[1453]: 2025-05-17 01:05:57.790 [INFO][4217] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.67.132/26] IPv6=[] ContainerID="e5b87d20810f62b922f355486e36fd392536e7386a21dac4aa825af6fa3957f3" HandleID="k8s-pod-network.e5b87d20810f62b922f355486e36fd392536e7386a21dac4aa825af6fa3957f3" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-calico--apiserver--7bb465f89b--nhrhw-eth0" May 17 01:05:57.907404 env[1453]: 2025-05-17 01:05:57.800 [INFO][4194] cni-plugin/k8s.go 418: Populated endpoint ContainerID="e5b87d20810f62b922f355486e36fd392536e7386a21dac4aa825af6fa3957f3" Namespace="calico-apiserver" Pod="calico-apiserver-7bb465f89b-nhrhw" WorkloadEndpoint="ci--3510.3.7--n--56b9a5cda4-k8s-calico--apiserver--7bb465f89b--nhrhw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--56b9a5cda4-k8s-calico--apiserver--7bb465f89b--nhrhw-eth0", GenerateName:"calico-apiserver-7bb465f89b-", Namespace:"calico-apiserver", SelfLink:"", UID:"70b64262-db16-4665-bc8a-83aa2db3b33c", ResourceVersion:"975", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 1, 5, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7bb465f89b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-56b9a5cda4", ContainerID:"", Pod:"calico-apiserver-7bb465f89b-nhrhw", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.67.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali6e19ad380a9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 01:05:57.907404 env[1453]: 2025-05-17 01:05:57.801 [INFO][4194] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.67.132/32] ContainerID="e5b87d20810f62b922f355486e36fd392536e7386a21dac4aa825af6fa3957f3" Namespace="calico-apiserver" Pod="calico-apiserver-7bb465f89b-nhrhw" WorkloadEndpoint="ci--3510.3.7--n--56b9a5cda4-k8s-calico--apiserver--7bb465f89b--nhrhw-eth0" May 17 01:05:57.907404 env[1453]: 2025-05-17 01:05:57.801 [INFO][4194] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali6e19ad380a9 ContainerID="e5b87d20810f62b922f355486e36fd392536e7386a21dac4aa825af6fa3957f3" Namespace="calico-apiserver" Pod="calico-apiserver-7bb465f89b-nhrhw" WorkloadEndpoint="ci--3510.3.7--n--56b9a5cda4-k8s-calico--apiserver--7bb465f89b--nhrhw-eth0" May 17 01:05:57.907404 env[1453]: 2025-05-17 01:05:57.844 [INFO][4194] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="e5b87d20810f62b922f355486e36fd392536e7386a21dac4aa825af6fa3957f3" Namespace="calico-apiserver" Pod="calico-apiserver-7bb465f89b-nhrhw" WorkloadEndpoint="ci--3510.3.7--n--56b9a5cda4-k8s-calico--apiserver--7bb465f89b--nhrhw-eth0" May 17 01:05:57.907404 env[1453]: 2025-05-17 01:05:57.845 [INFO][4194] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="e5b87d20810f62b922f355486e36fd392536e7386a21dac4aa825af6fa3957f3" Namespace="calico-apiserver" Pod="calico-apiserver-7bb465f89b-nhrhw" WorkloadEndpoint="ci--3510.3.7--n--56b9a5cda4-k8s-calico--apiserver--7bb465f89b--nhrhw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--56b9a5cda4-k8s-calico--apiserver--7bb465f89b--nhrhw-eth0", GenerateName:"calico-apiserver-7bb465f89b-", Namespace:"calico-apiserver", SelfLink:"", UID:"70b64262-db16-4665-bc8a-83aa2db3b33c", ResourceVersion:"975", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 1, 5, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7bb465f89b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-56b9a5cda4", ContainerID:"e5b87d20810f62b922f355486e36fd392536e7386a21dac4aa825af6fa3957f3", Pod:"calico-apiserver-7bb465f89b-nhrhw", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.67.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali6e19ad380a9", MAC:"52:f4:4a:22:26:42", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 01:05:57.907404 env[1453]: 2025-05-17 01:05:57.884 [INFO][4194] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="e5b87d20810f62b922f355486e36fd392536e7386a21dac4aa825af6fa3957f3" Namespace="calico-apiserver" Pod="calico-apiserver-7bb465f89b-nhrhw" WorkloadEndpoint="ci--3510.3.7--n--56b9a5cda4-k8s-calico--apiserver--7bb465f89b--nhrhw-eth0" May 17 01:05:57.919620 systemd[1]: Started cri-containerd-44353239d42685c072fdcb8fa672e01b108759db2637eb09642f287487464d04.scope. May 17 01:05:57.969116 systemd-networkd[1616]: cali2c9d54d19d0: Link UP May 17 01:05:57.970071 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali2c9d54d19d0: link becomes ready May 17 01:05:57.970244 systemd-networkd[1616]: cali2c9d54d19d0: Gained carrier May 17 01:05:57.975000 audit[4306]: NETFILTER_CFG table=filter:118 family=2 entries=58 op=nft_register_chain pid=4306 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 01:05:57.999063 env[1453]: time="2025-05-17T01:05:57.982393099Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 01:05:57.999063 env[1453]: time="2025-05-17T01:05:57.982470500Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 01:05:57.999063 env[1453]: time="2025-05-17T01:05:57.982482860Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 01:05:57.999063 env[1453]: time="2025-05-17T01:05:57.982678063Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e5b87d20810f62b922f355486e36fd392536e7386a21dac4aa825af6fa3957f3 pid=4308 runtime=io.containerd.runc.v2 May 17 01:05:58.021214 kernel: audit: type=1325 audit(1747443957.975:1061): table=filter:118 family=2 entries=58 op=nft_register_chain pid=4306 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 01:05:58.021454 kernel: audit: type=1400 audit(1747443958.000:1062): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.041303 kernel: audit: type=1400 audit(1747443958.000:1063): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.066110 kernel: audit: type=1400 audit(1747443958.000:1064): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.066352 env[1453]: 2025-05-17 01:05:57.622 [INFO][4178] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--56b9a5cda4-k8s-calico--apiserver--7bb465f89b--fvt58-eth0 calico-apiserver-7bb465f89b- calico-apiserver 76c2d8d7-3942-4d0e-bf68-64e138374d48 974 0 2025-05-17 01:05:26 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:7bb465f89b projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.7-n-56b9a5cda4 calico-apiserver-7bb465f89b-fvt58 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali2c9d54d19d0 [] [] }} ContainerID="069385844eb799407dcf6e76a53053e1fd21e444114d019586abe772844ce150" Namespace="calico-apiserver" Pod="calico-apiserver-7bb465f89b-fvt58" WorkloadEndpoint="ci--3510.3.7--n--56b9a5cda4-k8s-calico--apiserver--7bb465f89b--fvt58-" May 17 01:05:58.066352 env[1453]: 2025-05-17 01:05:57.622 [INFO][4178] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="069385844eb799407dcf6e76a53053e1fd21e444114d019586abe772844ce150" Namespace="calico-apiserver" Pod="calico-apiserver-7bb465f89b-fvt58" WorkloadEndpoint="ci--3510.3.7--n--56b9a5cda4-k8s-calico--apiserver--7bb465f89b--fvt58-eth0" May 17 01:05:58.066352 env[1453]: 2025-05-17 01:05:57.691 [INFO][4231] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="069385844eb799407dcf6e76a53053e1fd21e444114d019586abe772844ce150" HandleID="k8s-pod-network.069385844eb799407dcf6e76a53053e1fd21e444114d019586abe772844ce150" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-calico--apiserver--7bb465f89b--fvt58-eth0" May 17 01:05:58.066352 env[1453]: 2025-05-17 01:05:57.691 [INFO][4231] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="069385844eb799407dcf6e76a53053e1fd21e444114d019586abe772844ce150" HandleID="k8s-pod-network.069385844eb799407dcf6e76a53053e1fd21e444114d019586abe772844ce150" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-calico--apiserver--7bb465f89b--fvt58-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002d7660), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.7-n-56b9a5cda4", "pod":"calico-apiserver-7bb465f89b-fvt58", "timestamp":"2025-05-17 01:05:57.691445694 +0000 UTC"}, Hostname:"ci-3510.3.7-n-56b9a5cda4", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 01:05:58.066352 env[1453]: 2025-05-17 01:05:57.691 [INFO][4231] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 01:05:58.066352 env[1453]: 2025-05-17 01:05:57.790 [INFO][4231] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 01:05:58.066352 env[1453]: 2025-05-17 01:05:57.790 [INFO][4231] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-56b9a5cda4' May 17 01:05:58.066352 env[1453]: 2025-05-17 01:05:57.851 [INFO][4231] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.069385844eb799407dcf6e76a53053e1fd21e444114d019586abe772844ce150" host="ci-3510.3.7-n-56b9a5cda4" May 17 01:05:58.066352 env[1453]: 2025-05-17 01:05:57.904 [INFO][4231] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.7-n-56b9a5cda4" May 17 01:05:58.066352 env[1453]: 2025-05-17 01:05:57.919 [INFO][4231] ipam/ipam.go 511: Trying affinity for 192.168.67.128/26 host="ci-3510.3.7-n-56b9a5cda4" May 17 01:05:58.066352 env[1453]: 2025-05-17 01:05:57.923 [INFO][4231] ipam/ipam.go 158: Attempting to load block cidr=192.168.67.128/26 host="ci-3510.3.7-n-56b9a5cda4" May 17 01:05:58.066352 env[1453]: 2025-05-17 01:05:57.926 [INFO][4231] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.67.128/26 host="ci-3510.3.7-n-56b9a5cda4" May 17 01:05:58.066352 env[1453]: 2025-05-17 01:05:57.926 [INFO][4231] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.67.128/26 handle="k8s-pod-network.069385844eb799407dcf6e76a53053e1fd21e444114d019586abe772844ce150" host="ci-3510.3.7-n-56b9a5cda4" May 17 01:05:58.066352 env[1453]: 2025-05-17 01:05:57.928 [INFO][4231] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.069385844eb799407dcf6e76a53053e1fd21e444114d019586abe772844ce150 May 17 01:05:58.066352 env[1453]: 2025-05-17 01:05:57.935 [INFO][4231] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.67.128/26 handle="k8s-pod-network.069385844eb799407dcf6e76a53053e1fd21e444114d019586abe772844ce150" host="ci-3510.3.7-n-56b9a5cda4" May 17 01:05:58.066352 env[1453]: 2025-05-17 01:05:57.947 [INFO][4231] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.67.133/26] block=192.168.67.128/26 handle="k8s-pod-network.069385844eb799407dcf6e76a53053e1fd21e444114d019586abe772844ce150" host="ci-3510.3.7-n-56b9a5cda4" May 17 01:05:58.066352 env[1453]: 2025-05-17 01:05:57.947 [INFO][4231] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.67.133/26] handle="k8s-pod-network.069385844eb799407dcf6e76a53053e1fd21e444114d019586abe772844ce150" host="ci-3510.3.7-n-56b9a5cda4" May 17 01:05:58.066352 env[1453]: 2025-05-17 01:05:57.947 [INFO][4231] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 01:05:58.066352 env[1453]: 2025-05-17 01:05:57.947 [INFO][4231] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.67.133/26] IPv6=[] ContainerID="069385844eb799407dcf6e76a53053e1fd21e444114d019586abe772844ce150" HandleID="k8s-pod-network.069385844eb799407dcf6e76a53053e1fd21e444114d019586abe772844ce150" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-calico--apiserver--7bb465f89b--fvt58-eth0" May 17 01:05:58.066883 env[1453]: 2025-05-17 01:05:57.952 [INFO][4178] cni-plugin/k8s.go 418: Populated endpoint ContainerID="069385844eb799407dcf6e76a53053e1fd21e444114d019586abe772844ce150" Namespace="calico-apiserver" Pod="calico-apiserver-7bb465f89b-fvt58" WorkloadEndpoint="ci--3510.3.7--n--56b9a5cda4-k8s-calico--apiserver--7bb465f89b--fvt58-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--56b9a5cda4-k8s-calico--apiserver--7bb465f89b--fvt58-eth0", GenerateName:"calico-apiserver-7bb465f89b-", Namespace:"calico-apiserver", SelfLink:"", UID:"76c2d8d7-3942-4d0e-bf68-64e138374d48", ResourceVersion:"974", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 1, 5, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7bb465f89b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-56b9a5cda4", ContainerID:"", Pod:"calico-apiserver-7bb465f89b-fvt58", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.67.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali2c9d54d19d0", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 01:05:58.066883 env[1453]: 2025-05-17 01:05:57.952 [INFO][4178] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.67.133/32] ContainerID="069385844eb799407dcf6e76a53053e1fd21e444114d019586abe772844ce150" Namespace="calico-apiserver" Pod="calico-apiserver-7bb465f89b-fvt58" WorkloadEndpoint="ci--3510.3.7--n--56b9a5cda4-k8s-calico--apiserver--7bb465f89b--fvt58-eth0" May 17 01:05:58.066883 env[1453]: 2025-05-17 01:05:57.952 [INFO][4178] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali2c9d54d19d0 ContainerID="069385844eb799407dcf6e76a53053e1fd21e444114d019586abe772844ce150" Namespace="calico-apiserver" Pod="calico-apiserver-7bb465f89b-fvt58" WorkloadEndpoint="ci--3510.3.7--n--56b9a5cda4-k8s-calico--apiserver--7bb465f89b--fvt58-eth0" May 17 01:05:58.066883 env[1453]: 2025-05-17 01:05:57.970 [INFO][4178] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="069385844eb799407dcf6e76a53053e1fd21e444114d019586abe772844ce150" Namespace="calico-apiserver" Pod="calico-apiserver-7bb465f89b-fvt58" WorkloadEndpoint="ci--3510.3.7--n--56b9a5cda4-k8s-calico--apiserver--7bb465f89b--fvt58-eth0" May 17 01:05:58.066883 env[1453]: 2025-05-17 01:05:57.987 [INFO][4178] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="069385844eb799407dcf6e76a53053e1fd21e444114d019586abe772844ce150" Namespace="calico-apiserver" Pod="calico-apiserver-7bb465f89b-fvt58" WorkloadEndpoint="ci--3510.3.7--n--56b9a5cda4-k8s-calico--apiserver--7bb465f89b--fvt58-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--56b9a5cda4-k8s-calico--apiserver--7bb465f89b--fvt58-eth0", GenerateName:"calico-apiserver-7bb465f89b-", Namespace:"calico-apiserver", SelfLink:"", UID:"76c2d8d7-3942-4d0e-bf68-64e138374d48", ResourceVersion:"974", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 1, 5, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7bb465f89b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-56b9a5cda4", ContainerID:"069385844eb799407dcf6e76a53053e1fd21e444114d019586abe772844ce150", Pod:"calico-apiserver-7bb465f89b-fvt58", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.67.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali2c9d54d19d0", MAC:"9a:1e:c5:fe:2c:09", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 01:05:58.066883 env[1453]: 2025-05-17 01:05:58.046 [INFO][4178] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="069385844eb799407dcf6e76a53053e1fd21e444114d019586abe772844ce150" Namespace="calico-apiserver" Pod="calico-apiserver-7bb465f89b-fvt58" WorkloadEndpoint="ci--3510.3.7--n--56b9a5cda4-k8s-calico--apiserver--7bb465f89b--fvt58-eth0" May 17 01:05:58.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.001000 audit: BPF prog-id=168 op=LOAD May 17 01:05:58.014000 audit[4274]: AVC avc: denied { bpf } for pid=4274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.014000 audit[4274]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4263 pid=4274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:58.014000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434333533323339643432363835633037326664636238666136373265 May 17 01:05:58.014000 audit[4274]: AVC avc: denied { perfmon } for pid=4274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.014000 audit[4274]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4263 pid=4274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:58.014000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434333533323339643432363835633037326664636238666136373265 May 17 01:05:58.014000 audit[4274]: AVC avc: denied { bpf } for pid=4274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.014000 audit[4274]: AVC avc: denied { bpf } for pid=4274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.014000 audit[4274]: AVC avc: denied { bpf } for pid=4274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.014000 audit[4274]: AVC avc: denied { perfmon } for pid=4274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.014000 audit[4274]: AVC avc: denied { perfmon } for pid=4274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.014000 audit[4274]: AVC avc: denied { perfmon } for pid=4274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.014000 audit[4274]: AVC avc: denied { perfmon } for pid=4274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.014000 audit[4274]: AVC avc: denied { perfmon } for pid=4274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.014000 audit[4274]: AVC avc: denied { bpf } for pid=4274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:57.975000 audit[4306]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=30584 a0=3 a1=ffffda046b60 a2=0 a3=ffffbf2b0fa8 items=0 ppid=3752 pid=4306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:57.975000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 01:05:58.014000 audit[4274]: AVC avc: denied { bpf } for pid=4274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.014000 audit: BPF prog-id=169 op=LOAD May 17 01:05:58.014000 audit[4274]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4263 pid=4274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:58.014000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434333533323339643432363835633037326664636238666136373265 May 17 01:05:58.049000 audit[4274]: AVC avc: denied { bpf } for pid=4274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.049000 audit[4274]: AVC avc: denied { bpf } for pid=4274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.049000 audit[4274]: AVC avc: denied { perfmon } for pid=4274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.049000 audit[4274]: AVC avc: denied { perfmon } for pid=4274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.049000 audit[4274]: AVC avc: denied { perfmon } for pid=4274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.049000 audit[4274]: AVC avc: denied { perfmon } for pid=4274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.049000 audit[4274]: AVC avc: denied { perfmon } for pid=4274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.049000 audit[4274]: AVC avc: denied { bpf } for pid=4274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.079000 audit[4328]: NETFILTER_CFG table=filter:119 family=2 entries=49 op=nft_register_chain pid=4328 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 01:05:58.079000 audit[4328]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=25452 a0=3 a1=ffffc693a500 a2=0 a3=ffff90d13fa8 items=0 ppid=3752 pid=4328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:58.079000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 01:05:58.049000 audit[4274]: AVC avc: denied { bpf } for pid=4274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.049000 audit: BPF prog-id=170 op=LOAD May 17 01:05:58.049000 audit[4274]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4263 pid=4274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:58.049000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434333533323339643432363835633037326664636238666136373265 May 17 01:05:58.082000 audit: BPF prog-id=170 op=UNLOAD May 17 01:05:58.082000 audit: BPF prog-id=169 op=UNLOAD May 17 01:05:58.082000 audit[4274]: AVC avc: denied { bpf } for pid=4274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.082000 audit[4274]: AVC avc: denied { bpf } for pid=4274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.082000 audit[4274]: AVC avc: denied { bpf } for pid=4274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.082000 audit[4274]: AVC avc: denied { perfmon } for pid=4274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.082000 audit[4274]: AVC avc: denied { perfmon } for pid=4274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.082000 audit[4274]: AVC avc: denied { perfmon } for pid=4274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.082000 audit[4274]: AVC avc: denied { perfmon } for pid=4274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.082000 audit[4274]: AVC avc: denied { perfmon } for pid=4274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.082000 audit[4274]: AVC avc: denied { bpf } for pid=4274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.082000 audit[4274]: AVC avc: denied { bpf } for pid=4274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.082000 audit: BPF prog-id=171 op=LOAD May 17 01:05:58.082000 audit[4274]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4263 pid=4274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:58.082000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434333533323339643432363835633037326664636238666136373265 May 17 01:05:58.116382 env[1453]: time="2025-05-17T01:05:58.116105447Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 01:05:58.116382 env[1453]: time="2025-05-17T01:05:58.116167088Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 01:05:58.116382 env[1453]: time="2025-05-17T01:05:58.116178328Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 01:05:58.116382 env[1453]: time="2025-05-17T01:05:58.116335330Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/069385844eb799407dcf6e76a53053e1fd21e444114d019586abe772844ce150 pid=4344 runtime=io.containerd.runc.v2 May 17 01:05:58.120029 systemd-networkd[1616]: cali99d1626794e: Link UP May 17 01:05:58.129324 systemd[1]: Started cri-containerd-e5b87d20810f62b922f355486e36fd392536e7386a21dac4aa825af6fa3957f3.scope. May 17 01:05:58.135840 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali99d1626794e: link becomes ready May 17 01:05:58.136095 systemd-networkd[1616]: cali99d1626794e: Gained carrier May 17 01:05:58.161838 env[1453]: 2025-05-17 01:05:57.749 [INFO][4212] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--56b9a5cda4-k8s-csi--node--driver--92ktb-eth0 csi-node-driver- calico-system 4d21f64d-bc3c-4fa5-8ad3-4aed6c59a824 976 0 2025-05-17 01:05:31 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:78f6f74485 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s ci-3510.3.7-n-56b9a5cda4 csi-node-driver-92ktb eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali99d1626794e [] [] }} ContainerID="648a93c6516a9d3eb426cba128b94b02782242e59967d9901c54a4cc92744d12" Namespace="calico-system" Pod="csi-node-driver-92ktb" WorkloadEndpoint="ci--3510.3.7--n--56b9a5cda4-k8s-csi--node--driver--92ktb-" May 17 01:05:58.161838 env[1453]: 2025-05-17 01:05:57.749 [INFO][4212] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="648a93c6516a9d3eb426cba128b94b02782242e59967d9901c54a4cc92744d12" Namespace="calico-system" Pod="csi-node-driver-92ktb" WorkloadEndpoint="ci--3510.3.7--n--56b9a5cda4-k8s-csi--node--driver--92ktb-eth0" May 17 01:05:58.161838 env[1453]: 2025-05-17 01:05:57.894 [INFO][4249] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="648a93c6516a9d3eb426cba128b94b02782242e59967d9901c54a4cc92744d12" HandleID="k8s-pod-network.648a93c6516a9d3eb426cba128b94b02782242e59967d9901c54a4cc92744d12" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-csi--node--driver--92ktb-eth0" May 17 01:05:58.161838 env[1453]: 2025-05-17 01:05:57.895 [INFO][4249] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="648a93c6516a9d3eb426cba128b94b02782242e59967d9901c54a4cc92744d12" HandleID="k8s-pod-network.648a93c6516a9d3eb426cba128b94b02782242e59967d9901c54a4cc92744d12" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-csi--node--driver--92ktb-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000367510), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.7-n-56b9a5cda4", "pod":"csi-node-driver-92ktb", "timestamp":"2025-05-17 01:05:57.894883915 +0000 UTC"}, Hostname:"ci-3510.3.7-n-56b9a5cda4", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 01:05:58.161838 env[1453]: 2025-05-17 01:05:57.895 [INFO][4249] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 01:05:58.161838 env[1453]: 2025-05-17 01:05:57.947 [INFO][4249] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 01:05:58.161838 env[1453]: 2025-05-17 01:05:57.948 [INFO][4249] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-56b9a5cda4' May 17 01:05:58.161838 env[1453]: 2025-05-17 01:05:57.972 [INFO][4249] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.648a93c6516a9d3eb426cba128b94b02782242e59967d9901c54a4cc92744d12" host="ci-3510.3.7-n-56b9a5cda4" May 17 01:05:58.161838 env[1453]: 2025-05-17 01:05:58.037 [INFO][4249] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.7-n-56b9a5cda4" May 17 01:05:58.161838 env[1453]: 2025-05-17 01:05:58.070 [INFO][4249] ipam/ipam.go 511: Trying affinity for 192.168.67.128/26 host="ci-3510.3.7-n-56b9a5cda4" May 17 01:05:58.161838 env[1453]: 2025-05-17 01:05:58.072 [INFO][4249] ipam/ipam.go 158: Attempting to load block cidr=192.168.67.128/26 host="ci-3510.3.7-n-56b9a5cda4" May 17 01:05:58.161838 env[1453]: 2025-05-17 01:05:58.075 [INFO][4249] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.67.128/26 host="ci-3510.3.7-n-56b9a5cda4" May 17 01:05:58.161838 env[1453]: 2025-05-17 01:05:58.075 [INFO][4249] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.67.128/26 handle="k8s-pod-network.648a93c6516a9d3eb426cba128b94b02782242e59967d9901c54a4cc92744d12" host="ci-3510.3.7-n-56b9a5cda4" May 17 01:05:58.161838 env[1453]: 2025-05-17 01:05:58.077 [INFO][4249] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.648a93c6516a9d3eb426cba128b94b02782242e59967d9901c54a4cc92744d12 May 17 01:05:58.161838 env[1453]: 2025-05-17 01:05:58.095 [INFO][4249] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.67.128/26 handle="k8s-pod-network.648a93c6516a9d3eb426cba128b94b02782242e59967d9901c54a4cc92744d12" host="ci-3510.3.7-n-56b9a5cda4" May 17 01:05:58.161838 env[1453]: 2025-05-17 01:05:58.107 [INFO][4249] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.67.134/26] block=192.168.67.128/26 handle="k8s-pod-network.648a93c6516a9d3eb426cba128b94b02782242e59967d9901c54a4cc92744d12" host="ci-3510.3.7-n-56b9a5cda4" May 17 01:05:58.161838 env[1453]: 2025-05-17 01:05:58.107 [INFO][4249] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.67.134/26] handle="k8s-pod-network.648a93c6516a9d3eb426cba128b94b02782242e59967d9901c54a4cc92744d12" host="ci-3510.3.7-n-56b9a5cda4" May 17 01:05:58.161838 env[1453]: 2025-05-17 01:05:58.107 [INFO][4249] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 01:05:58.161838 env[1453]: 2025-05-17 01:05:58.107 [INFO][4249] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.67.134/26] IPv6=[] ContainerID="648a93c6516a9d3eb426cba128b94b02782242e59967d9901c54a4cc92744d12" HandleID="k8s-pod-network.648a93c6516a9d3eb426cba128b94b02782242e59967d9901c54a4cc92744d12" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-csi--node--driver--92ktb-eth0" May 17 01:05:58.162613 env[1453]: 2025-05-17 01:05:58.109 [INFO][4212] cni-plugin/k8s.go 418: Populated endpoint ContainerID="648a93c6516a9d3eb426cba128b94b02782242e59967d9901c54a4cc92744d12" Namespace="calico-system" Pod="csi-node-driver-92ktb" WorkloadEndpoint="ci--3510.3.7--n--56b9a5cda4-k8s-csi--node--driver--92ktb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--56b9a5cda4-k8s-csi--node--driver--92ktb-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"4d21f64d-bc3c-4fa5-8ad3-4aed6c59a824", ResourceVersion:"976", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 1, 5, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-56b9a5cda4", ContainerID:"", Pod:"csi-node-driver-92ktb", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.67.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali99d1626794e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 01:05:58.162613 env[1453]: 2025-05-17 01:05:58.110 [INFO][4212] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.67.134/32] ContainerID="648a93c6516a9d3eb426cba128b94b02782242e59967d9901c54a4cc92744d12" Namespace="calico-system" Pod="csi-node-driver-92ktb" WorkloadEndpoint="ci--3510.3.7--n--56b9a5cda4-k8s-csi--node--driver--92ktb-eth0" May 17 01:05:58.162613 env[1453]: 2025-05-17 01:05:58.110 [INFO][4212] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali99d1626794e ContainerID="648a93c6516a9d3eb426cba128b94b02782242e59967d9901c54a4cc92744d12" Namespace="calico-system" Pod="csi-node-driver-92ktb" WorkloadEndpoint="ci--3510.3.7--n--56b9a5cda4-k8s-csi--node--driver--92ktb-eth0" May 17 01:05:58.162613 env[1453]: 2025-05-17 01:05:58.135 [INFO][4212] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="648a93c6516a9d3eb426cba128b94b02782242e59967d9901c54a4cc92744d12" Namespace="calico-system" Pod="csi-node-driver-92ktb" WorkloadEndpoint="ci--3510.3.7--n--56b9a5cda4-k8s-csi--node--driver--92ktb-eth0" May 17 01:05:58.162613 env[1453]: 2025-05-17 01:05:58.138 [INFO][4212] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="648a93c6516a9d3eb426cba128b94b02782242e59967d9901c54a4cc92744d12" Namespace="calico-system" Pod="csi-node-driver-92ktb" WorkloadEndpoint="ci--3510.3.7--n--56b9a5cda4-k8s-csi--node--driver--92ktb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--56b9a5cda4-k8s-csi--node--driver--92ktb-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"4d21f64d-bc3c-4fa5-8ad3-4aed6c59a824", ResourceVersion:"976", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 1, 5, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-56b9a5cda4", ContainerID:"648a93c6516a9d3eb426cba128b94b02782242e59967d9901c54a4cc92744d12", Pod:"csi-node-driver-92ktb", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.67.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali99d1626794e", MAC:"1a:a2:86:82:ff:15", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 01:05:58.162613 env[1453]: 2025-05-17 01:05:58.156 [INFO][4212] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="648a93c6516a9d3eb426cba128b94b02782242e59967d9901c54a4cc92744d12" Namespace="calico-system" Pod="csi-node-driver-92ktb" WorkloadEndpoint="ci--3510.3.7--n--56b9a5cda4-k8s-csi--node--driver--92ktb-eth0" May 17 01:05:58.163000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.163000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.163000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.163000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.163000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.164000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.164000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.164000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.164000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.164000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.164000 audit: BPF prog-id=172 op=LOAD May 17 01:05:58.166000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.166000 audit[4324]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4308 pid=4324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:58.166000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535623837643230383130663632623932326633353534383665333666 May 17 01:05:58.166000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.166000 audit[4324]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4308 pid=4324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:58.166000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535623837643230383130663632623932326633353534383665333666 May 17 01:05:58.166000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.166000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.166000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.166000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.166000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.166000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.166000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.166000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.166000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.166000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.166000 audit: BPF prog-id=173 op=LOAD May 17 01:05:58.166000 audit[4324]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4308 pid=4324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:58.166000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535623837643230383130663632623932326633353534383665333666 May 17 01:05:58.166000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.166000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.166000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.166000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.166000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.166000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.166000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.166000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.166000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.166000 audit: BPF prog-id=174 op=LOAD May 17 01:05:58.166000 audit[4324]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4308 pid=4324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:58.166000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535623837643230383130663632623932326633353534383665333666 May 17 01:05:58.167000 audit: BPF prog-id=174 op=UNLOAD May 17 01:05:58.167000 audit: BPF prog-id=173 op=UNLOAD May 17 01:05:58.167000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.167000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.167000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.167000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.167000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.167000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.167000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.167000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.167000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.167000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.167000 audit: BPF prog-id=175 op=LOAD May 17 01:05:58.167000 audit[4324]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4308 pid=4324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:58.167000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535623837643230383130663632623932326633353534383665333666 May 17 01:05:58.177745 systemd[1]: Started cri-containerd-069385844eb799407dcf6e76a53053e1fd21e444114d019586abe772844ce150.scope. May 17 01:05:58.185353 env[1453]: time="2025-05-17T01:05:58.185300807Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-f6596879f-8tb74,Uid:cbd568ae-4e42-43d9-8aad-56b7909a49ad,Namespace:calico-system,Attempt:1,} returns sandbox id \"44353239d42685c072fdcb8fa672e01b108759db2637eb09642f287487464d04\"" May 17 01:05:58.202117 env[1453]: time="2025-05-17T01:05:58.202062840Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.0\"" May 17 01:05:58.209000 audit[4402]: NETFILTER_CFG table=filter:120 family=2 entries=58 op=nft_register_chain pid=4402 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 01:05:58.209000 audit[4402]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=27180 a0=3 a1=fffffb08e870 a2=0 a3=ffff86b07fa8 items=0 ppid=3752 pid=4402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:58.209000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 01:05:58.218582 env[1453]: time="2025-05-17T01:05:58.218511910Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 01:05:58.218694 env[1453]: time="2025-05-17T01:05:58.218591071Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 01:05:58.218694 env[1453]: time="2025-05-17T01:05:58.218623872Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 01:05:58.218808 env[1453]: time="2025-05-17T01:05:58.218769593Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/648a93c6516a9d3eb426cba128b94b02782242e59967d9901c54a4cc92744d12 pid=4408 runtime=io.containerd.runc.v2 May 17 01:05:58.222036 env[1453]: time="2025-05-17T01:05:58.221868549Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7bb465f89b-nhrhw,Uid:70b64262-db16-4665-bc8a-83aa2db3b33c,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"e5b87d20810f62b922f355486e36fd392536e7386a21dac4aa825af6fa3957f3\"" May 17 01:05:58.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.230000 audit: BPF prog-id=176 op=LOAD May 17 01:05:58.231000 audit[4360]: AVC avc: denied { bpf } for pid=4360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.231000 audit[4360]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014db38 a2=10 a3=0 items=0 ppid=4344 pid=4360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:58.231000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036393338353834346562373939343037646366366537366135333035 May 17 01:05:58.232000 audit[4360]: AVC avc: denied { perfmon } for pid=4360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.232000 audit[4360]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=4344 pid=4360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:58.232000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036393338353834346562373939343037646366366537366135333035 May 17 01:05:58.232000 audit[4360]: AVC avc: denied { bpf } for pid=4360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.232000 audit[4360]: AVC avc: denied { bpf } for pid=4360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.232000 audit[4360]: AVC avc: denied { bpf } for pid=4360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.232000 audit[4360]: AVC avc: denied { perfmon } for pid=4360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.232000 audit[4360]: AVC avc: denied { perfmon } for pid=4360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.232000 audit[4360]: AVC avc: denied { perfmon } for pid=4360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.232000 audit[4360]: AVC avc: denied { perfmon } for pid=4360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.232000 audit[4360]: AVC avc: denied { perfmon } for pid=4360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.232000 audit[4360]: AVC avc: denied { bpf } for pid=4360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.232000 audit[4360]: AVC avc: denied { bpf } for pid=4360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.232000 audit: BPF prog-id=177 op=LOAD May 17 01:05:58.232000 audit[4360]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=4344 pid=4360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:58.232000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036393338353834346562373939343037646366366537366135333035 May 17 01:05:58.233000 audit[4360]: AVC avc: denied { bpf } for pid=4360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.233000 audit[4360]: AVC avc: denied { bpf } for pid=4360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.233000 audit[4360]: AVC avc: denied { perfmon } for pid=4360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.233000 audit[4360]: AVC avc: denied { perfmon } for pid=4360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.233000 audit[4360]: AVC avc: denied { perfmon } for pid=4360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.233000 audit[4360]: AVC avc: denied { perfmon } for pid=4360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.233000 audit[4360]: AVC avc: denied { perfmon } for pid=4360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.233000 audit[4360]: AVC avc: denied { bpf } for pid=4360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.233000 audit[4360]: AVC avc: denied { bpf } for pid=4360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.233000 audit: BPF prog-id=178 op=LOAD May 17 01:05:58.233000 audit[4360]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=4344 pid=4360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:58.233000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036393338353834346562373939343037646366366537366135333035 May 17 01:05:58.234000 audit: BPF prog-id=178 op=UNLOAD May 17 01:05:58.234000 audit: BPF prog-id=177 op=UNLOAD May 17 01:05:58.234000 audit[4360]: AVC avc: denied { bpf } for pid=4360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.234000 audit[4360]: AVC avc: denied { bpf } for pid=4360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.234000 audit[4360]: AVC avc: denied { bpf } for pid=4360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.234000 audit[4360]: AVC avc: denied { perfmon } for pid=4360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.234000 audit[4360]: AVC avc: denied { perfmon } for pid=4360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.234000 audit[4360]: AVC avc: denied { perfmon } for pid=4360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.234000 audit[4360]: AVC avc: denied { perfmon } for pid=4360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.234000 audit[4360]: AVC avc: denied { perfmon } for pid=4360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.234000 audit[4360]: AVC avc: denied { bpf } for pid=4360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.234000 audit[4360]: AVC avc: denied { bpf } for pid=4360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.234000 audit: BPF prog-id=179 op=LOAD May 17 01:05:58.234000 audit[4360]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=4344 pid=4360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:58.234000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036393338353834346562373939343037646366366537366135333035 May 17 01:05:58.243406 systemd[1]: Started cri-containerd-648a93c6516a9d3eb426cba128b94b02782242e59967d9901c54a4cc92744d12.scope. May 17 01:05:58.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.266000 audit: BPF prog-id=180 op=LOAD May 17 01:05:58.267000 audit[4423]: AVC avc: denied { bpf } for pid=4423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.267000 audit[4423]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4408 pid=4423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:58.267000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634386139336336353136613964336562343236636261313238623934 May 17 01:05:58.267000 audit[4423]: AVC avc: denied { perfmon } for pid=4423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.267000 audit[4423]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4408 pid=4423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:58.267000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634386139336336353136613964336562343236636261313238623934 May 17 01:05:58.267000 audit[4423]: AVC avc: denied { bpf } for pid=4423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.267000 audit[4423]: AVC avc: denied { bpf } for pid=4423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.267000 audit[4423]: AVC avc: denied { bpf } for pid=4423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.267000 audit[4423]: AVC avc: denied { perfmon } for pid=4423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.267000 audit[4423]: AVC avc: denied { perfmon } for pid=4423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.267000 audit[4423]: AVC avc: denied { perfmon } for pid=4423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.267000 audit[4423]: AVC avc: denied { perfmon } for pid=4423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.267000 audit[4423]: AVC avc: denied { perfmon } for pid=4423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.267000 audit[4423]: AVC avc: denied { bpf } for pid=4423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.267000 audit[4423]: AVC avc: denied { bpf } for pid=4423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.267000 audit: BPF prog-id=181 op=LOAD May 17 01:05:58.267000 audit[4423]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4408 pid=4423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:58.267000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634386139336336353136613964336562343236636261313238623934 May 17 01:05:58.268000 audit[4423]: AVC avc: denied { bpf } for pid=4423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.268000 audit[4423]: AVC avc: denied { bpf } for pid=4423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.268000 audit[4423]: AVC avc: denied { perfmon } for pid=4423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.268000 audit[4423]: AVC avc: denied { perfmon } for pid=4423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.268000 audit[4423]: AVC avc: denied { perfmon } for pid=4423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.268000 audit[4423]: AVC avc: denied { perfmon } for pid=4423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.268000 audit[4423]: AVC avc: denied { perfmon } for pid=4423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.268000 audit[4423]: AVC avc: denied { bpf } for pid=4423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.268000 audit[4423]: AVC avc: denied { bpf } for pid=4423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.268000 audit: BPF prog-id=182 op=LOAD May 17 01:05:58.268000 audit[4423]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4408 pid=4423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:58.268000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634386139336336353136613964336562343236636261313238623934 May 17 01:05:58.268000 audit: BPF prog-id=182 op=UNLOAD May 17 01:05:58.268000 audit: BPF prog-id=181 op=UNLOAD May 17 01:05:58.268000 audit[4423]: AVC avc: denied { bpf } for pid=4423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.268000 audit[4423]: AVC avc: denied { bpf } for pid=4423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.268000 audit[4423]: AVC avc: denied { bpf } for pid=4423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.268000 audit[4423]: AVC avc: denied { perfmon } for pid=4423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.268000 audit[4423]: AVC avc: denied { perfmon } for pid=4423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.268000 audit[4423]: AVC avc: denied { perfmon } for pid=4423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.268000 audit[4423]: AVC avc: denied { perfmon } for pid=4423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.268000 audit[4423]: AVC avc: denied { perfmon } for pid=4423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.268000 audit[4423]: AVC avc: denied { bpf } for pid=4423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.268000 audit[4423]: AVC avc: denied { bpf } for pid=4423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:58.268000 audit: BPF prog-id=183 op=LOAD May 17 01:05:58.268000 audit[4423]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4408 pid=4423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:58.268000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634386139336336353136613964336562343236636261313238623934 May 17 01:05:58.272063 env[1453]: time="2025-05-17T01:05:58.272008809Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7bb465f89b-fvt58,Uid:76c2d8d7-3942-4d0e-bf68-64e138374d48,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"069385844eb799407dcf6e76a53053e1fd21e444114d019586abe772844ce150\"" May 17 01:05:58.285127 env[1453]: time="2025-05-17T01:05:58.285087480Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-92ktb,Uid:4d21f64d-bc3c-4fa5-8ad3-4aed6c59a824,Namespace:calico-system,Attempt:1,} returns sandbox id \"648a93c6516a9d3eb426cba128b94b02782242e59967d9901c54a4cc92744d12\"" May 17 01:05:58.585121 systemd[1]: run-containerd-runc-k8s.io-44353239d42685c072fdcb8fa672e01b108759db2637eb09642f287487464d04-runc.JH0180.mount: Deactivated successfully. May 17 01:05:58.981000 audit[2310]: AVC avc: denied { watch } for pid=2310 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c618,c658 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:05:58.981000 audit[2310]: AVC avc: denied { watch } for pid=2310 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c618,c658 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:05:58.981000 audit[2310]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40020cb860 a2=fc6 a3=0 items=0 ppid=2177 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c618,c658 key=(null) May 17 01:05:58.981000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 01:05:58.981000 audit[2310]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000b6d980 a2=fc6 a3=0 items=0 ppid=2177 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c618,c658 key=(null) May 17 01:05:58.981000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 01:05:59.122008 env[1453]: time="2025-05-17T01:05:59.121967412Z" level=info msg="StopPodSandbox for \"b1d69c6ea57ab5399fb64a7de5f173e1b3eb308ec16c87aac2c83464f92652bb\"" May 17 01:05:59.122843 env[1453]: time="2025-05-17T01:05:59.122151815Z" level=info msg="StopPodSandbox for \"d0fe4236d76d708298feebd63b43b6fd0cf876c07dcb9b984a060d5b0e2fa065\"" May 17 01:05:59.209191 systemd-networkd[1616]: cali2c9d54d19d0: Gained IPv6LL May 17 01:05:59.227110 env[1453]: 2025-05-17 01:05:59.182 [INFO][4474] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="d0fe4236d76d708298feebd63b43b6fd0cf876c07dcb9b984a060d5b0e2fa065" May 17 01:05:59.227110 env[1453]: 2025-05-17 01:05:59.182 [INFO][4474] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="d0fe4236d76d708298feebd63b43b6fd0cf876c07dcb9b984a060d5b0e2fa065" iface="eth0" netns="/var/run/netns/cni-189dc6e3-c8d7-9081-a91c-b59629fda274" May 17 01:05:59.227110 env[1453]: 2025-05-17 01:05:59.183 [INFO][4474] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="d0fe4236d76d708298feebd63b43b6fd0cf876c07dcb9b984a060d5b0e2fa065" iface="eth0" netns="/var/run/netns/cni-189dc6e3-c8d7-9081-a91c-b59629fda274" May 17 01:05:59.227110 env[1453]: 2025-05-17 01:05:59.183 [INFO][4474] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="d0fe4236d76d708298feebd63b43b6fd0cf876c07dcb9b984a060d5b0e2fa065" iface="eth0" netns="/var/run/netns/cni-189dc6e3-c8d7-9081-a91c-b59629fda274" May 17 01:05:59.227110 env[1453]: 2025-05-17 01:05:59.183 [INFO][4474] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="d0fe4236d76d708298feebd63b43b6fd0cf876c07dcb9b984a060d5b0e2fa065" May 17 01:05:59.227110 env[1453]: 2025-05-17 01:05:59.183 [INFO][4474] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d0fe4236d76d708298feebd63b43b6fd0cf876c07dcb9b984a060d5b0e2fa065" May 17 01:05:59.227110 env[1453]: 2025-05-17 01:05:59.211 [INFO][4486] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d0fe4236d76d708298feebd63b43b6fd0cf876c07dcb9b984a060d5b0e2fa065" HandleID="k8s-pod-network.d0fe4236d76d708298feebd63b43b6fd0cf876c07dcb9b984a060d5b0e2fa065" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-coredns--668d6bf9bc--pnnwz-eth0" May 17 01:05:59.227110 env[1453]: 2025-05-17 01:05:59.212 [INFO][4486] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 01:05:59.227110 env[1453]: 2025-05-17 01:05:59.213 [INFO][4486] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 01:05:59.227110 env[1453]: 2025-05-17 01:05:59.223 [WARNING][4486] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d0fe4236d76d708298feebd63b43b6fd0cf876c07dcb9b984a060d5b0e2fa065" HandleID="k8s-pod-network.d0fe4236d76d708298feebd63b43b6fd0cf876c07dcb9b984a060d5b0e2fa065" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-coredns--668d6bf9bc--pnnwz-eth0" May 17 01:05:59.227110 env[1453]: 2025-05-17 01:05:59.223 [INFO][4486] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d0fe4236d76d708298feebd63b43b6fd0cf876c07dcb9b984a060d5b0e2fa065" HandleID="k8s-pod-network.d0fe4236d76d708298feebd63b43b6fd0cf876c07dcb9b984a060d5b0e2fa065" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-coredns--668d6bf9bc--pnnwz-eth0" May 17 01:05:59.227110 env[1453]: 2025-05-17 01:05:59.224 [INFO][4486] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 01:05:59.227110 env[1453]: 2025-05-17 01:05:59.225 [INFO][4474] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="d0fe4236d76d708298feebd63b43b6fd0cf876c07dcb9b984a060d5b0e2fa065" May 17 01:05:59.233152 env[1453]: time="2025-05-17T01:05:59.231082897Z" level=info msg="TearDown network for sandbox \"d0fe4236d76d708298feebd63b43b6fd0cf876c07dcb9b984a060d5b0e2fa065\" successfully" May 17 01:05:59.233152 env[1453]: time="2025-05-17T01:05:59.231132578Z" level=info msg="StopPodSandbox for \"d0fe4236d76d708298feebd63b43b6fd0cf876c07dcb9b984a060d5b0e2fa065\" returns successfully" May 17 01:05:59.232546 systemd[1]: run-netns-cni\x2d189dc6e3\x2dc8d7\x2d9081\x2da91c\x2db59629fda274.mount: Deactivated successfully. May 17 01:05:59.234717 env[1453]: time="2025-05-17T01:05:59.234673618Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-pnnwz,Uid:c9fcf012-c9eb-4271-ada6-7659bcab9229,Namespace:kube-system,Attempt:1,}" May 17 01:05:59.262995 env[1453]: 2025-05-17 01:05:59.200 [INFO][4473] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="b1d69c6ea57ab5399fb64a7de5f173e1b3eb308ec16c87aac2c83464f92652bb" May 17 01:05:59.262995 env[1453]: 2025-05-17 01:05:59.200 [INFO][4473] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="b1d69c6ea57ab5399fb64a7de5f173e1b3eb308ec16c87aac2c83464f92652bb" iface="eth0" netns="/var/run/netns/cni-81ba6172-bc84-d8f4-7310-aedea0294503" May 17 01:05:59.262995 env[1453]: 2025-05-17 01:05:59.201 [INFO][4473] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="b1d69c6ea57ab5399fb64a7de5f173e1b3eb308ec16c87aac2c83464f92652bb" iface="eth0" netns="/var/run/netns/cni-81ba6172-bc84-d8f4-7310-aedea0294503" May 17 01:05:59.262995 env[1453]: 2025-05-17 01:05:59.201 [INFO][4473] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="b1d69c6ea57ab5399fb64a7de5f173e1b3eb308ec16c87aac2c83464f92652bb" iface="eth0" netns="/var/run/netns/cni-81ba6172-bc84-d8f4-7310-aedea0294503" May 17 01:05:59.262995 env[1453]: 2025-05-17 01:05:59.201 [INFO][4473] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="b1d69c6ea57ab5399fb64a7de5f173e1b3eb308ec16c87aac2c83464f92652bb" May 17 01:05:59.262995 env[1453]: 2025-05-17 01:05:59.201 [INFO][4473] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b1d69c6ea57ab5399fb64a7de5f173e1b3eb308ec16c87aac2c83464f92652bb" May 17 01:05:59.262995 env[1453]: 2025-05-17 01:05:59.249 [INFO][4491] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b1d69c6ea57ab5399fb64a7de5f173e1b3eb308ec16c87aac2c83464f92652bb" HandleID="k8s-pod-network.b1d69c6ea57ab5399fb64a7de5f173e1b3eb308ec16c87aac2c83464f92652bb" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-goldmane--78d55f7ddc--5zbrn-eth0" May 17 01:05:59.262995 env[1453]: 2025-05-17 01:05:59.250 [INFO][4491] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 01:05:59.262995 env[1453]: 2025-05-17 01:05:59.250 [INFO][4491] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 01:05:59.262995 env[1453]: 2025-05-17 01:05:59.258 [WARNING][4491] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b1d69c6ea57ab5399fb64a7de5f173e1b3eb308ec16c87aac2c83464f92652bb" HandleID="k8s-pod-network.b1d69c6ea57ab5399fb64a7de5f173e1b3eb308ec16c87aac2c83464f92652bb" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-goldmane--78d55f7ddc--5zbrn-eth0" May 17 01:05:59.262995 env[1453]: 2025-05-17 01:05:59.258 [INFO][4491] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b1d69c6ea57ab5399fb64a7de5f173e1b3eb308ec16c87aac2c83464f92652bb" HandleID="k8s-pod-network.b1d69c6ea57ab5399fb64a7de5f173e1b3eb308ec16c87aac2c83464f92652bb" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-goldmane--78d55f7ddc--5zbrn-eth0" May 17 01:05:59.262995 env[1453]: 2025-05-17 01:05:59.260 [INFO][4491] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 01:05:59.262995 env[1453]: 2025-05-17 01:05:59.261 [INFO][4473] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="b1d69c6ea57ab5399fb64a7de5f173e1b3eb308ec16c87aac2c83464f92652bb" May 17 01:05:59.263627 env[1453]: time="2025-05-17T01:05:59.263586588Z" level=info msg="TearDown network for sandbox \"b1d69c6ea57ab5399fb64a7de5f173e1b3eb308ec16c87aac2c83464f92652bb\" successfully" May 17 01:05:59.263708 env[1453]: time="2025-05-17T01:05:59.263692269Z" level=info msg="StopPodSandbox for \"b1d69c6ea57ab5399fb64a7de5f173e1b3eb308ec16c87aac2c83464f92652bb\" returns successfully" May 17 01:05:59.264531 env[1453]: time="2025-05-17T01:05:59.264490759Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-78d55f7ddc-5zbrn,Uid:03203f23-8aa4-41b1-ba45-7088ffc7359f,Namespace:calico-system,Attempt:1,}" May 17 01:05:59.268270 systemd[1]: run-netns-cni\x2d81ba6172\x2dbc84\x2dd8f4\x2d7310\x2daedea0294503.mount: Deactivated successfully. May 17 01:05:59.401084 systemd-networkd[1616]: cali9483adea922: Gained IPv6LL May 17 01:05:59.420594 systemd-networkd[1616]: calid3c62e0446a: Link UP May 17 01:05:59.434220 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 01:05:59.434372 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid3c62e0446a: link becomes ready May 17 01:05:59.434640 systemd-networkd[1616]: calid3c62e0446a: Gained carrier May 17 01:05:59.455771 env[1453]: 2025-05-17 01:05:59.315 [INFO][4499] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--56b9a5cda4-k8s-coredns--668d6bf9bc--pnnwz-eth0 coredns-668d6bf9bc- kube-system c9fcf012-c9eb-4271-ada6-7659bcab9229 1006 0 2025-05-17 01:05:09 +0000 UTC map[k8s-app:kube-dns pod-template-hash:668d6bf9bc projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.7-n-56b9a5cda4 coredns-668d6bf9bc-pnnwz eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calid3c62e0446a [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] [] }} ContainerID="e138171e89441895008522bfb009017491ccc346548ca94acae592cb046d773a" Namespace="kube-system" Pod="coredns-668d6bf9bc-pnnwz" WorkloadEndpoint="ci--3510.3.7--n--56b9a5cda4-k8s-coredns--668d6bf9bc--pnnwz-" May 17 01:05:59.455771 env[1453]: 2025-05-17 01:05:59.315 [INFO][4499] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="e138171e89441895008522bfb009017491ccc346548ca94acae592cb046d773a" Namespace="kube-system" Pod="coredns-668d6bf9bc-pnnwz" WorkloadEndpoint="ci--3510.3.7--n--56b9a5cda4-k8s-coredns--668d6bf9bc--pnnwz-eth0" May 17 01:05:59.455771 env[1453]: 2025-05-17 01:05:59.363 [INFO][4519] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e138171e89441895008522bfb009017491ccc346548ca94acae592cb046d773a" HandleID="k8s-pod-network.e138171e89441895008522bfb009017491ccc346548ca94acae592cb046d773a" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-coredns--668d6bf9bc--pnnwz-eth0" May 17 01:05:59.455771 env[1453]: 2025-05-17 01:05:59.364 [INFO][4519] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="e138171e89441895008522bfb009017491ccc346548ca94acae592cb046d773a" HandleID="k8s-pod-network.e138171e89441895008522bfb009017491ccc346548ca94acae592cb046d773a" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-coredns--668d6bf9bc--pnnwz-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002bd020), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.7-n-56b9a5cda4", "pod":"coredns-668d6bf9bc-pnnwz", "timestamp":"2025-05-17 01:05:59.363801892 +0000 UTC"}, Hostname:"ci-3510.3.7-n-56b9a5cda4", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 01:05:59.455771 env[1453]: 2025-05-17 01:05:59.364 [INFO][4519] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 01:05:59.455771 env[1453]: 2025-05-17 01:05:59.364 [INFO][4519] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 01:05:59.455771 env[1453]: 2025-05-17 01:05:59.364 [INFO][4519] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-56b9a5cda4' May 17 01:05:59.455771 env[1453]: 2025-05-17 01:05:59.373 [INFO][4519] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.e138171e89441895008522bfb009017491ccc346548ca94acae592cb046d773a" host="ci-3510.3.7-n-56b9a5cda4" May 17 01:05:59.455771 env[1453]: 2025-05-17 01:05:59.376 [INFO][4519] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.7-n-56b9a5cda4" May 17 01:05:59.455771 env[1453]: 2025-05-17 01:05:59.380 [INFO][4519] ipam/ipam.go 511: Trying affinity for 192.168.67.128/26 host="ci-3510.3.7-n-56b9a5cda4" May 17 01:05:59.455771 env[1453]: 2025-05-17 01:05:59.382 [INFO][4519] ipam/ipam.go 158: Attempting to load block cidr=192.168.67.128/26 host="ci-3510.3.7-n-56b9a5cda4" May 17 01:05:59.455771 env[1453]: 2025-05-17 01:05:59.384 [INFO][4519] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.67.128/26 host="ci-3510.3.7-n-56b9a5cda4" May 17 01:05:59.455771 env[1453]: 2025-05-17 01:05:59.384 [INFO][4519] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.67.128/26 handle="k8s-pod-network.e138171e89441895008522bfb009017491ccc346548ca94acae592cb046d773a" host="ci-3510.3.7-n-56b9a5cda4" May 17 01:05:59.455771 env[1453]: 2025-05-17 01:05:59.387 [INFO][4519] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.e138171e89441895008522bfb009017491ccc346548ca94acae592cb046d773a May 17 01:05:59.455771 env[1453]: 2025-05-17 01:05:59.393 [INFO][4519] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.67.128/26 handle="k8s-pod-network.e138171e89441895008522bfb009017491ccc346548ca94acae592cb046d773a" host="ci-3510.3.7-n-56b9a5cda4" May 17 01:05:59.455771 env[1453]: 2025-05-17 01:05:59.404 [INFO][4519] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.67.135/26] block=192.168.67.128/26 handle="k8s-pod-network.e138171e89441895008522bfb009017491ccc346548ca94acae592cb046d773a" host="ci-3510.3.7-n-56b9a5cda4" May 17 01:05:59.455771 env[1453]: 2025-05-17 01:05:59.404 [INFO][4519] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.67.135/26] handle="k8s-pod-network.e138171e89441895008522bfb009017491ccc346548ca94acae592cb046d773a" host="ci-3510.3.7-n-56b9a5cda4" May 17 01:05:59.455771 env[1453]: 2025-05-17 01:05:59.404 [INFO][4519] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 01:05:59.455771 env[1453]: 2025-05-17 01:05:59.404 [INFO][4519] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.67.135/26] IPv6=[] ContainerID="e138171e89441895008522bfb009017491ccc346548ca94acae592cb046d773a" HandleID="k8s-pod-network.e138171e89441895008522bfb009017491ccc346548ca94acae592cb046d773a" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-coredns--668d6bf9bc--pnnwz-eth0" May 17 01:05:59.456496 env[1453]: 2025-05-17 01:05:59.406 [INFO][4499] cni-plugin/k8s.go 418: Populated endpoint ContainerID="e138171e89441895008522bfb009017491ccc346548ca94acae592cb046d773a" Namespace="kube-system" Pod="coredns-668d6bf9bc-pnnwz" WorkloadEndpoint="ci--3510.3.7--n--56b9a5cda4-k8s-coredns--668d6bf9bc--pnnwz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--56b9a5cda4-k8s-coredns--668d6bf9bc--pnnwz-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"c9fcf012-c9eb-4271-ada6-7659bcab9229", ResourceVersion:"1006", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 1, 5, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-56b9a5cda4", ContainerID:"", Pod:"coredns-668d6bf9bc-pnnwz", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.67.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid3c62e0446a", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 01:05:59.456496 env[1453]: 2025-05-17 01:05:59.406 [INFO][4499] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.67.135/32] ContainerID="e138171e89441895008522bfb009017491ccc346548ca94acae592cb046d773a" Namespace="kube-system" Pod="coredns-668d6bf9bc-pnnwz" WorkloadEndpoint="ci--3510.3.7--n--56b9a5cda4-k8s-coredns--668d6bf9bc--pnnwz-eth0" May 17 01:05:59.456496 env[1453]: 2025-05-17 01:05:59.406 [INFO][4499] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calid3c62e0446a ContainerID="e138171e89441895008522bfb009017491ccc346548ca94acae592cb046d773a" Namespace="kube-system" Pod="coredns-668d6bf9bc-pnnwz" WorkloadEndpoint="ci--3510.3.7--n--56b9a5cda4-k8s-coredns--668d6bf9bc--pnnwz-eth0" May 17 01:05:59.456496 env[1453]: 2025-05-17 01:05:59.435 [INFO][4499] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="e138171e89441895008522bfb009017491ccc346548ca94acae592cb046d773a" Namespace="kube-system" Pod="coredns-668d6bf9bc-pnnwz" WorkloadEndpoint="ci--3510.3.7--n--56b9a5cda4-k8s-coredns--668d6bf9bc--pnnwz-eth0" May 17 01:05:59.456496 env[1453]: 2025-05-17 01:05:59.436 [INFO][4499] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="e138171e89441895008522bfb009017491ccc346548ca94acae592cb046d773a" Namespace="kube-system" Pod="coredns-668d6bf9bc-pnnwz" WorkloadEndpoint="ci--3510.3.7--n--56b9a5cda4-k8s-coredns--668d6bf9bc--pnnwz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--56b9a5cda4-k8s-coredns--668d6bf9bc--pnnwz-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"c9fcf012-c9eb-4271-ada6-7659bcab9229", ResourceVersion:"1006", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 1, 5, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-56b9a5cda4", ContainerID:"e138171e89441895008522bfb009017491ccc346548ca94acae592cb046d773a", Pod:"coredns-668d6bf9bc-pnnwz", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.67.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid3c62e0446a", MAC:"76:97:48:d3:1b:76", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 01:05:59.456496 env[1453]: 2025-05-17 01:05:59.452 [INFO][4499] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="e138171e89441895008522bfb009017491ccc346548ca94acae592cb046d773a" Namespace="kube-system" Pod="coredns-668d6bf9bc-pnnwz" WorkloadEndpoint="ci--3510.3.7--n--56b9a5cda4-k8s-coredns--668d6bf9bc--pnnwz-eth0" May 17 01:05:59.460000 audit[2252]: AVC avc: denied { watch } for pid=2252 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c429,c763 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:05:59.460000 audit[2252]: AVC avc: denied { watch } for pid=2252 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c429,c763 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:05:59.460000 audit[2252]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=4009c94e70 a2=fc6 a3=0 items=0 ppid=2126 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c429,c763 key=(null) May 17 01:05:59.460000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 01:05:59.460000 audit[2252]: AVC avc: denied { watch } for pid=2252 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c429,c763 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:05:59.460000 audit[2252]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=4009aaad00 a2=fc6 a3=0 items=0 ppid=2126 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c429,c763 key=(null) May 17 01:05:59.460000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 01:05:59.460000 audit[2252]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6e a1=4009d20d80 a2=fc6 a3=0 items=0 ppid=2126 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c429,c763 key=(null) May 17 01:05:59.460000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 01:05:59.466185 systemd-networkd[1616]: cali6e19ad380a9: Gained IPv6LL May 17 01:05:59.468000 audit[2252]: AVC avc: denied { watch } for pid=2252 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520987 scontext=system_u:system_r:svirt_lxc_net_t:s0:c429,c763 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:05:59.468000 audit[2252]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6e a1=4009c94ff0 a2=fc6 a3=0 items=0 ppid=2126 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c429,c763 key=(null) May 17 01:05:59.468000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 01:05:59.482498 env[1453]: time="2025-05-17T01:05:59.482421405Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 01:05:59.482631 env[1453]: time="2025-05-17T01:05:59.482500086Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 01:05:59.482631 env[1453]: time="2025-05-17T01:05:59.482579487Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 01:05:59.482739 env[1453]: time="2025-05-17T01:05:59.482702768Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e138171e89441895008522bfb009017491ccc346548ca94acae592cb046d773a pid=4551 runtime=io.containerd.runc.v2 May 17 01:05:59.485000 audit[2252]: AVC avc: denied { watch } for pid=2252 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c429,c763 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:05:59.485000 audit[2252]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6e a1=4009aab040 a2=fc6 a3=0 items=0 ppid=2126 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c429,c763 key=(null) May 17 01:05:59.485000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 01:05:59.488000 audit[2252]: AVC avc: denied { watch } for pid=2252 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c429,c763 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:05:59.488000 audit[2252]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6e a1=4009c953b0 a2=fc6 a3=0 items=0 ppid=2126 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c429,c763 key=(null) May 17 01:05:59.488000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 01:05:59.509000 audit[4560]: NETFILTER_CFG table=filter:121 family=2 entries=48 op=nft_register_chain pid=4560 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 01:05:59.509000 audit[4560]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=22704 a0=3 a1=ffffeef29b80 a2=0 a3=ffff80194fa8 items=0 ppid=3752 pid=4560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:59.509000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 01:05:59.514590 systemd[1]: Started cri-containerd-e138171e89441895008522bfb009017491ccc346548ca94acae592cb046d773a.scope. May 17 01:05:59.540000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.540000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.540000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.540000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.540000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.540000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.540000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.540000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.540000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.541000 audit: BPF prog-id=184 op=LOAD May 17 01:05:59.542000 audit[4563]: AVC avc: denied { bpf } for pid=4563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.542000 audit[4563]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400019db38 a2=10 a3=0 items=0 ppid=4551 pid=4563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:59.542000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531333831373165383934343138393530303835323262666230303930 May 17 01:05:59.542000 audit[4563]: AVC avc: denied { perfmon } for pid=4563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.542000 audit[4563]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400019d5a0 a2=3c a3=0 items=0 ppid=4551 pid=4563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:59.542000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531333831373165383934343138393530303835323262666230303930 May 17 01:05:59.542000 audit[4563]: AVC avc: denied { bpf } for pid=4563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.542000 audit[4563]: AVC avc: denied { bpf } for pid=4563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.546372 systemd-networkd[1616]: cali6b8f0eb970f: Link UP May 17 01:05:59.542000 audit[4563]: AVC avc: denied { bpf } for pid=4563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.542000 audit[4563]: AVC avc: denied { perfmon } for pid=4563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.542000 audit[4563]: AVC avc: denied { perfmon } for pid=4563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.542000 audit[4563]: AVC avc: denied { perfmon } for pid=4563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.542000 audit[4563]: AVC avc: denied { perfmon } for pid=4563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.542000 audit[4563]: AVC avc: denied { perfmon } for pid=4563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.542000 audit[4563]: AVC avc: denied { bpf } for pid=4563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.560383 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali6b8f0eb970f: link becomes ready May 17 01:05:59.542000 audit[4563]: AVC avc: denied { bpf } for pid=4563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.542000 audit: BPF prog-id=185 op=LOAD May 17 01:05:59.542000 audit[4563]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400019d8e0 a2=78 a3=0 items=0 ppid=4551 pid=4563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:59.542000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531333831373165383934343138393530303835323262666230303930 May 17 01:05:59.555000 audit[4563]: AVC avc: denied { bpf } for pid=4563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.555000 audit[4563]: AVC avc: denied { bpf } for pid=4563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.555000 audit[4563]: AVC avc: denied { perfmon } for pid=4563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.555000 audit[4563]: AVC avc: denied { perfmon } for pid=4563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.555000 audit[4563]: AVC avc: denied { perfmon } for pid=4563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.555000 audit[4563]: AVC avc: denied { perfmon } for pid=4563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.555000 audit[4563]: AVC avc: denied { perfmon } for pid=4563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.555000 audit[4563]: AVC avc: denied { bpf } for pid=4563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.555000 audit[4563]: AVC avc: denied { bpf } for pid=4563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.555000 audit: BPF prog-id=186 op=LOAD May 17 01:05:59.555000 audit[4563]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400019d670 a2=78 a3=0 items=0 ppid=4551 pid=4563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:59.555000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531333831373165383934343138393530303835323262666230303930 May 17 01:05:59.555000 audit: BPF prog-id=186 op=UNLOAD May 17 01:05:59.555000 audit: BPF prog-id=185 op=UNLOAD May 17 01:05:59.556000 audit[4563]: AVC avc: denied { bpf } for pid=4563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.556000 audit[4563]: AVC avc: denied { bpf } for pid=4563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.556000 audit[4563]: AVC avc: denied { bpf } for pid=4563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.556000 audit[4563]: AVC avc: denied { perfmon } for pid=4563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.556000 audit[4563]: AVC avc: denied { perfmon } for pid=4563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.556000 audit[4563]: AVC avc: denied { perfmon } for pid=4563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.556000 audit[4563]: AVC avc: denied { perfmon } for pid=4563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.556000 audit[4563]: AVC avc: denied { perfmon } for pid=4563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.556000 audit[4563]: AVC avc: denied { bpf } for pid=4563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.556000 audit[4563]: AVC avc: denied { bpf } for pid=4563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.556000 audit: BPF prog-id=187 op=LOAD May 17 01:05:59.556000 audit[4563]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400019db40 a2=78 a3=0 items=0 ppid=4551 pid=4563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:59.556000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531333831373165383934343138393530303835323262666230303930 May 17 01:05:59.560448 systemd-networkd[1616]: cali6b8f0eb970f: Gained carrier May 17 01:05:59.590537 env[1453]: 2025-05-17 01:05:59.356 [INFO][4512] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--56b9a5cda4-k8s-goldmane--78d55f7ddc--5zbrn-eth0 goldmane-78d55f7ddc- calico-system 03203f23-8aa4-41b1-ba45-7088ffc7359f 1007 0 2025-05-17 01:05:30 +0000 UTC map[app.kubernetes.io/name:goldmane k8s-app:goldmane pod-template-hash:78d55f7ddc projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:goldmane] map[] [] [] []} {k8s ci-3510.3.7-n-56b9a5cda4 goldmane-78d55f7ddc-5zbrn eth0 goldmane [] [] [kns.calico-system ksa.calico-system.goldmane] cali6b8f0eb970f [] [] }} ContainerID="e944ffa88e09044e496d3af6cd340515f00e1df8fbef4fe8f47fa51c6a4d0b11" Namespace="calico-system" Pod="goldmane-78d55f7ddc-5zbrn" WorkloadEndpoint="ci--3510.3.7--n--56b9a5cda4-k8s-goldmane--78d55f7ddc--5zbrn-" May 17 01:05:59.590537 env[1453]: 2025-05-17 01:05:59.356 [INFO][4512] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="e944ffa88e09044e496d3af6cd340515f00e1df8fbef4fe8f47fa51c6a4d0b11" Namespace="calico-system" Pod="goldmane-78d55f7ddc-5zbrn" WorkloadEndpoint="ci--3510.3.7--n--56b9a5cda4-k8s-goldmane--78d55f7ddc--5zbrn-eth0" May 17 01:05:59.590537 env[1453]: 2025-05-17 01:05:59.396 [INFO][4531] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e944ffa88e09044e496d3af6cd340515f00e1df8fbef4fe8f47fa51c6a4d0b11" HandleID="k8s-pod-network.e944ffa88e09044e496d3af6cd340515f00e1df8fbef4fe8f47fa51c6a4d0b11" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-goldmane--78d55f7ddc--5zbrn-eth0" May 17 01:05:59.590537 env[1453]: 2025-05-17 01:05:59.396 [INFO][4531] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="e944ffa88e09044e496d3af6cd340515f00e1df8fbef4fe8f47fa51c6a4d0b11" HandleID="k8s-pod-network.e944ffa88e09044e496d3af6cd340515f00e1df8fbef4fe8f47fa51c6a4d0b11" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-goldmane--78d55f7ddc--5zbrn-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002d7020), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.7-n-56b9a5cda4", "pod":"goldmane-78d55f7ddc-5zbrn", "timestamp":"2025-05-17 01:05:59.396604986 +0000 UTC"}, Hostname:"ci-3510.3.7-n-56b9a5cda4", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 01:05:59.590537 env[1453]: 2025-05-17 01:05:59.396 [INFO][4531] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 01:05:59.590537 env[1453]: 2025-05-17 01:05:59.404 [INFO][4531] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 01:05:59.590537 env[1453]: 2025-05-17 01:05:59.405 [INFO][4531] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-56b9a5cda4' May 17 01:05:59.590537 env[1453]: 2025-05-17 01:05:59.475 [INFO][4531] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.e944ffa88e09044e496d3af6cd340515f00e1df8fbef4fe8f47fa51c6a4d0b11" host="ci-3510.3.7-n-56b9a5cda4" May 17 01:05:59.590537 env[1453]: 2025-05-17 01:05:59.484 [INFO][4531] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.7-n-56b9a5cda4" May 17 01:05:59.590537 env[1453]: 2025-05-17 01:05:59.492 [INFO][4531] ipam/ipam.go 511: Trying affinity for 192.168.67.128/26 host="ci-3510.3.7-n-56b9a5cda4" May 17 01:05:59.590537 env[1453]: 2025-05-17 01:05:59.494 [INFO][4531] ipam/ipam.go 158: Attempting to load block cidr=192.168.67.128/26 host="ci-3510.3.7-n-56b9a5cda4" May 17 01:05:59.590537 env[1453]: 2025-05-17 01:05:59.499 [INFO][4531] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.67.128/26 host="ci-3510.3.7-n-56b9a5cda4" May 17 01:05:59.590537 env[1453]: 2025-05-17 01:05:59.499 [INFO][4531] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.67.128/26 handle="k8s-pod-network.e944ffa88e09044e496d3af6cd340515f00e1df8fbef4fe8f47fa51c6a4d0b11" host="ci-3510.3.7-n-56b9a5cda4" May 17 01:05:59.590537 env[1453]: 2025-05-17 01:05:59.501 [INFO][4531] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.e944ffa88e09044e496d3af6cd340515f00e1df8fbef4fe8f47fa51c6a4d0b11 May 17 01:05:59.590537 env[1453]: 2025-05-17 01:05:59.517 [INFO][4531] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.67.128/26 handle="k8s-pod-network.e944ffa88e09044e496d3af6cd340515f00e1df8fbef4fe8f47fa51c6a4d0b11" host="ci-3510.3.7-n-56b9a5cda4" May 17 01:05:59.590537 env[1453]: 2025-05-17 01:05:59.531 [INFO][4531] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.67.136/26] block=192.168.67.128/26 handle="k8s-pod-network.e944ffa88e09044e496d3af6cd340515f00e1df8fbef4fe8f47fa51c6a4d0b11" host="ci-3510.3.7-n-56b9a5cda4" May 17 01:05:59.590537 env[1453]: 2025-05-17 01:05:59.531 [INFO][4531] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.67.136/26] handle="k8s-pod-network.e944ffa88e09044e496d3af6cd340515f00e1df8fbef4fe8f47fa51c6a4d0b11" host="ci-3510.3.7-n-56b9a5cda4" May 17 01:05:59.590537 env[1453]: 2025-05-17 01:05:59.531 [INFO][4531] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 01:05:59.590537 env[1453]: 2025-05-17 01:05:59.531 [INFO][4531] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.67.136/26] IPv6=[] ContainerID="e944ffa88e09044e496d3af6cd340515f00e1df8fbef4fe8f47fa51c6a4d0b11" HandleID="k8s-pod-network.e944ffa88e09044e496d3af6cd340515f00e1df8fbef4fe8f47fa51c6a4d0b11" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-goldmane--78d55f7ddc--5zbrn-eth0" May 17 01:05:59.591220 env[1453]: 2025-05-17 01:05:59.533 [INFO][4512] cni-plugin/k8s.go 418: Populated endpoint ContainerID="e944ffa88e09044e496d3af6cd340515f00e1df8fbef4fe8f47fa51c6a4d0b11" Namespace="calico-system" Pod="goldmane-78d55f7ddc-5zbrn" WorkloadEndpoint="ci--3510.3.7--n--56b9a5cda4-k8s-goldmane--78d55f7ddc--5zbrn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--56b9a5cda4-k8s-goldmane--78d55f7ddc--5zbrn-eth0", GenerateName:"goldmane-78d55f7ddc-", Namespace:"calico-system", SelfLink:"", UID:"03203f23-8aa4-41b1-ba45-7088ffc7359f", ResourceVersion:"1007", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 1, 5, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"78d55f7ddc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-56b9a5cda4", ContainerID:"", Pod:"goldmane-78d55f7ddc-5zbrn", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.67.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali6b8f0eb970f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 01:05:59.591220 env[1453]: 2025-05-17 01:05:59.533 [INFO][4512] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.67.136/32] ContainerID="e944ffa88e09044e496d3af6cd340515f00e1df8fbef4fe8f47fa51c6a4d0b11" Namespace="calico-system" Pod="goldmane-78d55f7ddc-5zbrn" WorkloadEndpoint="ci--3510.3.7--n--56b9a5cda4-k8s-goldmane--78d55f7ddc--5zbrn-eth0" May 17 01:05:59.591220 env[1453]: 2025-05-17 01:05:59.533 [INFO][4512] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali6b8f0eb970f ContainerID="e944ffa88e09044e496d3af6cd340515f00e1df8fbef4fe8f47fa51c6a4d0b11" Namespace="calico-system" Pod="goldmane-78d55f7ddc-5zbrn" WorkloadEndpoint="ci--3510.3.7--n--56b9a5cda4-k8s-goldmane--78d55f7ddc--5zbrn-eth0" May 17 01:05:59.591220 env[1453]: 2025-05-17 01:05:59.560 [INFO][4512] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="e944ffa88e09044e496d3af6cd340515f00e1df8fbef4fe8f47fa51c6a4d0b11" Namespace="calico-system" Pod="goldmane-78d55f7ddc-5zbrn" WorkloadEndpoint="ci--3510.3.7--n--56b9a5cda4-k8s-goldmane--78d55f7ddc--5zbrn-eth0" May 17 01:05:59.591220 env[1453]: 2025-05-17 01:05:59.561 [INFO][4512] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="e944ffa88e09044e496d3af6cd340515f00e1df8fbef4fe8f47fa51c6a4d0b11" Namespace="calico-system" Pod="goldmane-78d55f7ddc-5zbrn" WorkloadEndpoint="ci--3510.3.7--n--56b9a5cda4-k8s-goldmane--78d55f7ddc--5zbrn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--56b9a5cda4-k8s-goldmane--78d55f7ddc--5zbrn-eth0", GenerateName:"goldmane-78d55f7ddc-", Namespace:"calico-system", SelfLink:"", UID:"03203f23-8aa4-41b1-ba45-7088ffc7359f", ResourceVersion:"1007", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 1, 5, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"78d55f7ddc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-56b9a5cda4", ContainerID:"e944ffa88e09044e496d3af6cd340515f00e1df8fbef4fe8f47fa51c6a4d0b11", Pod:"goldmane-78d55f7ddc-5zbrn", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.67.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali6b8f0eb970f", MAC:"46:2c:43:16:00:b3", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 01:05:59.591220 env[1453]: 2025-05-17 01:05:59.586 [INFO][4512] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="e944ffa88e09044e496d3af6cd340515f00e1df8fbef4fe8f47fa51c6a4d0b11" Namespace="calico-system" Pod="goldmane-78d55f7ddc-5zbrn" WorkloadEndpoint="ci--3510.3.7--n--56b9a5cda4-k8s-goldmane--78d55f7ddc--5zbrn-eth0" May 17 01:05:59.602749 env[1453]: time="2025-05-17T01:05:59.602698857Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-pnnwz,Uid:c9fcf012-c9eb-4271-ada6-7659bcab9229,Namespace:kube-system,Attempt:1,} returns sandbox id \"e138171e89441895008522bfb009017491ccc346548ca94acae592cb046d773a\"" May 17 01:05:59.607218 env[1453]: time="2025-05-17T01:05:59.607013107Z" level=info msg="CreateContainer within sandbox \"e138171e89441895008522bfb009017491ccc346548ca94acae592cb046d773a\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 17 01:05:59.616000 audit[4603]: NETFILTER_CFG table=filter:122 family=2 entries=70 op=nft_register_chain pid=4603 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 01:05:59.616000 audit[4603]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=33956 a0=3 a1=ffffda974490 a2=0 a3=ffffb1eb0fa8 items=0 ppid=3752 pid=4603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:59.616000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 01:05:59.621167 env[1453]: time="2025-05-17T01:05:59.621089307Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 01:05:59.621167 env[1453]: time="2025-05-17T01:05:59.621132548Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 01:05:59.621167 env[1453]: time="2025-05-17T01:05:59.621143908Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 01:05:59.622698 env[1453]: time="2025-05-17T01:05:59.622661405Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e944ffa88e09044e496d3af6cd340515f00e1df8fbef4fe8f47fa51c6a4d0b11 pid=4606 runtime=io.containerd.runc.v2 May 17 01:05:59.644420 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3929887278.mount: Deactivated successfully. May 17 01:05:59.657782 systemd[1]: Started cri-containerd-e944ffa88e09044e496d3af6cd340515f00e1df8fbef4fe8f47fa51c6a4d0b11.scope. May 17 01:05:59.668096 env[1453]: time="2025-05-17T01:05:59.668054163Z" level=info msg="CreateContainer within sandbox \"e138171e89441895008522bfb009017491ccc346548ca94acae592cb046d773a\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"6c67efa131bde4f172d536615a0afadf4f3c42e7e8341856155c8c3f126f48d8\"" May 17 01:05:59.670835 env[1453]: time="2025-05-17T01:05:59.670806635Z" level=info msg="StartContainer for \"6c67efa131bde4f172d536615a0afadf4f3c42e7e8341856155c8c3f126f48d8\"" May 17 01:05:59.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.679000 audit: BPF prog-id=188 op=LOAD May 17 01:05:59.680000 audit[4616]: AVC avc: denied { bpf } for pid=4616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.680000 audit[4616]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4606 pid=4616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:59.680000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539343466666138386530393034346534393664336166366364333430 May 17 01:05:59.680000 audit[4616]: AVC avc: denied { perfmon } for pid=4616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.680000 audit[4616]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4606 pid=4616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:59.680000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539343466666138386530393034346534393664336166366364333430 May 17 01:05:59.683000 audit[4616]: AVC avc: denied { bpf } for pid=4616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.683000 audit[4616]: AVC avc: denied { bpf } for pid=4616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.683000 audit[4616]: AVC avc: denied { bpf } for pid=4616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.683000 audit[4616]: AVC avc: denied { perfmon } for pid=4616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.683000 audit[4616]: AVC avc: denied { perfmon } for pid=4616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.683000 audit[4616]: AVC avc: denied { perfmon } for pid=4616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.683000 audit[4616]: AVC avc: denied { perfmon } for pid=4616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.683000 audit[4616]: AVC avc: denied { perfmon } for pid=4616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.683000 audit[4616]: AVC avc: denied { bpf } for pid=4616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.683000 audit[4616]: AVC avc: denied { bpf } for pid=4616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.683000 audit: BPF prog-id=189 op=LOAD May 17 01:05:59.683000 audit[4616]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4606 pid=4616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:59.683000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539343466666138386530393034346534393664336166366364333430 May 17 01:05:59.684000 audit[4616]: AVC avc: denied { bpf } for pid=4616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.684000 audit[4616]: AVC avc: denied { bpf } for pid=4616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.684000 audit[4616]: AVC avc: denied { perfmon } for pid=4616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.684000 audit[4616]: AVC avc: denied { perfmon } for pid=4616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.684000 audit[4616]: AVC avc: denied { perfmon } for pid=4616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.684000 audit[4616]: AVC avc: denied { perfmon } for pid=4616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.684000 audit[4616]: AVC avc: denied { perfmon } for pid=4616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.684000 audit[4616]: AVC avc: denied { bpf } for pid=4616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.684000 audit[4616]: AVC avc: denied { bpf } for pid=4616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.684000 audit: BPF prog-id=190 op=LOAD May 17 01:05:59.684000 audit[4616]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4606 pid=4616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:59.684000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539343466666138386530393034346534393664336166366364333430 May 17 01:05:59.687000 audit: BPF prog-id=190 op=UNLOAD May 17 01:05:59.687000 audit: BPF prog-id=189 op=UNLOAD May 17 01:05:59.687000 audit[4616]: AVC avc: denied { bpf } for pid=4616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.687000 audit[4616]: AVC avc: denied { bpf } for pid=4616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.687000 audit[4616]: AVC avc: denied { bpf } for pid=4616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.687000 audit[4616]: AVC avc: denied { perfmon } for pid=4616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.687000 audit[4616]: AVC avc: denied { perfmon } for pid=4616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.687000 audit[4616]: AVC avc: denied { perfmon } for pid=4616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.687000 audit[4616]: AVC avc: denied { perfmon } for pid=4616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.687000 audit[4616]: AVC avc: denied { perfmon } for pid=4616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.687000 audit[4616]: AVC avc: denied { bpf } for pid=4616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.687000 audit[4616]: AVC avc: denied { bpf } for pid=4616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.687000 audit: BPF prog-id=191 op=LOAD May 17 01:05:59.687000 audit[4616]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4606 pid=4616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:59.687000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539343466666138386530393034346534393664336166366364333430 May 17 01:05:59.702176 systemd[1]: Started cri-containerd-6c67efa131bde4f172d536615a0afadf4f3c42e7e8341856155c8c3f126f48d8.scope. May 17 01:05:59.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.731000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.731000 audit: BPF prog-id=192 op=LOAD May 17 01:05:59.731000 audit[4641]: AVC avc: denied { bpf } for pid=4641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.731000 audit[4641]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4551 pid=4641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:59.731000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663363765666131333162646534663137326435333636313561306166 May 17 01:05:59.732000 audit[4641]: AVC avc: denied { perfmon } for pid=4641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.732000 audit[4641]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4551 pid=4641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:59.732000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663363765666131333162646534663137326435333636313561306166 May 17 01:05:59.732000 audit[4641]: AVC avc: denied { bpf } for pid=4641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.732000 audit[4641]: AVC avc: denied { bpf } for pid=4641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.732000 audit[4641]: AVC avc: denied { bpf } for pid=4641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.732000 audit[4641]: AVC avc: denied { perfmon } for pid=4641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.732000 audit[4641]: AVC avc: denied { perfmon } for pid=4641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.732000 audit[4641]: AVC avc: denied { perfmon } for pid=4641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.732000 audit[4641]: AVC avc: denied { perfmon } for pid=4641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.732000 audit[4641]: AVC avc: denied { perfmon } for pid=4641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.732000 audit[4641]: AVC avc: denied { bpf } for pid=4641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.732000 audit[4641]: AVC avc: denied { bpf } for pid=4641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.732000 audit: BPF prog-id=193 op=LOAD May 17 01:05:59.732000 audit[4641]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4551 pid=4641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:59.732000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663363765666131333162646534663137326435333636313561306166 May 17 01:05:59.733000 audit[4641]: AVC avc: denied { bpf } for pid=4641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.733000 audit[4641]: AVC avc: denied { bpf } for pid=4641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.733000 audit[4641]: AVC avc: denied { perfmon } for pid=4641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.733000 audit[4641]: AVC avc: denied { perfmon } for pid=4641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.733000 audit[4641]: AVC avc: denied { perfmon } for pid=4641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.733000 audit[4641]: AVC avc: denied { perfmon } for pid=4641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.733000 audit[4641]: AVC avc: denied { perfmon } for pid=4641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.733000 audit[4641]: AVC avc: denied { bpf } for pid=4641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.733000 audit[4641]: AVC avc: denied { bpf } for pid=4641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.733000 audit: BPF prog-id=194 op=LOAD May 17 01:05:59.733000 audit[4641]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4551 pid=4641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:59.733000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663363765666131333162646534663137326435333636313561306166 May 17 01:05:59.734000 audit: BPF prog-id=194 op=UNLOAD May 17 01:05:59.734000 audit: BPF prog-id=193 op=UNLOAD May 17 01:05:59.734000 audit[4641]: AVC avc: denied { bpf } for pid=4641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.734000 audit[4641]: AVC avc: denied { bpf } for pid=4641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.734000 audit[4641]: AVC avc: denied { bpf } for pid=4641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.734000 audit[4641]: AVC avc: denied { perfmon } for pid=4641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.734000 audit[4641]: AVC avc: denied { perfmon } for pid=4641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.734000 audit[4641]: AVC avc: denied { perfmon } for pid=4641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.734000 audit[4641]: AVC avc: denied { perfmon } for pid=4641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.734000 audit[4641]: AVC avc: denied { perfmon } for pid=4641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.734000 audit[4641]: AVC avc: denied { bpf } for pid=4641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.734000 audit[4641]: AVC avc: denied { bpf } for pid=4641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:05:59.734000 audit: BPF prog-id=195 op=LOAD May 17 01:05:59.734000 audit[4641]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4551 pid=4641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:05:59.734000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663363765666131333162646534663137326435333636313561306166 May 17 01:05:59.738679 env[1453]: time="2025-05-17T01:05:59.738623208Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-78d55f7ddc-5zbrn,Uid:03203f23-8aa4-41b1-ba45-7088ffc7359f,Namespace:calico-system,Attempt:1,} returns sandbox id \"e944ffa88e09044e496d3af6cd340515f00e1df8fbef4fe8f47fa51c6a4d0b11\"" May 17 01:05:59.771000 audit[4653]: AVC avc: denied { getattr } for pid=4653 comm="coredns" path="cgroup:[4026532688]" dev="nsfs" ino=4026532688 scontext=system_u:system_r:svirt_lxc_net_t:s0:c218,c982 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 May 17 01:05:59.775273 env[1453]: time="2025-05-17T01:05:59.775235146Z" level=info msg="StartContainer for \"6c67efa131bde4f172d536615a0afadf4f3c42e7e8341856155c8c3f126f48d8\" returns successfully" May 17 01:05:59.771000 audit[4653]: SYSCALL arch=c00000b7 syscall=79 success=no exit=-13 a0=ffffffffffffff9c a1=4000056798 a2=400014e578 a3=0 items=0 ppid=4551 pid=4653 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c218,c982 key=(null) May 17 01:05:59.771000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 May 17 01:06:00.169089 systemd-networkd[1616]: cali99d1626794e: Gained IPv6LL May 17 01:06:00.241117 kubelet[2439]: I0517 01:06:00.241078 2439 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 01:06:00.424646 kubelet[2439]: I0517 01:06:00.423892 2439 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-668d6bf9bc-pnnwz" podStartSLOduration=51.423874448 podStartE2EDuration="51.423874448s" podCreationTimestamp="2025-05-17 01:05:09 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 01:06:00.392408413 +0000 UTC m=+57.392865801" watchObservedRunningTime="2025-05-17 01:06:00.423874448 +0000 UTC m=+57.424331836" May 17 01:06:00.474000 audit[4721]: NETFILTER_CFG table=filter:123 family=2 entries=14 op=nft_register_rule pid=4721 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:06:00.474000 audit[4721]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5248 a0=3 a1=ffffdf739a30 a2=0 a3=1 items=0 ppid=2540 pid=4721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:06:00.474000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:06:00.484000 audit[4721]: NETFILTER_CFG table=nat:124 family=2 entries=44 op=nft_register_rule pid=4721 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:06:00.484000 audit[4721]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14196 a0=3 a1=ffffdf739a30 a2=0 a3=1 items=0 ppid=2540 pid=4721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:06:00.484000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:06:00.533000 audit[4723]: NETFILTER_CFG table=filter:125 family=2 entries=14 op=nft_register_rule pid=4723 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:06:00.533000 audit[4723]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5248 a0=3 a1=ffffd6b08050 a2=0 a3=1 items=0 ppid=2540 pid=4723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:06:00.533000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:06:00.548000 audit[4723]: NETFILTER_CFG table=nat:126 family=2 entries=56 op=nft_register_chain pid=4723 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:06:00.548000 audit[4723]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19860 a0=3 a1=ffffd6b08050 a2=0 a3=1 items=0 ppid=2540 pid=4723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:06:00.548000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:06:01.001049 systemd-networkd[1616]: cali6b8f0eb970f: Gained IPv6LL May 17 01:06:01.257126 systemd-networkd[1616]: calid3c62e0446a: Gained IPv6LL May 17 01:06:01.263905 env[1453]: time="2025-05-17T01:06:01.263857638Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:06:01.271670 env[1453]: time="2025-05-17T01:06:01.271626964Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4188fe2931435deda58a0dc1767a2f6ad2bb27e47662ccec626bd07006f56373,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:06:01.276509 env[1453]: time="2025-05-17T01:06:01.276479578Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:06:01.283191 env[1453]: time="2025-05-17T01:06:01.283142452Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:eb5bc5c9e7a71f1d8ea69bbcc8e54b84fb7ec1e32d919c8b148f80b770f20182,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:06:01.284144 env[1453]: time="2025-05-17T01:06:01.284111063Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.0\" returns image reference \"sha256:4188fe2931435deda58a0dc1767a2f6ad2bb27e47662ccec626bd07006f56373\"" May 17 01:06:01.285944 env[1453]: time="2025-05-17T01:06:01.285900123Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\"" May 17 01:06:01.299952 env[1453]: time="2025-05-17T01:06:01.299907839Z" level=info msg="CreateContainer within sandbox \"44353239d42685c072fdcb8fa672e01b108759db2637eb09642f287487464d04\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" May 17 01:06:01.350488 env[1453]: time="2025-05-17T01:06:01.350415681Z" level=info msg="CreateContainer within sandbox \"44353239d42685c072fdcb8fa672e01b108759db2637eb09642f287487464d04\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"4fbf99a208adc0400b6cc87cc6e826f35edf1f10d7a48fdcc4ae74d6ba450ab9\"" May 17 01:06:01.351209 env[1453]: time="2025-05-17T01:06:01.351185890Z" level=info msg="StartContainer for \"4fbf99a208adc0400b6cc87cc6e826f35edf1f10d7a48fdcc4ae74d6ba450ab9\"" May 17 01:06:01.366306 systemd[1]: Started cri-containerd-4fbf99a208adc0400b6cc87cc6e826f35edf1f10d7a48fdcc4ae74d6ba450ab9.scope. May 17 01:06:01.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:01.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:01.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:01.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:01.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:01.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:01.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:01.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:01.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:01.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:01.397000 audit: BPF prog-id=196 op=LOAD May 17 01:06:01.398000 audit[4741]: AVC avc: denied { bpf } for pid=4741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:01.398000 audit[4741]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4263 pid=4741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:06:01.398000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466626639396132303861646330343030623663633837636336653832 May 17 01:06:01.399000 audit[4741]: AVC avc: denied { perfmon } for pid=4741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:01.399000 audit[4741]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4263 pid=4741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:06:01.399000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466626639396132303861646330343030623663633837636336653832 May 17 01:06:01.399000 audit[4741]: AVC avc: denied { bpf } for pid=4741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:01.399000 audit[4741]: AVC avc: denied { bpf } for pid=4741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:01.399000 audit[4741]: AVC avc: denied { bpf } for pid=4741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:01.399000 audit[4741]: AVC avc: denied { perfmon } for pid=4741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:01.399000 audit[4741]: AVC avc: denied { perfmon } for pid=4741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:01.399000 audit[4741]: AVC avc: denied { perfmon } for pid=4741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:01.399000 audit[4741]: AVC avc: denied { perfmon } for pid=4741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:01.399000 audit[4741]: AVC avc: denied { perfmon } for pid=4741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:01.399000 audit[4741]: AVC avc: denied { bpf } for pid=4741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:01.399000 audit[4741]: AVC avc: denied { bpf } for pid=4741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:01.399000 audit: BPF prog-id=197 op=LOAD May 17 01:06:01.399000 audit[4741]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4263 pid=4741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:06:01.399000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466626639396132303861646330343030623663633837636336653832 May 17 01:06:01.399000 audit[4741]: AVC avc: denied { bpf } for pid=4741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:01.399000 audit[4741]: AVC avc: denied { bpf } for pid=4741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:01.399000 audit[4741]: AVC avc: denied { perfmon } for pid=4741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:01.399000 audit[4741]: AVC avc: denied { perfmon } for pid=4741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:01.399000 audit[4741]: AVC avc: denied { perfmon } for pid=4741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:01.399000 audit[4741]: AVC avc: denied { perfmon } for pid=4741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:01.399000 audit[4741]: AVC avc: denied { perfmon } for pid=4741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:01.399000 audit[4741]: AVC avc: denied { bpf } for pid=4741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:01.399000 audit[4741]: AVC avc: denied { bpf } for pid=4741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:01.399000 audit: BPF prog-id=198 op=LOAD May 17 01:06:01.399000 audit[4741]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4263 pid=4741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:06:01.399000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466626639396132303861646330343030623663633837636336653832 May 17 01:06:01.400000 audit: BPF prog-id=198 op=UNLOAD May 17 01:06:01.400000 audit: BPF prog-id=197 op=UNLOAD May 17 01:06:01.400000 audit[4741]: AVC avc: denied { bpf } for pid=4741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:01.400000 audit[4741]: AVC avc: denied { bpf } for pid=4741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:01.400000 audit[4741]: AVC avc: denied { bpf } for pid=4741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:01.400000 audit[4741]: AVC avc: denied { perfmon } for pid=4741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:01.400000 audit[4741]: AVC avc: denied { perfmon } for pid=4741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:01.400000 audit[4741]: AVC avc: denied { perfmon } for pid=4741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:01.400000 audit[4741]: AVC avc: denied { perfmon } for pid=4741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:01.400000 audit[4741]: AVC avc: denied { perfmon } for pid=4741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:01.400000 audit[4741]: AVC avc: denied { bpf } for pid=4741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:01.400000 audit[4741]: AVC avc: denied { bpf } for pid=4741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:01.400000 audit: BPF prog-id=199 op=LOAD May 17 01:06:01.400000 audit[4741]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4263 pid=4741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:06:01.400000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466626639396132303861646330343030623663633837636336653832 May 17 01:06:01.471830 env[1453]: time="2025-05-17T01:06:01.471782112Z" level=info msg="StartContainer for \"4fbf99a208adc0400b6cc87cc6e826f35edf1f10d7a48fdcc4ae74d6ba450ab9\" returns successfully" May 17 01:06:02.406587 systemd[1]: run-containerd-runc-k8s.io-4fbf99a208adc0400b6cc87cc6e826f35edf1f10d7a48fdcc4ae74d6ba450ab9-runc.pkNvnI.mount: Deactivated successfully. May 17 01:06:02.410787 kubelet[2439]: I0517 01:06:02.410724 2439 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-f6596879f-8tb74" podStartSLOduration=28.326539544 podStartE2EDuration="31.410705191s" podCreationTimestamp="2025-05-17 01:05:31 +0000 UTC" firstStartedPulling="2025-05-17 01:05:58.201514034 +0000 UTC m=+55.201971422" lastFinishedPulling="2025-05-17 01:06:01.285679681 +0000 UTC m=+58.286137069" observedRunningTime="2025-05-17 01:06:02.410328467 +0000 UTC m=+59.410785855" watchObservedRunningTime="2025-05-17 01:06:02.410705191 +0000 UTC m=+59.411162579" May 17 01:06:03.140770 env[1453]: time="2025-05-17T01:06:03.140724804Z" level=info msg="StopPodSandbox for \"ddb911fedf4c2ccf6ed8ac040a53a0054cd4be370b4614c6e3133824cbadd2ab\"" May 17 01:06:03.262790 env[1453]: 2025-05-17 01:06:03.212 [WARNING][4809] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ddb911fedf4c2ccf6ed8ac040a53a0054cd4be370b4614c6e3133824cbadd2ab" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--56b9a5cda4-k8s-csi--node--driver--92ktb-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"4d21f64d-bc3c-4fa5-8ad3-4aed6c59a824", ResourceVersion:"998", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 1, 5, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-56b9a5cda4", ContainerID:"648a93c6516a9d3eb426cba128b94b02782242e59967d9901c54a4cc92744d12", Pod:"csi-node-driver-92ktb", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.67.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali99d1626794e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 01:06:03.262790 env[1453]: 2025-05-17 01:06:03.212 [INFO][4809] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="ddb911fedf4c2ccf6ed8ac040a53a0054cd4be370b4614c6e3133824cbadd2ab" May 17 01:06:03.262790 env[1453]: 2025-05-17 01:06:03.212 [INFO][4809] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ddb911fedf4c2ccf6ed8ac040a53a0054cd4be370b4614c6e3133824cbadd2ab" iface="eth0" netns="" May 17 01:06:03.262790 env[1453]: 2025-05-17 01:06:03.212 [INFO][4809] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="ddb911fedf4c2ccf6ed8ac040a53a0054cd4be370b4614c6e3133824cbadd2ab" May 17 01:06:03.262790 env[1453]: 2025-05-17 01:06:03.212 [INFO][4809] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ddb911fedf4c2ccf6ed8ac040a53a0054cd4be370b4614c6e3133824cbadd2ab" May 17 01:06:03.262790 env[1453]: 2025-05-17 01:06:03.244 [INFO][4817] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ddb911fedf4c2ccf6ed8ac040a53a0054cd4be370b4614c6e3133824cbadd2ab" HandleID="k8s-pod-network.ddb911fedf4c2ccf6ed8ac040a53a0054cd4be370b4614c6e3133824cbadd2ab" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-csi--node--driver--92ktb-eth0" May 17 01:06:03.262790 env[1453]: 2025-05-17 01:06:03.244 [INFO][4817] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 01:06:03.262790 env[1453]: 2025-05-17 01:06:03.244 [INFO][4817] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 01:06:03.262790 env[1453]: 2025-05-17 01:06:03.257 [WARNING][4817] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ddb911fedf4c2ccf6ed8ac040a53a0054cd4be370b4614c6e3133824cbadd2ab" HandleID="k8s-pod-network.ddb911fedf4c2ccf6ed8ac040a53a0054cd4be370b4614c6e3133824cbadd2ab" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-csi--node--driver--92ktb-eth0" May 17 01:06:03.262790 env[1453]: 2025-05-17 01:06:03.257 [INFO][4817] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ddb911fedf4c2ccf6ed8ac040a53a0054cd4be370b4614c6e3133824cbadd2ab" HandleID="k8s-pod-network.ddb911fedf4c2ccf6ed8ac040a53a0054cd4be370b4614c6e3133824cbadd2ab" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-csi--node--driver--92ktb-eth0" May 17 01:06:03.262790 env[1453]: 2025-05-17 01:06:03.260 [INFO][4817] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 01:06:03.262790 env[1453]: 2025-05-17 01:06:03.261 [INFO][4809] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="ddb911fedf4c2ccf6ed8ac040a53a0054cd4be370b4614c6e3133824cbadd2ab" May 17 01:06:03.263505 env[1453]: time="2025-05-17T01:06:03.262813292Z" level=info msg="TearDown network for sandbox \"ddb911fedf4c2ccf6ed8ac040a53a0054cd4be370b4614c6e3133824cbadd2ab\" successfully" May 17 01:06:03.263505 env[1453]: time="2025-05-17T01:06:03.262845292Z" level=info msg="StopPodSandbox for \"ddb911fedf4c2ccf6ed8ac040a53a0054cd4be370b4614c6e3133824cbadd2ab\" returns successfully" May 17 01:06:03.265305 env[1453]: time="2025-05-17T01:06:03.265265319Z" level=info msg="RemovePodSandbox for \"ddb911fedf4c2ccf6ed8ac040a53a0054cd4be370b4614c6e3133824cbadd2ab\"" May 17 01:06:03.265553 env[1453]: time="2025-05-17T01:06:03.265494081Z" level=info msg="Forcibly stopping sandbox \"ddb911fedf4c2ccf6ed8ac040a53a0054cd4be370b4614c6e3133824cbadd2ab\"" May 17 01:06:03.400032 env[1453]: 2025-05-17 01:06:03.324 [WARNING][4831] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ddb911fedf4c2ccf6ed8ac040a53a0054cd4be370b4614c6e3133824cbadd2ab" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--56b9a5cda4-k8s-csi--node--driver--92ktb-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"4d21f64d-bc3c-4fa5-8ad3-4aed6c59a824", ResourceVersion:"998", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 1, 5, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-56b9a5cda4", ContainerID:"648a93c6516a9d3eb426cba128b94b02782242e59967d9901c54a4cc92744d12", Pod:"csi-node-driver-92ktb", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.67.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali99d1626794e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 01:06:03.400032 env[1453]: 2025-05-17 01:06:03.324 [INFO][4831] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="ddb911fedf4c2ccf6ed8ac040a53a0054cd4be370b4614c6e3133824cbadd2ab" May 17 01:06:03.400032 env[1453]: 2025-05-17 01:06:03.324 [INFO][4831] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ddb911fedf4c2ccf6ed8ac040a53a0054cd4be370b4614c6e3133824cbadd2ab" iface="eth0" netns="" May 17 01:06:03.400032 env[1453]: 2025-05-17 01:06:03.324 [INFO][4831] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="ddb911fedf4c2ccf6ed8ac040a53a0054cd4be370b4614c6e3133824cbadd2ab" May 17 01:06:03.400032 env[1453]: 2025-05-17 01:06:03.324 [INFO][4831] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ddb911fedf4c2ccf6ed8ac040a53a0054cd4be370b4614c6e3133824cbadd2ab" May 17 01:06:03.400032 env[1453]: 2025-05-17 01:06:03.367 [INFO][4838] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ddb911fedf4c2ccf6ed8ac040a53a0054cd4be370b4614c6e3133824cbadd2ab" HandleID="k8s-pod-network.ddb911fedf4c2ccf6ed8ac040a53a0054cd4be370b4614c6e3133824cbadd2ab" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-csi--node--driver--92ktb-eth0" May 17 01:06:03.400032 env[1453]: 2025-05-17 01:06:03.367 [INFO][4838] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 01:06:03.400032 env[1453]: 2025-05-17 01:06:03.367 [INFO][4838] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 01:06:03.400032 env[1453]: 2025-05-17 01:06:03.395 [WARNING][4838] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ddb911fedf4c2ccf6ed8ac040a53a0054cd4be370b4614c6e3133824cbadd2ab" HandleID="k8s-pod-network.ddb911fedf4c2ccf6ed8ac040a53a0054cd4be370b4614c6e3133824cbadd2ab" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-csi--node--driver--92ktb-eth0" May 17 01:06:03.400032 env[1453]: 2025-05-17 01:06:03.396 [INFO][4838] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ddb911fedf4c2ccf6ed8ac040a53a0054cd4be370b4614c6e3133824cbadd2ab" HandleID="k8s-pod-network.ddb911fedf4c2ccf6ed8ac040a53a0054cd4be370b4614c6e3133824cbadd2ab" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-csi--node--driver--92ktb-eth0" May 17 01:06:03.400032 env[1453]: 2025-05-17 01:06:03.397 [INFO][4838] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 01:06:03.400032 env[1453]: 2025-05-17 01:06:03.398 [INFO][4831] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="ddb911fedf4c2ccf6ed8ac040a53a0054cd4be370b4614c6e3133824cbadd2ab" May 17 01:06:03.400503 env[1453]: time="2025-05-17T01:06:03.400009424Z" level=info msg="TearDown network for sandbox \"ddb911fedf4c2ccf6ed8ac040a53a0054cd4be370b4614c6e3133824cbadd2ab\" successfully" May 17 01:06:03.411609 env[1453]: time="2025-05-17T01:06:03.411552669Z" level=info msg="RemovePodSandbox \"ddb911fedf4c2ccf6ed8ac040a53a0054cd4be370b4614c6e3133824cbadd2ab\" returns successfully" May 17 01:06:03.412236 env[1453]: time="2025-05-17T01:06:03.412200556Z" level=info msg="StopPodSandbox for \"75f90dbe628597416a290bd0d8408ca492593ad2c9bf08de9fd7e56f91bc6e1e\"" May 17 01:06:03.560061 env[1453]: 2025-05-17 01:06:03.488 [WARNING][4853] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="75f90dbe628597416a290bd0d8408ca492593ad2c9bf08de9fd7e56f91bc6e1e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--56b9a5cda4-k8s-coredns--668d6bf9bc--rpdwj-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"9893c048-8d02-43b3-a0c7-1daf374b6950", ResourceVersion:"980", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 1, 5, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-56b9a5cda4", ContainerID:"58dbe1f122d46fd44c2375ffd36ef9ccbf80c0b4d1fcd024d2ed81329822361f", Pod:"coredns-668d6bf9bc-rpdwj", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.67.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali7ac9755a16c", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 01:06:03.560061 env[1453]: 2025-05-17 01:06:03.488 [INFO][4853] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="75f90dbe628597416a290bd0d8408ca492593ad2c9bf08de9fd7e56f91bc6e1e" May 17 01:06:03.560061 env[1453]: 2025-05-17 01:06:03.488 [INFO][4853] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="75f90dbe628597416a290bd0d8408ca492593ad2c9bf08de9fd7e56f91bc6e1e" iface="eth0" netns="" May 17 01:06:03.560061 env[1453]: 2025-05-17 01:06:03.488 [INFO][4853] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="75f90dbe628597416a290bd0d8408ca492593ad2c9bf08de9fd7e56f91bc6e1e" May 17 01:06:03.560061 env[1453]: 2025-05-17 01:06:03.488 [INFO][4853] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="75f90dbe628597416a290bd0d8408ca492593ad2c9bf08de9fd7e56f91bc6e1e" May 17 01:06:03.560061 env[1453]: 2025-05-17 01:06:03.534 [INFO][4860] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="75f90dbe628597416a290bd0d8408ca492593ad2c9bf08de9fd7e56f91bc6e1e" HandleID="k8s-pod-network.75f90dbe628597416a290bd0d8408ca492593ad2c9bf08de9fd7e56f91bc6e1e" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-coredns--668d6bf9bc--rpdwj-eth0" May 17 01:06:03.560061 env[1453]: 2025-05-17 01:06:03.534 [INFO][4860] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 01:06:03.560061 env[1453]: 2025-05-17 01:06:03.534 [INFO][4860] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 01:06:03.560061 env[1453]: 2025-05-17 01:06:03.550 [WARNING][4860] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="75f90dbe628597416a290bd0d8408ca492593ad2c9bf08de9fd7e56f91bc6e1e" HandleID="k8s-pod-network.75f90dbe628597416a290bd0d8408ca492593ad2c9bf08de9fd7e56f91bc6e1e" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-coredns--668d6bf9bc--rpdwj-eth0" May 17 01:06:03.560061 env[1453]: 2025-05-17 01:06:03.550 [INFO][4860] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="75f90dbe628597416a290bd0d8408ca492593ad2c9bf08de9fd7e56f91bc6e1e" HandleID="k8s-pod-network.75f90dbe628597416a290bd0d8408ca492593ad2c9bf08de9fd7e56f91bc6e1e" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-coredns--668d6bf9bc--rpdwj-eth0" May 17 01:06:03.560061 env[1453]: 2025-05-17 01:06:03.554 [INFO][4860] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 01:06:03.560061 env[1453]: 2025-05-17 01:06:03.556 [INFO][4853] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="75f90dbe628597416a290bd0d8408ca492593ad2c9bf08de9fd7e56f91bc6e1e" May 17 01:06:03.561043 env[1453]: time="2025-05-17T01:06:03.560913133Z" level=info msg="TearDown network for sandbox \"75f90dbe628597416a290bd0d8408ca492593ad2c9bf08de9fd7e56f91bc6e1e\" successfully" May 17 01:06:03.561147 env[1453]: time="2025-05-17T01:06:03.561129736Z" level=info msg="StopPodSandbox for \"75f90dbe628597416a290bd0d8408ca492593ad2c9bf08de9fd7e56f91bc6e1e\" returns successfully" May 17 01:06:03.561723 env[1453]: time="2025-05-17T01:06:03.561695062Z" level=info msg="RemovePodSandbox for \"75f90dbe628597416a290bd0d8408ca492593ad2c9bf08de9fd7e56f91bc6e1e\"" May 17 01:06:03.561866 env[1453]: time="2025-05-17T01:06:03.561827223Z" level=info msg="Forcibly stopping sandbox \"75f90dbe628597416a290bd0d8408ca492593ad2c9bf08de9fd7e56f91bc6e1e\"" May 17 01:06:03.722387 env[1453]: 2025-05-17 01:06:03.683 [WARNING][4875] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="75f90dbe628597416a290bd0d8408ca492593ad2c9bf08de9fd7e56f91bc6e1e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--56b9a5cda4-k8s-coredns--668d6bf9bc--rpdwj-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"9893c048-8d02-43b3-a0c7-1daf374b6950", ResourceVersion:"980", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 1, 5, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-56b9a5cda4", ContainerID:"58dbe1f122d46fd44c2375ffd36ef9ccbf80c0b4d1fcd024d2ed81329822361f", Pod:"coredns-668d6bf9bc-rpdwj", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.67.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali7ac9755a16c", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 01:06:03.722387 env[1453]: 2025-05-17 01:06:03.683 [INFO][4875] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="75f90dbe628597416a290bd0d8408ca492593ad2c9bf08de9fd7e56f91bc6e1e" May 17 01:06:03.722387 env[1453]: 2025-05-17 01:06:03.684 [INFO][4875] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="75f90dbe628597416a290bd0d8408ca492593ad2c9bf08de9fd7e56f91bc6e1e" iface="eth0" netns="" May 17 01:06:03.722387 env[1453]: 2025-05-17 01:06:03.684 [INFO][4875] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="75f90dbe628597416a290bd0d8408ca492593ad2c9bf08de9fd7e56f91bc6e1e" May 17 01:06:03.722387 env[1453]: 2025-05-17 01:06:03.684 [INFO][4875] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="75f90dbe628597416a290bd0d8408ca492593ad2c9bf08de9fd7e56f91bc6e1e" May 17 01:06:03.722387 env[1453]: 2025-05-17 01:06:03.708 [INFO][4882] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="75f90dbe628597416a290bd0d8408ca492593ad2c9bf08de9fd7e56f91bc6e1e" HandleID="k8s-pod-network.75f90dbe628597416a290bd0d8408ca492593ad2c9bf08de9fd7e56f91bc6e1e" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-coredns--668d6bf9bc--rpdwj-eth0" May 17 01:06:03.722387 env[1453]: 2025-05-17 01:06:03.708 [INFO][4882] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 01:06:03.722387 env[1453]: 2025-05-17 01:06:03.708 [INFO][4882] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 01:06:03.722387 env[1453]: 2025-05-17 01:06:03.718 [WARNING][4882] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="75f90dbe628597416a290bd0d8408ca492593ad2c9bf08de9fd7e56f91bc6e1e" HandleID="k8s-pod-network.75f90dbe628597416a290bd0d8408ca492593ad2c9bf08de9fd7e56f91bc6e1e" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-coredns--668d6bf9bc--rpdwj-eth0" May 17 01:06:03.722387 env[1453]: 2025-05-17 01:06:03.718 [INFO][4882] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="75f90dbe628597416a290bd0d8408ca492593ad2c9bf08de9fd7e56f91bc6e1e" HandleID="k8s-pod-network.75f90dbe628597416a290bd0d8408ca492593ad2c9bf08de9fd7e56f91bc6e1e" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-coredns--668d6bf9bc--rpdwj-eth0" May 17 01:06:03.722387 env[1453]: 2025-05-17 01:06:03.719 [INFO][4882] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 01:06:03.722387 env[1453]: 2025-05-17 01:06:03.721 [INFO][4875] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="75f90dbe628597416a290bd0d8408ca492593ad2c9bf08de9fd7e56f91bc6e1e" May 17 01:06:03.722948 env[1453]: time="2025-05-17T01:06:03.722890774Z" level=info msg="TearDown network for sandbox \"75f90dbe628597416a290bd0d8408ca492593ad2c9bf08de9fd7e56f91bc6e1e\" successfully" May 17 01:06:03.939308 env[1453]: time="2025-05-17T01:06:03.939263327Z" level=info msg="RemovePodSandbox \"75f90dbe628597416a290bd0d8408ca492593ad2c9bf08de9fd7e56f91bc6e1e\" returns successfully" May 17 01:06:03.939975 env[1453]: time="2025-05-17T01:06:03.939949134Z" level=info msg="StopPodSandbox for \"610ba958463e0f9928b1a82a171a984c1ffe4522de3a9a7fa4a1256836f526e4\"" May 17 01:06:04.131334 env[1453]: 2025-05-17 01:06:04.062 [WARNING][4896] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="610ba958463e0f9928b1a82a171a984c1ffe4522de3a9a7fa4a1256836f526e4" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--56b9a5cda4-k8s-calico--apiserver--7bb465f89b--fvt58-eth0", GenerateName:"calico-apiserver-7bb465f89b-", Namespace:"calico-apiserver", SelfLink:"", UID:"76c2d8d7-3942-4d0e-bf68-64e138374d48", ResourceVersion:"995", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 1, 5, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7bb465f89b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-56b9a5cda4", ContainerID:"069385844eb799407dcf6e76a53053e1fd21e444114d019586abe772844ce150", Pod:"calico-apiserver-7bb465f89b-fvt58", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.67.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali2c9d54d19d0", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 01:06:04.131334 env[1453]: 2025-05-17 01:06:04.062 [INFO][4896] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="610ba958463e0f9928b1a82a171a984c1ffe4522de3a9a7fa4a1256836f526e4" May 17 01:06:04.131334 env[1453]: 2025-05-17 01:06:04.062 [INFO][4896] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="610ba958463e0f9928b1a82a171a984c1ffe4522de3a9a7fa4a1256836f526e4" iface="eth0" netns="" May 17 01:06:04.131334 env[1453]: 2025-05-17 01:06:04.062 [INFO][4896] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="610ba958463e0f9928b1a82a171a984c1ffe4522de3a9a7fa4a1256836f526e4" May 17 01:06:04.131334 env[1453]: 2025-05-17 01:06:04.062 [INFO][4896] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="610ba958463e0f9928b1a82a171a984c1ffe4522de3a9a7fa4a1256836f526e4" May 17 01:06:04.131334 env[1453]: 2025-05-17 01:06:04.107 [INFO][4903] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="610ba958463e0f9928b1a82a171a984c1ffe4522de3a9a7fa4a1256836f526e4" HandleID="k8s-pod-network.610ba958463e0f9928b1a82a171a984c1ffe4522de3a9a7fa4a1256836f526e4" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-calico--apiserver--7bb465f89b--fvt58-eth0" May 17 01:06:04.131334 env[1453]: 2025-05-17 01:06:04.107 [INFO][4903] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 01:06:04.131334 env[1453]: 2025-05-17 01:06:04.107 [INFO][4903] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 01:06:04.131334 env[1453]: 2025-05-17 01:06:04.125 [WARNING][4903] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="610ba958463e0f9928b1a82a171a984c1ffe4522de3a9a7fa4a1256836f526e4" HandleID="k8s-pod-network.610ba958463e0f9928b1a82a171a984c1ffe4522de3a9a7fa4a1256836f526e4" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-calico--apiserver--7bb465f89b--fvt58-eth0" May 17 01:06:04.131334 env[1453]: 2025-05-17 01:06:04.125 [INFO][4903] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="610ba958463e0f9928b1a82a171a984c1ffe4522de3a9a7fa4a1256836f526e4" HandleID="k8s-pod-network.610ba958463e0f9928b1a82a171a984c1ffe4522de3a9a7fa4a1256836f526e4" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-calico--apiserver--7bb465f89b--fvt58-eth0" May 17 01:06:04.131334 env[1453]: 2025-05-17 01:06:04.127 [INFO][4903] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 01:06:04.131334 env[1453]: 2025-05-17 01:06:04.130 [INFO][4896] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="610ba958463e0f9928b1a82a171a984c1ffe4522de3a9a7fa4a1256836f526e4" May 17 01:06:04.131852 env[1453]: time="2025-05-17T01:06:04.131817965Z" level=info msg="TearDown network for sandbox \"610ba958463e0f9928b1a82a171a984c1ffe4522de3a9a7fa4a1256836f526e4\" successfully" May 17 01:06:04.131917 env[1453]: time="2025-05-17T01:06:04.131901245Z" level=info msg="StopPodSandbox for \"610ba958463e0f9928b1a82a171a984c1ffe4522de3a9a7fa4a1256836f526e4\" returns successfully" May 17 01:06:04.132981 env[1453]: time="2025-05-17T01:06:04.132956417Z" level=info msg="RemovePodSandbox for \"610ba958463e0f9928b1a82a171a984c1ffe4522de3a9a7fa4a1256836f526e4\"" May 17 01:06:04.133121 env[1453]: time="2025-05-17T01:06:04.133082418Z" level=info msg="Forcibly stopping sandbox \"610ba958463e0f9928b1a82a171a984c1ffe4522de3a9a7fa4a1256836f526e4\"" May 17 01:06:04.253084 env[1453]: 2025-05-17 01:06:04.186 [WARNING][4919] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="610ba958463e0f9928b1a82a171a984c1ffe4522de3a9a7fa4a1256836f526e4" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--56b9a5cda4-k8s-calico--apiserver--7bb465f89b--fvt58-eth0", GenerateName:"calico-apiserver-7bb465f89b-", Namespace:"calico-apiserver", SelfLink:"", UID:"76c2d8d7-3942-4d0e-bf68-64e138374d48", ResourceVersion:"995", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 1, 5, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7bb465f89b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-56b9a5cda4", ContainerID:"069385844eb799407dcf6e76a53053e1fd21e444114d019586abe772844ce150", Pod:"calico-apiserver-7bb465f89b-fvt58", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.67.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali2c9d54d19d0", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 01:06:04.253084 env[1453]: 2025-05-17 01:06:04.186 [INFO][4919] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="610ba958463e0f9928b1a82a171a984c1ffe4522de3a9a7fa4a1256836f526e4" May 17 01:06:04.253084 env[1453]: 2025-05-17 01:06:04.186 [INFO][4919] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="610ba958463e0f9928b1a82a171a984c1ffe4522de3a9a7fa4a1256836f526e4" iface="eth0" netns="" May 17 01:06:04.253084 env[1453]: 2025-05-17 01:06:04.186 [INFO][4919] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="610ba958463e0f9928b1a82a171a984c1ffe4522de3a9a7fa4a1256836f526e4" May 17 01:06:04.253084 env[1453]: 2025-05-17 01:06:04.186 [INFO][4919] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="610ba958463e0f9928b1a82a171a984c1ffe4522de3a9a7fa4a1256836f526e4" May 17 01:06:04.253084 env[1453]: 2025-05-17 01:06:04.234 [INFO][4926] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="610ba958463e0f9928b1a82a171a984c1ffe4522de3a9a7fa4a1256836f526e4" HandleID="k8s-pod-network.610ba958463e0f9928b1a82a171a984c1ffe4522de3a9a7fa4a1256836f526e4" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-calico--apiserver--7bb465f89b--fvt58-eth0" May 17 01:06:04.253084 env[1453]: 2025-05-17 01:06:04.234 [INFO][4926] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 01:06:04.253084 env[1453]: 2025-05-17 01:06:04.234 [INFO][4926] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 01:06:04.253084 env[1453]: 2025-05-17 01:06:04.246 [WARNING][4926] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="610ba958463e0f9928b1a82a171a984c1ffe4522de3a9a7fa4a1256836f526e4" HandleID="k8s-pod-network.610ba958463e0f9928b1a82a171a984c1ffe4522de3a9a7fa4a1256836f526e4" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-calico--apiserver--7bb465f89b--fvt58-eth0" May 17 01:06:04.253084 env[1453]: 2025-05-17 01:06:04.246 [INFO][4926] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="610ba958463e0f9928b1a82a171a984c1ffe4522de3a9a7fa4a1256836f526e4" HandleID="k8s-pod-network.610ba958463e0f9928b1a82a171a984c1ffe4522de3a9a7fa4a1256836f526e4" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-calico--apiserver--7bb465f89b--fvt58-eth0" May 17 01:06:04.253084 env[1453]: 2025-05-17 01:06:04.248 [INFO][4926] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 01:06:04.253084 env[1453]: 2025-05-17 01:06:04.251 [INFO][4919] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="610ba958463e0f9928b1a82a171a984c1ffe4522de3a9a7fa4a1256836f526e4" May 17 01:06:04.253796 env[1453]: time="2025-05-17T01:06:04.253762395Z" level=info msg="TearDown network for sandbox \"610ba958463e0f9928b1a82a171a984c1ffe4522de3a9a7fa4a1256836f526e4\" successfully" May 17 01:06:04.263514 env[1453]: time="2025-05-17T01:06:04.263473940Z" level=info msg="RemovePodSandbox \"610ba958463e0f9928b1a82a171a984c1ffe4522de3a9a7fa4a1256836f526e4\" returns successfully" May 17 01:06:04.264086 env[1453]: time="2025-05-17T01:06:04.264059826Z" level=info msg="StopPodSandbox for \"b1d69c6ea57ab5399fb64a7de5f173e1b3eb308ec16c87aac2c83464f92652bb\"" May 17 01:06:04.364977 env[1453]: 2025-05-17 01:06:04.320 [WARNING][4941] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b1d69c6ea57ab5399fb64a7de5f173e1b3eb308ec16c87aac2c83464f92652bb" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--56b9a5cda4-k8s-goldmane--78d55f7ddc--5zbrn-eth0", GenerateName:"goldmane-78d55f7ddc-", Namespace:"calico-system", SelfLink:"", UID:"03203f23-8aa4-41b1-ba45-7088ffc7359f", ResourceVersion:"1013", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 1, 5, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"78d55f7ddc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-56b9a5cda4", ContainerID:"e944ffa88e09044e496d3af6cd340515f00e1df8fbef4fe8f47fa51c6a4d0b11", Pod:"goldmane-78d55f7ddc-5zbrn", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.67.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali6b8f0eb970f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 01:06:04.364977 env[1453]: 2025-05-17 01:06:04.321 [INFO][4941] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="b1d69c6ea57ab5399fb64a7de5f173e1b3eb308ec16c87aac2c83464f92652bb" May 17 01:06:04.364977 env[1453]: 2025-05-17 01:06:04.321 [INFO][4941] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b1d69c6ea57ab5399fb64a7de5f173e1b3eb308ec16c87aac2c83464f92652bb" iface="eth0" netns="" May 17 01:06:04.364977 env[1453]: 2025-05-17 01:06:04.321 [INFO][4941] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="b1d69c6ea57ab5399fb64a7de5f173e1b3eb308ec16c87aac2c83464f92652bb" May 17 01:06:04.364977 env[1453]: 2025-05-17 01:06:04.321 [INFO][4941] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b1d69c6ea57ab5399fb64a7de5f173e1b3eb308ec16c87aac2c83464f92652bb" May 17 01:06:04.364977 env[1453]: 2025-05-17 01:06:04.351 [INFO][4948] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b1d69c6ea57ab5399fb64a7de5f173e1b3eb308ec16c87aac2c83464f92652bb" HandleID="k8s-pod-network.b1d69c6ea57ab5399fb64a7de5f173e1b3eb308ec16c87aac2c83464f92652bb" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-goldmane--78d55f7ddc--5zbrn-eth0" May 17 01:06:04.364977 env[1453]: 2025-05-17 01:06:04.351 [INFO][4948] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 01:06:04.364977 env[1453]: 2025-05-17 01:06:04.351 [INFO][4948] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 01:06:04.364977 env[1453]: 2025-05-17 01:06:04.359 [WARNING][4948] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b1d69c6ea57ab5399fb64a7de5f173e1b3eb308ec16c87aac2c83464f92652bb" HandleID="k8s-pod-network.b1d69c6ea57ab5399fb64a7de5f173e1b3eb308ec16c87aac2c83464f92652bb" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-goldmane--78d55f7ddc--5zbrn-eth0" May 17 01:06:04.364977 env[1453]: 2025-05-17 01:06:04.359 [INFO][4948] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b1d69c6ea57ab5399fb64a7de5f173e1b3eb308ec16c87aac2c83464f92652bb" HandleID="k8s-pod-network.b1d69c6ea57ab5399fb64a7de5f173e1b3eb308ec16c87aac2c83464f92652bb" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-goldmane--78d55f7ddc--5zbrn-eth0" May 17 01:06:04.364977 env[1453]: 2025-05-17 01:06:04.361 [INFO][4948] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 01:06:04.364977 env[1453]: 2025-05-17 01:06:04.363 [INFO][4941] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="b1d69c6ea57ab5399fb64a7de5f173e1b3eb308ec16c87aac2c83464f92652bb" May 17 01:06:04.365547 env[1453]: time="2025-05-17T01:06:04.365509437Z" level=info msg="TearDown network for sandbox \"b1d69c6ea57ab5399fb64a7de5f173e1b3eb308ec16c87aac2c83464f92652bb\" successfully" May 17 01:06:04.365620 env[1453]: time="2025-05-17T01:06:04.365604118Z" level=info msg="StopPodSandbox for \"b1d69c6ea57ab5399fb64a7de5f173e1b3eb308ec16c87aac2c83464f92652bb\" returns successfully" May 17 01:06:04.366140 env[1453]: time="2025-05-17T01:06:04.366118723Z" level=info msg="RemovePodSandbox for \"b1d69c6ea57ab5399fb64a7de5f173e1b3eb308ec16c87aac2c83464f92652bb\"" May 17 01:06:04.366264 env[1453]: time="2025-05-17T01:06:04.366227924Z" level=info msg="Forcibly stopping sandbox \"b1d69c6ea57ab5399fb64a7de5f173e1b3eb308ec16c87aac2c83464f92652bb\"" May 17 01:06:04.494717 env[1453]: 2025-05-17 01:06:04.429 [WARNING][4963] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b1d69c6ea57ab5399fb64a7de5f173e1b3eb308ec16c87aac2c83464f92652bb" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--56b9a5cda4-k8s-goldmane--78d55f7ddc--5zbrn-eth0", GenerateName:"goldmane-78d55f7ddc-", Namespace:"calico-system", SelfLink:"", UID:"03203f23-8aa4-41b1-ba45-7088ffc7359f", ResourceVersion:"1013", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 1, 5, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"78d55f7ddc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-56b9a5cda4", ContainerID:"e944ffa88e09044e496d3af6cd340515f00e1df8fbef4fe8f47fa51c6a4d0b11", Pod:"goldmane-78d55f7ddc-5zbrn", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.67.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali6b8f0eb970f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 01:06:04.494717 env[1453]: 2025-05-17 01:06:04.429 [INFO][4963] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="b1d69c6ea57ab5399fb64a7de5f173e1b3eb308ec16c87aac2c83464f92652bb" May 17 01:06:04.494717 env[1453]: 2025-05-17 01:06:04.429 [INFO][4963] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b1d69c6ea57ab5399fb64a7de5f173e1b3eb308ec16c87aac2c83464f92652bb" iface="eth0" netns="" May 17 01:06:04.494717 env[1453]: 2025-05-17 01:06:04.429 [INFO][4963] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="b1d69c6ea57ab5399fb64a7de5f173e1b3eb308ec16c87aac2c83464f92652bb" May 17 01:06:04.494717 env[1453]: 2025-05-17 01:06:04.429 [INFO][4963] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b1d69c6ea57ab5399fb64a7de5f173e1b3eb308ec16c87aac2c83464f92652bb" May 17 01:06:04.494717 env[1453]: 2025-05-17 01:06:04.482 [INFO][4970] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b1d69c6ea57ab5399fb64a7de5f173e1b3eb308ec16c87aac2c83464f92652bb" HandleID="k8s-pod-network.b1d69c6ea57ab5399fb64a7de5f173e1b3eb308ec16c87aac2c83464f92652bb" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-goldmane--78d55f7ddc--5zbrn-eth0" May 17 01:06:04.494717 env[1453]: 2025-05-17 01:06:04.482 [INFO][4970] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 01:06:04.494717 env[1453]: 2025-05-17 01:06:04.482 [INFO][4970] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 01:06:04.494717 env[1453]: 2025-05-17 01:06:04.490 [WARNING][4970] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b1d69c6ea57ab5399fb64a7de5f173e1b3eb308ec16c87aac2c83464f92652bb" HandleID="k8s-pod-network.b1d69c6ea57ab5399fb64a7de5f173e1b3eb308ec16c87aac2c83464f92652bb" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-goldmane--78d55f7ddc--5zbrn-eth0" May 17 01:06:04.494717 env[1453]: 2025-05-17 01:06:04.491 [INFO][4970] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b1d69c6ea57ab5399fb64a7de5f173e1b3eb308ec16c87aac2c83464f92652bb" HandleID="k8s-pod-network.b1d69c6ea57ab5399fb64a7de5f173e1b3eb308ec16c87aac2c83464f92652bb" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-goldmane--78d55f7ddc--5zbrn-eth0" May 17 01:06:04.494717 env[1453]: 2025-05-17 01:06:04.492 [INFO][4970] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 01:06:04.494717 env[1453]: 2025-05-17 01:06:04.493 [INFO][4963] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="b1d69c6ea57ab5399fb64a7de5f173e1b3eb308ec16c87aac2c83464f92652bb" May 17 01:06:04.495261 env[1453]: time="2025-05-17T01:06:04.495226471Z" level=info msg="TearDown network for sandbox \"b1d69c6ea57ab5399fb64a7de5f173e1b3eb308ec16c87aac2c83464f92652bb\" successfully" May 17 01:06:04.505994 env[1453]: time="2025-05-17T01:06:04.505955066Z" level=info msg="RemovePodSandbox \"b1d69c6ea57ab5399fb64a7de5f173e1b3eb308ec16c87aac2c83464f92652bb\" returns successfully" May 17 01:06:04.506581 env[1453]: time="2025-05-17T01:06:04.506557193Z" level=info msg="StopPodSandbox for \"d8d53e1ffbd96b36ed34faf1651e0037b61be31cf3b663b79071d8a7e1a490cb\"" May 17 01:06:04.618830 env[1453]: 2025-05-17 01:06:04.565 [WARNING][4986] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="d8d53e1ffbd96b36ed34faf1651e0037b61be31cf3b663b79071d8a7e1a490cb" WorkloadEndpoint="ci--3510.3.7--n--56b9a5cda4-k8s-whisker--bdc7b675d--kkllc-eth0" May 17 01:06:04.618830 env[1453]: 2025-05-17 01:06:04.565 [INFO][4986] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="d8d53e1ffbd96b36ed34faf1651e0037b61be31cf3b663b79071d8a7e1a490cb" May 17 01:06:04.618830 env[1453]: 2025-05-17 01:06:04.565 [INFO][4986] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d8d53e1ffbd96b36ed34faf1651e0037b61be31cf3b663b79071d8a7e1a490cb" iface="eth0" netns="" May 17 01:06:04.618830 env[1453]: 2025-05-17 01:06:04.566 [INFO][4986] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="d8d53e1ffbd96b36ed34faf1651e0037b61be31cf3b663b79071d8a7e1a490cb" May 17 01:06:04.618830 env[1453]: 2025-05-17 01:06:04.566 [INFO][4986] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d8d53e1ffbd96b36ed34faf1651e0037b61be31cf3b663b79071d8a7e1a490cb" May 17 01:06:04.618830 env[1453]: 2025-05-17 01:06:04.601 [INFO][4993] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d8d53e1ffbd96b36ed34faf1651e0037b61be31cf3b663b79071d8a7e1a490cb" HandleID="k8s-pod-network.d8d53e1ffbd96b36ed34faf1651e0037b61be31cf3b663b79071d8a7e1a490cb" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-whisker--bdc7b675d--kkllc-eth0" May 17 01:06:04.618830 env[1453]: 2025-05-17 01:06:04.601 [INFO][4993] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 01:06:04.618830 env[1453]: 2025-05-17 01:06:04.602 [INFO][4993] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 01:06:04.618830 env[1453]: 2025-05-17 01:06:04.612 [WARNING][4993] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d8d53e1ffbd96b36ed34faf1651e0037b61be31cf3b663b79071d8a7e1a490cb" HandleID="k8s-pod-network.d8d53e1ffbd96b36ed34faf1651e0037b61be31cf3b663b79071d8a7e1a490cb" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-whisker--bdc7b675d--kkllc-eth0" May 17 01:06:04.618830 env[1453]: 2025-05-17 01:06:04.612 [INFO][4993] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d8d53e1ffbd96b36ed34faf1651e0037b61be31cf3b663b79071d8a7e1a490cb" HandleID="k8s-pod-network.d8d53e1ffbd96b36ed34faf1651e0037b61be31cf3b663b79071d8a7e1a490cb" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-whisker--bdc7b675d--kkllc-eth0" May 17 01:06:04.618830 env[1453]: 2025-05-17 01:06:04.616 [INFO][4993] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 01:06:04.618830 env[1453]: 2025-05-17 01:06:04.617 [INFO][4986] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="d8d53e1ffbd96b36ed34faf1651e0037b61be31cf3b663b79071d8a7e1a490cb" May 17 01:06:04.619351 env[1453]: time="2025-05-17T01:06:04.619315565Z" level=info msg="TearDown network for sandbox \"d8d53e1ffbd96b36ed34faf1651e0037b61be31cf3b663b79071d8a7e1a490cb\" successfully" May 17 01:06:04.619417 env[1453]: time="2025-05-17T01:06:04.619401206Z" level=info msg="StopPodSandbox for \"d8d53e1ffbd96b36ed34faf1651e0037b61be31cf3b663b79071d8a7e1a490cb\" returns successfully" May 17 01:06:04.620309 env[1453]: time="2025-05-17T01:06:04.620280855Z" level=info msg="RemovePodSandbox for \"d8d53e1ffbd96b36ed34faf1651e0037b61be31cf3b663b79071d8a7e1a490cb\"" May 17 01:06:04.620454 env[1453]: time="2025-05-17T01:06:04.620416417Z" level=info msg="Forcibly stopping sandbox \"d8d53e1ffbd96b36ed34faf1651e0037b61be31cf3b663b79071d8a7e1a490cb\"" May 17 01:06:04.735440 env[1453]: 2025-05-17 01:06:04.666 [WARNING][5008] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="d8d53e1ffbd96b36ed34faf1651e0037b61be31cf3b663b79071d8a7e1a490cb" WorkloadEndpoint="ci--3510.3.7--n--56b9a5cda4-k8s-whisker--bdc7b675d--kkllc-eth0" May 17 01:06:04.735440 env[1453]: 2025-05-17 01:06:04.666 [INFO][5008] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="d8d53e1ffbd96b36ed34faf1651e0037b61be31cf3b663b79071d8a7e1a490cb" May 17 01:06:04.735440 env[1453]: 2025-05-17 01:06:04.666 [INFO][5008] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d8d53e1ffbd96b36ed34faf1651e0037b61be31cf3b663b79071d8a7e1a490cb" iface="eth0" netns="" May 17 01:06:04.735440 env[1453]: 2025-05-17 01:06:04.666 [INFO][5008] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="d8d53e1ffbd96b36ed34faf1651e0037b61be31cf3b663b79071d8a7e1a490cb" May 17 01:06:04.735440 env[1453]: 2025-05-17 01:06:04.666 [INFO][5008] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d8d53e1ffbd96b36ed34faf1651e0037b61be31cf3b663b79071d8a7e1a490cb" May 17 01:06:04.735440 env[1453]: 2025-05-17 01:06:04.706 [INFO][5017] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d8d53e1ffbd96b36ed34faf1651e0037b61be31cf3b663b79071d8a7e1a490cb" HandleID="k8s-pod-network.d8d53e1ffbd96b36ed34faf1651e0037b61be31cf3b663b79071d8a7e1a490cb" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-whisker--bdc7b675d--kkllc-eth0" May 17 01:06:04.735440 env[1453]: 2025-05-17 01:06:04.707 [INFO][5017] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 01:06:04.735440 env[1453]: 2025-05-17 01:06:04.707 [INFO][5017] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 01:06:04.735440 env[1453]: 2025-05-17 01:06:04.723 [WARNING][5017] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d8d53e1ffbd96b36ed34faf1651e0037b61be31cf3b663b79071d8a7e1a490cb" HandleID="k8s-pod-network.d8d53e1ffbd96b36ed34faf1651e0037b61be31cf3b663b79071d8a7e1a490cb" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-whisker--bdc7b675d--kkllc-eth0" May 17 01:06:04.735440 env[1453]: 2025-05-17 01:06:04.723 [INFO][5017] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d8d53e1ffbd96b36ed34faf1651e0037b61be31cf3b663b79071d8a7e1a490cb" HandleID="k8s-pod-network.d8d53e1ffbd96b36ed34faf1651e0037b61be31cf3b663b79071d8a7e1a490cb" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-whisker--bdc7b675d--kkllc-eth0" May 17 01:06:04.735440 env[1453]: 2025-05-17 01:06:04.733 [INFO][5017] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 01:06:04.735440 env[1453]: 2025-05-17 01:06:04.734 [INFO][5008] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="d8d53e1ffbd96b36ed34faf1651e0037b61be31cf3b663b79071d8a7e1a490cb" May 17 01:06:04.735957 env[1453]: time="2025-05-17T01:06:04.735905018Z" level=info msg="TearDown network for sandbox \"d8d53e1ffbd96b36ed34faf1651e0037b61be31cf3b663b79071d8a7e1a490cb\" successfully" May 17 01:06:05.469630 env[1453]: time="2025-05-17T01:06:05.469579368Z" level=info msg="RemovePodSandbox \"d8d53e1ffbd96b36ed34faf1651e0037b61be31cf3b663b79071d8a7e1a490cb\" returns successfully" May 17 01:06:05.470066 env[1453]: time="2025-05-17T01:06:05.470046733Z" level=info msg="StopPodSandbox for \"9072d164c4b0ab1b8fcbbc155386f04e51ae75d013e86d406f43955febebbded\"" May 17 01:06:05.541850 env[1453]: time="2025-05-17T01:06:05.541794936Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:06:05.555450 env[1453]: time="2025-05-17T01:06:05.555415361Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0d503660232383641bf9af3b7e4ef066c0e96a8ec586f123e5b56b6a196c983d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:06:05.566057 env[1453]: time="2025-05-17T01:06:05.566019593Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:06:05.572782 env[1453]: 2025-05-17 01:06:05.523 [WARNING][5031] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9072d164c4b0ab1b8fcbbc155386f04e51ae75d013e86d406f43955febebbded" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--56b9a5cda4-k8s-calico--kube--controllers--f6596879f--8tb74-eth0", GenerateName:"calico-kube-controllers-f6596879f-", Namespace:"calico-system", SelfLink:"", UID:"cbd568ae-4e42-43d9-8aad-56b7909a49ad", ResourceVersion:"1045", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 1, 5, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"f6596879f", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-56b9a5cda4", ContainerID:"44353239d42685c072fdcb8fa672e01b108759db2637eb09642f287487464d04", Pod:"calico-kube-controllers-f6596879f-8tb74", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.67.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali9483adea922", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 01:06:05.572782 env[1453]: 2025-05-17 01:06:05.523 [INFO][5031] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="9072d164c4b0ab1b8fcbbc155386f04e51ae75d013e86d406f43955febebbded" May 17 01:06:05.572782 env[1453]: 2025-05-17 01:06:05.523 [INFO][5031] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9072d164c4b0ab1b8fcbbc155386f04e51ae75d013e86d406f43955febebbded" iface="eth0" netns="" May 17 01:06:05.572782 env[1453]: 2025-05-17 01:06:05.523 [INFO][5031] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="9072d164c4b0ab1b8fcbbc155386f04e51ae75d013e86d406f43955febebbded" May 17 01:06:05.572782 env[1453]: 2025-05-17 01:06:05.523 [INFO][5031] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9072d164c4b0ab1b8fcbbc155386f04e51ae75d013e86d406f43955febebbded" May 17 01:06:05.572782 env[1453]: 2025-05-17 01:06:05.548 [INFO][5038] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9072d164c4b0ab1b8fcbbc155386f04e51ae75d013e86d406f43955febebbded" HandleID="k8s-pod-network.9072d164c4b0ab1b8fcbbc155386f04e51ae75d013e86d406f43955febebbded" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-calico--kube--controllers--f6596879f--8tb74-eth0" May 17 01:06:05.572782 env[1453]: 2025-05-17 01:06:05.548 [INFO][5038] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 01:06:05.572782 env[1453]: 2025-05-17 01:06:05.549 [INFO][5038] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 01:06:05.572782 env[1453]: 2025-05-17 01:06:05.565 [WARNING][5038] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9072d164c4b0ab1b8fcbbc155386f04e51ae75d013e86d406f43955febebbded" HandleID="k8s-pod-network.9072d164c4b0ab1b8fcbbc155386f04e51ae75d013e86d406f43955febebbded" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-calico--kube--controllers--f6596879f--8tb74-eth0" May 17 01:06:05.572782 env[1453]: 2025-05-17 01:06:05.565 [INFO][5038] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9072d164c4b0ab1b8fcbbc155386f04e51ae75d013e86d406f43955febebbded" HandleID="k8s-pod-network.9072d164c4b0ab1b8fcbbc155386f04e51ae75d013e86d406f43955febebbded" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-calico--kube--controllers--f6596879f--8tb74-eth0" May 17 01:06:05.572782 env[1453]: 2025-05-17 01:06:05.569 [INFO][5038] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 01:06:05.572782 env[1453]: 2025-05-17 01:06:05.571 [INFO][5031] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="9072d164c4b0ab1b8fcbbc155386f04e51ae75d013e86d406f43955febebbded" May 17 01:06:05.573250 env[1453]: time="2025-05-17T01:06:05.573223070Z" level=info msg="TearDown network for sandbox \"9072d164c4b0ab1b8fcbbc155386f04e51ae75d013e86d406f43955febebbded\" successfully" May 17 01:06:05.573315 env[1453]: time="2025-05-17T01:06:05.573299911Z" level=info msg="StopPodSandbox for \"9072d164c4b0ab1b8fcbbc155386f04e51ae75d013e86d406f43955febebbded\" returns successfully" May 17 01:06:05.573953 env[1453]: time="2025-05-17T01:06:05.573906837Z" level=info msg="RemovePodSandbox for \"9072d164c4b0ab1b8fcbbc155386f04e51ae75d013e86d406f43955febebbded\"" May 17 01:06:05.574032 env[1453]: time="2025-05-17T01:06:05.573946598Z" level=info msg="Forcibly stopping sandbox \"9072d164c4b0ab1b8fcbbc155386f04e51ae75d013e86d406f43955febebbded\"" May 17 01:06:05.574988 env[1453]: time="2025-05-17T01:06:05.574957048Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:ad7d2e76f15777636c5d91c108d7655659b38fe8970255050ffa51223eb96ff4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:06:05.575358 env[1453]: time="2025-05-17T01:06:05.575331892Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\" returns image reference \"sha256:0d503660232383641bf9af3b7e4ef066c0e96a8ec586f123e5b56b6a196c983d\"" May 17 01:06:05.577635 env[1453]: time="2025-05-17T01:06:05.577604756Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\"" May 17 01:06:05.578739 env[1453]: time="2025-05-17T01:06:05.578699568Z" level=info msg="CreateContainer within sandbox \"e5b87d20810f62b922f355486e36fd392536e7386a21dac4aa825af6fa3957f3\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 17 01:06:05.619218 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1258344911.mount: Deactivated successfully. May 17 01:06:05.637441 env[1453]: time="2025-05-17T01:06:05.637389632Z" level=info msg="CreateContainer within sandbox \"e5b87d20810f62b922f355486e36fd392536e7386a21dac4aa825af6fa3957f3\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"71ae9b8830cf1dd47d5944817e7419b568b0b38fed00e93d3e28a50730a00056\"" May 17 01:06:05.639749 env[1453]: time="2025-05-17T01:06:05.639711737Z" level=info msg="StartContainer for \"71ae9b8830cf1dd47d5944817e7419b568b0b38fed00e93d3e28a50730a00056\"" May 17 01:06:05.661058 systemd[1]: Started cri-containerd-71ae9b8830cf1dd47d5944817e7419b568b0b38fed00e93d3e28a50730a00056.scope. May 17 01:06:05.689535 kernel: kauditd_printk_skb: 506 callbacks suppressed May 17 01:06:05.689646 kernel: audit: type=1400 audit(1747443965.683:1223): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:05.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:05.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:05.722990 kernel: audit: type=1400 audit(1747443965.683:1224): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:05.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:05.745773 kernel: audit: type=1400 audit(1747443965.683:1225): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:05.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:05.775046 kernel: audit: type=1400 audit(1747443965.683:1226): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:05.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:05.799477 kernel: audit: type=1400 audit(1747443965.683:1227): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:05.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:05.823562 kernel: audit: type=1400 audit(1747443965.683:1228): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:05.823635 env[1453]: 2025-05-17 01:06:05.634 [WARNING][5052] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9072d164c4b0ab1b8fcbbc155386f04e51ae75d013e86d406f43955febebbded" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--56b9a5cda4-k8s-calico--kube--controllers--f6596879f--8tb74-eth0", GenerateName:"calico-kube-controllers-f6596879f-", Namespace:"calico-system", SelfLink:"", UID:"cbd568ae-4e42-43d9-8aad-56b7909a49ad", ResourceVersion:"1045", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 1, 5, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"f6596879f", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-56b9a5cda4", ContainerID:"44353239d42685c072fdcb8fa672e01b108759db2637eb09642f287487464d04", Pod:"calico-kube-controllers-f6596879f-8tb74", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.67.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali9483adea922", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 01:06:05.823635 env[1453]: 2025-05-17 01:06:05.636 [INFO][5052] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="9072d164c4b0ab1b8fcbbc155386f04e51ae75d013e86d406f43955febebbded" May 17 01:06:05.823635 env[1453]: 2025-05-17 01:06:05.636 [INFO][5052] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9072d164c4b0ab1b8fcbbc155386f04e51ae75d013e86d406f43955febebbded" iface="eth0" netns="" May 17 01:06:05.823635 env[1453]: 2025-05-17 01:06:05.636 [INFO][5052] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="9072d164c4b0ab1b8fcbbc155386f04e51ae75d013e86d406f43955febebbded" May 17 01:06:05.823635 env[1453]: 2025-05-17 01:06:05.636 [INFO][5052] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9072d164c4b0ab1b8fcbbc155386f04e51ae75d013e86d406f43955febebbded" May 17 01:06:05.823635 env[1453]: 2025-05-17 01:06:05.753 [INFO][5059] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9072d164c4b0ab1b8fcbbc155386f04e51ae75d013e86d406f43955febebbded" HandleID="k8s-pod-network.9072d164c4b0ab1b8fcbbc155386f04e51ae75d013e86d406f43955febebbded" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-calico--kube--controllers--f6596879f--8tb74-eth0" May 17 01:06:05.823635 env[1453]: 2025-05-17 01:06:05.753 [INFO][5059] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 01:06:05.823635 env[1453]: 2025-05-17 01:06:05.753 [INFO][5059] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 01:06:05.823635 env[1453]: 2025-05-17 01:06:05.801 [WARNING][5059] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9072d164c4b0ab1b8fcbbc155386f04e51ae75d013e86d406f43955febebbded" HandleID="k8s-pod-network.9072d164c4b0ab1b8fcbbc155386f04e51ae75d013e86d406f43955febebbded" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-calico--kube--controllers--f6596879f--8tb74-eth0" May 17 01:06:05.823635 env[1453]: 2025-05-17 01:06:05.801 [INFO][5059] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9072d164c4b0ab1b8fcbbc155386f04e51ae75d013e86d406f43955febebbded" HandleID="k8s-pod-network.9072d164c4b0ab1b8fcbbc155386f04e51ae75d013e86d406f43955febebbded" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-calico--kube--controllers--f6596879f--8tb74-eth0" May 17 01:06:05.823635 env[1453]: 2025-05-17 01:06:05.803 [INFO][5059] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 01:06:05.823635 env[1453]: 2025-05-17 01:06:05.804 [INFO][5052] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="9072d164c4b0ab1b8fcbbc155386f04e51ae75d013e86d406f43955febebbded" May 17 01:06:05.823635 env[1453]: time="2025-05-17T01:06:05.806298987Z" level=info msg="TearDown network for sandbox \"9072d164c4b0ab1b8fcbbc155386f04e51ae75d013e86d406f43955febebbded\" successfully" May 17 01:06:05.823635 env[1453]: time="2025-05-17T01:06:05.815693847Z" level=info msg="RemovePodSandbox \"9072d164c4b0ab1b8fcbbc155386f04e51ae75d013e86d406f43955febebbded\" returns successfully" May 17 01:06:05.823635 env[1453]: time="2025-05-17T01:06:05.816141052Z" level=info msg="StopPodSandbox for \"eaf4d6f751910ded5debcb0a407fe1647f085c1e88db7649e0bcc6fa4fbff0e0\"" May 17 01:06:05.826365 env[1453]: time="2025-05-17T01:06:05.826321080Z" level=info msg="StartContainer for \"71ae9b8830cf1dd47d5944817e7419b568b0b38fed00e93d3e28a50730a00056\" returns successfully" May 17 01:06:05.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:05.858399 kernel: audit: type=1400 audit(1747443965.683:1229): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:05.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:05.894281 kernel: audit: type=1400 audit(1747443965.683:1230): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:05.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:05.912023 kernel: audit: type=1400 audit(1747443965.683:1231): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:05.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:05.929804 kernel: audit: type=1400 audit(1747443965.688:1232): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:05.688000 audit: BPF prog-id=200 op=LOAD May 17 01:06:05.689000 audit[5069]: AVC avc: denied { bpf } for pid=5069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:05.689000 audit[5069]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4308 pid=5069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:06:05.689000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731616539623838333063663164643437643539343438313765373431 May 17 01:06:05.689000 audit[5069]: AVC avc: denied { perfmon } for pid=5069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:05.689000 audit[5069]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4308 pid=5069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:06:05.689000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731616539623838333063663164643437643539343438313765373431 May 17 01:06:05.689000 audit[5069]: AVC avc: denied { bpf } for pid=5069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:05.689000 audit[5069]: AVC avc: denied { bpf } for pid=5069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:05.689000 audit[5069]: AVC avc: denied { bpf } for pid=5069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:05.689000 audit[5069]: AVC avc: denied { perfmon } for pid=5069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:05.689000 audit[5069]: AVC avc: denied { perfmon } for pid=5069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:05.689000 audit[5069]: AVC avc: denied { perfmon } for pid=5069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:05.689000 audit[5069]: AVC avc: denied { perfmon } for pid=5069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:05.689000 audit[5069]: AVC avc: denied { perfmon } for pid=5069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:05.689000 audit[5069]: AVC avc: denied { bpf } for pid=5069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:05.689000 audit[5069]: AVC avc: denied { bpf } for pid=5069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:05.689000 audit: BPF prog-id=201 op=LOAD May 17 01:06:05.689000 audit[5069]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4308 pid=5069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:06:05.689000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731616539623838333063663164643437643539343438313765373431 May 17 01:06:05.747000 audit[5069]: AVC avc: denied { bpf } for pid=5069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:05.747000 audit[5069]: AVC avc: denied { bpf } for pid=5069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:05.747000 audit[5069]: AVC avc: denied { perfmon } for pid=5069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:05.747000 audit[5069]: AVC avc: denied { perfmon } for pid=5069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:05.747000 audit[5069]: AVC avc: denied { perfmon } for pid=5069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:05.747000 audit[5069]: AVC avc: denied { perfmon } for pid=5069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:05.747000 audit[5069]: AVC avc: denied { perfmon } for pid=5069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:05.747000 audit[5069]: AVC avc: denied { bpf } for pid=5069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:05.747000 audit[5069]: AVC avc: denied { bpf } for pid=5069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:05.747000 audit: BPF prog-id=202 op=LOAD May 17 01:06:05.747000 audit[5069]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4308 pid=5069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:06:05.747000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731616539623838333063663164643437643539343438313765373431 May 17 01:06:05.747000 audit: BPF prog-id=202 op=UNLOAD May 17 01:06:05.747000 audit: BPF prog-id=201 op=UNLOAD May 17 01:06:05.747000 audit[5069]: AVC avc: denied { bpf } for pid=5069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:05.747000 audit[5069]: AVC avc: denied { bpf } for pid=5069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:05.747000 audit[5069]: AVC avc: denied { bpf } for pid=5069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:05.747000 audit[5069]: AVC avc: denied { perfmon } for pid=5069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:05.747000 audit[5069]: AVC avc: denied { perfmon } for pid=5069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:05.747000 audit[5069]: AVC avc: denied { perfmon } for pid=5069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:05.747000 audit[5069]: AVC avc: denied { perfmon } for pid=5069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:05.747000 audit[5069]: AVC avc: denied { perfmon } for pid=5069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:05.747000 audit[5069]: AVC avc: denied { bpf } for pid=5069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:05.747000 audit[5069]: AVC avc: denied { bpf } for pid=5069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:05.747000 audit: BPF prog-id=203 op=LOAD May 17 01:06:05.747000 audit[5069]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4308 pid=5069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:06:05.747000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731616539623838333063663164643437643539343438313765373431 May 17 01:06:06.013881 env[1453]: 2025-05-17 01:06:05.954 [WARNING][5107] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="eaf4d6f751910ded5debcb0a407fe1647f085c1e88db7649e0bcc6fa4fbff0e0" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--56b9a5cda4-k8s-calico--apiserver--7bb465f89b--nhrhw-eth0", GenerateName:"calico-apiserver-7bb465f89b-", Namespace:"calico-apiserver", SelfLink:"", UID:"70b64262-db16-4665-bc8a-83aa2db3b33c", ResourceVersion:"991", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 1, 5, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7bb465f89b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-56b9a5cda4", ContainerID:"e5b87d20810f62b922f355486e36fd392536e7386a21dac4aa825af6fa3957f3", Pod:"calico-apiserver-7bb465f89b-nhrhw", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.67.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali6e19ad380a9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 01:06:06.013881 env[1453]: 2025-05-17 01:06:05.954 [INFO][5107] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="eaf4d6f751910ded5debcb0a407fe1647f085c1e88db7649e0bcc6fa4fbff0e0" May 17 01:06:06.013881 env[1453]: 2025-05-17 01:06:05.954 [INFO][5107] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="eaf4d6f751910ded5debcb0a407fe1647f085c1e88db7649e0bcc6fa4fbff0e0" iface="eth0" netns="" May 17 01:06:06.013881 env[1453]: 2025-05-17 01:06:05.954 [INFO][5107] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="eaf4d6f751910ded5debcb0a407fe1647f085c1e88db7649e0bcc6fa4fbff0e0" May 17 01:06:06.013881 env[1453]: 2025-05-17 01:06:05.954 [INFO][5107] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="eaf4d6f751910ded5debcb0a407fe1647f085c1e88db7649e0bcc6fa4fbff0e0" May 17 01:06:06.013881 env[1453]: 2025-05-17 01:06:05.973 [INFO][5114] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="eaf4d6f751910ded5debcb0a407fe1647f085c1e88db7649e0bcc6fa4fbff0e0" HandleID="k8s-pod-network.eaf4d6f751910ded5debcb0a407fe1647f085c1e88db7649e0bcc6fa4fbff0e0" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-calico--apiserver--7bb465f89b--nhrhw-eth0" May 17 01:06:06.013881 env[1453]: 2025-05-17 01:06:05.973 [INFO][5114] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 01:06:06.013881 env[1453]: 2025-05-17 01:06:05.973 [INFO][5114] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 01:06:06.013881 env[1453]: 2025-05-17 01:06:06.008 [WARNING][5114] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="eaf4d6f751910ded5debcb0a407fe1647f085c1e88db7649e0bcc6fa4fbff0e0" HandleID="k8s-pod-network.eaf4d6f751910ded5debcb0a407fe1647f085c1e88db7649e0bcc6fa4fbff0e0" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-calico--apiserver--7bb465f89b--nhrhw-eth0" May 17 01:06:06.013881 env[1453]: 2025-05-17 01:06:06.009 [INFO][5114] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="eaf4d6f751910ded5debcb0a407fe1647f085c1e88db7649e0bcc6fa4fbff0e0" HandleID="k8s-pod-network.eaf4d6f751910ded5debcb0a407fe1647f085c1e88db7649e0bcc6fa4fbff0e0" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-calico--apiserver--7bb465f89b--nhrhw-eth0" May 17 01:06:06.013881 env[1453]: 2025-05-17 01:06:06.011 [INFO][5114] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 01:06:06.013881 env[1453]: 2025-05-17 01:06:06.012 [INFO][5107] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="eaf4d6f751910ded5debcb0a407fe1647f085c1e88db7649e0bcc6fa4fbff0e0" May 17 01:06:06.014422 env[1453]: time="2025-05-17T01:06:06.014393158Z" level=info msg="TearDown network for sandbox \"eaf4d6f751910ded5debcb0a407fe1647f085c1e88db7649e0bcc6fa4fbff0e0\" successfully" May 17 01:06:06.014494 env[1453]: time="2025-05-17T01:06:06.014479239Z" level=info msg="StopPodSandbox for \"eaf4d6f751910ded5debcb0a407fe1647f085c1e88db7649e0bcc6fa4fbff0e0\" returns successfully" May 17 01:06:06.016670 env[1453]: time="2025-05-17T01:06:06.016645101Z" level=info msg="RemovePodSandbox for \"eaf4d6f751910ded5debcb0a407fe1647f085c1e88db7649e0bcc6fa4fbff0e0\"" May 17 01:06:06.016846 env[1453]: time="2025-05-17T01:06:06.016807663Z" level=info msg="Forcibly stopping sandbox \"eaf4d6f751910ded5debcb0a407fe1647f085c1e88db7649e0bcc6fa4fbff0e0\"" May 17 01:06:06.046545 env[1453]: time="2025-05-17T01:06:06.046503735Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:06:06.055188 env[1453]: time="2025-05-17T01:06:06.055153106Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:0d503660232383641bf9af3b7e4ef066c0e96a8ec586f123e5b56b6a196c983d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:06:06.065423 env[1453]: time="2025-05-17T01:06:06.065388294Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:06:06.073380 env[1453]: time="2025-05-17T01:06:06.073348857Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:ad7d2e76f15777636c5d91c108d7655659b38fe8970255050ffa51223eb96ff4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:06:06.073721 env[1453]: time="2025-05-17T01:06:06.073698341Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\" returns image reference \"sha256:0d503660232383641bf9af3b7e4ef066c0e96a8ec586f123e5b56b6a196c983d\"" May 17 01:06:06.078236 env[1453]: time="2025-05-17T01:06:06.078207989Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.0\"" May 17 01:06:06.079095 env[1453]: time="2025-05-17T01:06:06.079067718Z" level=info msg="CreateContainer within sandbox \"069385844eb799407dcf6e76a53053e1fd21e444114d019586abe772844ce150\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 17 01:06:06.139229 env[1453]: time="2025-05-17T01:06:06.139182790Z" level=info msg="CreateContainer within sandbox \"069385844eb799407dcf6e76a53053e1fd21e444114d019586abe772844ce150\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"419a41cbd3b98529df077049a99ebb68f17050902106bcc0e11307523371de4a\"" May 17 01:06:06.141730 env[1453]: time="2025-05-17T01:06:06.141444773Z" level=info msg="StartContainer for \"419a41cbd3b98529df077049a99ebb68f17050902106bcc0e11307523371de4a\"" May 17 01:06:06.162313 env[1453]: 2025-05-17 01:06:06.099 [WARNING][5140] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="eaf4d6f751910ded5debcb0a407fe1647f085c1e88db7649e0bcc6fa4fbff0e0" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--56b9a5cda4-k8s-calico--apiserver--7bb465f89b--nhrhw-eth0", GenerateName:"calico-apiserver-7bb465f89b-", Namespace:"calico-apiserver", SelfLink:"", UID:"70b64262-db16-4665-bc8a-83aa2db3b33c", ResourceVersion:"991", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 1, 5, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7bb465f89b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-56b9a5cda4", ContainerID:"e5b87d20810f62b922f355486e36fd392536e7386a21dac4aa825af6fa3957f3", Pod:"calico-apiserver-7bb465f89b-nhrhw", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.67.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali6e19ad380a9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 01:06:06.162313 env[1453]: 2025-05-17 01:06:06.099 [INFO][5140] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="eaf4d6f751910ded5debcb0a407fe1647f085c1e88db7649e0bcc6fa4fbff0e0" May 17 01:06:06.162313 env[1453]: 2025-05-17 01:06:06.099 [INFO][5140] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="eaf4d6f751910ded5debcb0a407fe1647f085c1e88db7649e0bcc6fa4fbff0e0" iface="eth0" netns="" May 17 01:06:06.162313 env[1453]: 2025-05-17 01:06:06.099 [INFO][5140] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="eaf4d6f751910ded5debcb0a407fe1647f085c1e88db7649e0bcc6fa4fbff0e0" May 17 01:06:06.162313 env[1453]: 2025-05-17 01:06:06.099 [INFO][5140] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="eaf4d6f751910ded5debcb0a407fe1647f085c1e88db7649e0bcc6fa4fbff0e0" May 17 01:06:06.162313 env[1453]: 2025-05-17 01:06:06.135 [INFO][5147] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="eaf4d6f751910ded5debcb0a407fe1647f085c1e88db7649e0bcc6fa4fbff0e0" HandleID="k8s-pod-network.eaf4d6f751910ded5debcb0a407fe1647f085c1e88db7649e0bcc6fa4fbff0e0" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-calico--apiserver--7bb465f89b--nhrhw-eth0" May 17 01:06:06.162313 env[1453]: 2025-05-17 01:06:06.135 [INFO][5147] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 01:06:06.162313 env[1453]: 2025-05-17 01:06:06.139 [INFO][5147] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 01:06:06.162313 env[1453]: 2025-05-17 01:06:06.153 [WARNING][5147] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="eaf4d6f751910ded5debcb0a407fe1647f085c1e88db7649e0bcc6fa4fbff0e0" HandleID="k8s-pod-network.eaf4d6f751910ded5debcb0a407fe1647f085c1e88db7649e0bcc6fa4fbff0e0" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-calico--apiserver--7bb465f89b--nhrhw-eth0" May 17 01:06:06.162313 env[1453]: 2025-05-17 01:06:06.153 [INFO][5147] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="eaf4d6f751910ded5debcb0a407fe1647f085c1e88db7649e0bcc6fa4fbff0e0" HandleID="k8s-pod-network.eaf4d6f751910ded5debcb0a407fe1647f085c1e88db7649e0bcc6fa4fbff0e0" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-calico--apiserver--7bb465f89b--nhrhw-eth0" May 17 01:06:06.162313 env[1453]: 2025-05-17 01:06:06.158 [INFO][5147] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 01:06:06.162313 env[1453]: 2025-05-17 01:06:06.159 [INFO][5140] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="eaf4d6f751910ded5debcb0a407fe1647f085c1e88db7649e0bcc6fa4fbff0e0" May 17 01:06:06.162858 env[1453]: time="2025-05-17T01:06:06.162336593Z" level=info msg="TearDown network for sandbox \"eaf4d6f751910ded5debcb0a407fe1647f085c1e88db7649e0bcc6fa4fbff0e0\" successfully" May 17 01:06:06.179005 systemd[1]: Started cri-containerd-419a41cbd3b98529df077049a99ebb68f17050902106bcc0e11307523371de4a.scope. May 17 01:06:06.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:06.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:06.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:06.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:06.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:06.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:06.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:06.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:06.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:06.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:06.190000 audit: BPF prog-id=204 op=LOAD May 17 01:06:06.190000 audit[5163]: AVC avc: denied { bpf } for pid=5163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:06.190000 audit[5163]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4344 pid=5163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:06:06.190000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431396134316362643362393835323964663037373034396139396562 May 17 01:06:06.191000 audit[5163]: AVC avc: denied { perfmon } for pid=5163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:06.191000 audit[5163]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4344 pid=5163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:06:06.191000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431396134316362643362393835323964663037373034396139396562 May 17 01:06:06.191000 audit[5163]: AVC avc: denied { bpf } for pid=5163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:06.191000 audit[5163]: AVC avc: denied { bpf } for pid=5163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:06.191000 audit[5163]: AVC avc: denied { bpf } for pid=5163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:06.191000 audit[5163]: AVC avc: denied { perfmon } for pid=5163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:06.191000 audit[5163]: AVC avc: denied { perfmon } for pid=5163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:06.191000 audit[5163]: AVC avc: denied { perfmon } for pid=5163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:06.191000 audit[5163]: AVC avc: denied { perfmon } for pid=5163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:06.191000 audit[5163]: AVC avc: denied { perfmon } for pid=5163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:06.191000 audit[5163]: AVC avc: denied { bpf } for pid=5163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:06.191000 audit[5163]: AVC avc: denied { bpf } for pid=5163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:06.191000 audit: BPF prog-id=205 op=LOAD May 17 01:06:06.191000 audit[5163]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4344 pid=5163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:06:06.191000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431396134316362643362393835323964663037373034396139396562 May 17 01:06:06.191000 audit[5163]: AVC avc: denied { bpf } for pid=5163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:06.191000 audit[5163]: AVC avc: denied { bpf } for pid=5163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:06.191000 audit[5163]: AVC avc: denied { perfmon } for pid=5163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:06.191000 audit[5163]: AVC avc: denied { perfmon } for pid=5163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:06.191000 audit[5163]: AVC avc: denied { perfmon } for pid=5163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:06.191000 audit[5163]: AVC avc: denied { perfmon } for pid=5163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:06.191000 audit[5163]: AVC avc: denied { perfmon } for pid=5163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:06.191000 audit[5163]: AVC avc: denied { bpf } for pid=5163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:06.191000 audit[5163]: AVC avc: denied { bpf } for pid=5163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:06.191000 audit: BPF prog-id=206 op=LOAD May 17 01:06:06.191000 audit[5163]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4344 pid=5163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:06:06.191000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431396134316362643362393835323964663037373034396139396562 May 17 01:06:06.191000 audit: BPF prog-id=206 op=UNLOAD May 17 01:06:06.191000 audit: BPF prog-id=205 op=UNLOAD May 17 01:06:06.191000 audit[5163]: AVC avc: denied { bpf } for pid=5163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:06.191000 audit[5163]: AVC avc: denied { bpf } for pid=5163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:06.191000 audit[5163]: AVC avc: denied { bpf } for pid=5163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:06.191000 audit[5163]: AVC avc: denied { perfmon } for pid=5163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:06.191000 audit[5163]: AVC avc: denied { perfmon } for pid=5163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:06.191000 audit[5163]: AVC avc: denied { perfmon } for pid=5163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:06.191000 audit[5163]: AVC avc: denied { perfmon } for pid=5163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:06.191000 audit[5163]: AVC avc: denied { perfmon } for pid=5163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:06.191000 audit[5163]: AVC avc: denied { bpf } for pid=5163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:06.191000 audit[5163]: AVC avc: denied { bpf } for pid=5163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:06.191000 audit: BPF prog-id=207 op=LOAD May 17 01:06:06.191000 audit[5163]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4344 pid=5163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:06:06.191000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431396134316362643362393835323964663037373034396139396562 May 17 01:06:06.223802 env[1453]: time="2025-05-17T01:06:06.223641357Z" level=info msg="RemovePodSandbox \"eaf4d6f751910ded5debcb0a407fe1647f085c1e88db7649e0bcc6fa4fbff0e0\" returns successfully" May 17 01:06:06.224170 env[1453]: time="2025-05-17T01:06:06.224148643Z" level=info msg="StopPodSandbox for \"d0fe4236d76d708298feebd63b43b6fd0cf876c07dcb9b984a060d5b0e2fa065\"" May 17 01:06:06.252365 env[1453]: time="2025-05-17T01:06:06.252312579Z" level=info msg="StartContainer for \"419a41cbd3b98529df077049a99ebb68f17050902106bcc0e11307523371de4a\" returns successfully" May 17 01:06:06.311518 env[1453]: 2025-05-17 01:06:06.268 [WARNING][5194] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d0fe4236d76d708298feebd63b43b6fd0cf876c07dcb9b984a060d5b0e2fa065" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--56b9a5cda4-k8s-coredns--668d6bf9bc--pnnwz-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"c9fcf012-c9eb-4271-ada6-7659bcab9229", ResourceVersion:"1025", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 1, 5, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-56b9a5cda4", ContainerID:"e138171e89441895008522bfb009017491ccc346548ca94acae592cb046d773a", Pod:"coredns-668d6bf9bc-pnnwz", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.67.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid3c62e0446a", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 01:06:06.311518 env[1453]: 2025-05-17 01:06:06.268 [INFO][5194] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="d0fe4236d76d708298feebd63b43b6fd0cf876c07dcb9b984a060d5b0e2fa065" May 17 01:06:06.311518 env[1453]: 2025-05-17 01:06:06.268 [INFO][5194] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d0fe4236d76d708298feebd63b43b6fd0cf876c07dcb9b984a060d5b0e2fa065" iface="eth0" netns="" May 17 01:06:06.311518 env[1453]: 2025-05-17 01:06:06.268 [INFO][5194] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="d0fe4236d76d708298feebd63b43b6fd0cf876c07dcb9b984a060d5b0e2fa065" May 17 01:06:06.311518 env[1453]: 2025-05-17 01:06:06.268 [INFO][5194] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d0fe4236d76d708298feebd63b43b6fd0cf876c07dcb9b984a060d5b0e2fa065" May 17 01:06:06.311518 env[1453]: 2025-05-17 01:06:06.292 [INFO][5204] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d0fe4236d76d708298feebd63b43b6fd0cf876c07dcb9b984a060d5b0e2fa065" HandleID="k8s-pod-network.d0fe4236d76d708298feebd63b43b6fd0cf876c07dcb9b984a060d5b0e2fa065" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-coredns--668d6bf9bc--pnnwz-eth0" May 17 01:06:06.311518 env[1453]: 2025-05-17 01:06:06.292 [INFO][5204] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 01:06:06.311518 env[1453]: 2025-05-17 01:06:06.292 [INFO][5204] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 01:06:06.311518 env[1453]: 2025-05-17 01:06:06.301 [WARNING][5204] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d0fe4236d76d708298feebd63b43b6fd0cf876c07dcb9b984a060d5b0e2fa065" HandleID="k8s-pod-network.d0fe4236d76d708298feebd63b43b6fd0cf876c07dcb9b984a060d5b0e2fa065" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-coredns--668d6bf9bc--pnnwz-eth0" May 17 01:06:06.311518 env[1453]: 2025-05-17 01:06:06.301 [INFO][5204] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d0fe4236d76d708298feebd63b43b6fd0cf876c07dcb9b984a060d5b0e2fa065" HandleID="k8s-pod-network.d0fe4236d76d708298feebd63b43b6fd0cf876c07dcb9b984a060d5b0e2fa065" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-coredns--668d6bf9bc--pnnwz-eth0" May 17 01:06:06.311518 env[1453]: 2025-05-17 01:06:06.306 [INFO][5204] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 01:06:06.311518 env[1453]: 2025-05-17 01:06:06.310 [INFO][5194] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="d0fe4236d76d708298feebd63b43b6fd0cf876c07dcb9b984a060d5b0e2fa065" May 17 01:06:06.312106 env[1453]: time="2025-05-17T01:06:06.312073527Z" level=info msg="TearDown network for sandbox \"d0fe4236d76d708298feebd63b43b6fd0cf876c07dcb9b984a060d5b0e2fa065\" successfully" May 17 01:06:06.312185 env[1453]: time="2025-05-17T01:06:06.312168608Z" level=info msg="StopPodSandbox for \"d0fe4236d76d708298feebd63b43b6fd0cf876c07dcb9b984a060d5b0e2fa065\" returns successfully" May 17 01:06:06.314457 env[1453]: time="2025-05-17T01:06:06.314421432Z" level=info msg="RemovePodSandbox for \"d0fe4236d76d708298feebd63b43b6fd0cf876c07dcb9b984a060d5b0e2fa065\"" May 17 01:06:06.314567 env[1453]: time="2025-05-17T01:06:06.314458672Z" level=info msg="Forcibly stopping sandbox \"d0fe4236d76d708298feebd63b43b6fd0cf876c07dcb9b984a060d5b0e2fa065\"" May 17 01:06:06.434592 env[1453]: 2025-05-17 01:06:06.376 [WARNING][5218] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d0fe4236d76d708298feebd63b43b6fd0cf876c07dcb9b984a060d5b0e2fa065" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--56b9a5cda4-k8s-coredns--668d6bf9bc--pnnwz-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"c9fcf012-c9eb-4271-ada6-7659bcab9229", ResourceVersion:"1025", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 1, 5, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-56b9a5cda4", ContainerID:"e138171e89441895008522bfb009017491ccc346548ca94acae592cb046d773a", Pod:"coredns-668d6bf9bc-pnnwz", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.67.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid3c62e0446a", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 01:06:06.434592 env[1453]: 2025-05-17 01:06:06.376 [INFO][5218] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="d0fe4236d76d708298feebd63b43b6fd0cf876c07dcb9b984a060d5b0e2fa065" May 17 01:06:06.434592 env[1453]: 2025-05-17 01:06:06.376 [INFO][5218] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d0fe4236d76d708298feebd63b43b6fd0cf876c07dcb9b984a060d5b0e2fa065" iface="eth0" netns="" May 17 01:06:06.434592 env[1453]: 2025-05-17 01:06:06.376 [INFO][5218] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="d0fe4236d76d708298feebd63b43b6fd0cf876c07dcb9b984a060d5b0e2fa065" May 17 01:06:06.434592 env[1453]: 2025-05-17 01:06:06.376 [INFO][5218] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d0fe4236d76d708298feebd63b43b6fd0cf876c07dcb9b984a060d5b0e2fa065" May 17 01:06:06.434592 env[1453]: 2025-05-17 01:06:06.399 [INFO][5226] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d0fe4236d76d708298feebd63b43b6fd0cf876c07dcb9b984a060d5b0e2fa065" HandleID="k8s-pod-network.d0fe4236d76d708298feebd63b43b6fd0cf876c07dcb9b984a060d5b0e2fa065" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-coredns--668d6bf9bc--pnnwz-eth0" May 17 01:06:06.434592 env[1453]: 2025-05-17 01:06:06.399 [INFO][5226] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 01:06:06.434592 env[1453]: 2025-05-17 01:06:06.399 [INFO][5226] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 01:06:06.434592 env[1453]: 2025-05-17 01:06:06.420 [WARNING][5226] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d0fe4236d76d708298feebd63b43b6fd0cf876c07dcb9b984a060d5b0e2fa065" HandleID="k8s-pod-network.d0fe4236d76d708298feebd63b43b6fd0cf876c07dcb9b984a060d5b0e2fa065" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-coredns--668d6bf9bc--pnnwz-eth0" May 17 01:06:06.434592 env[1453]: 2025-05-17 01:06:06.421 [INFO][5226] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d0fe4236d76d708298feebd63b43b6fd0cf876c07dcb9b984a060d5b0e2fa065" HandleID="k8s-pod-network.d0fe4236d76d708298feebd63b43b6fd0cf876c07dcb9b984a060d5b0e2fa065" Workload="ci--3510.3.7--n--56b9a5cda4-k8s-coredns--668d6bf9bc--pnnwz-eth0" May 17 01:06:06.434592 env[1453]: 2025-05-17 01:06:06.431 [INFO][5226] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 01:06:06.434592 env[1453]: 2025-05-17 01:06:06.433 [INFO][5218] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="d0fe4236d76d708298feebd63b43b6fd0cf876c07dcb9b984a060d5b0e2fa065" May 17 01:06:06.435058 env[1453]: time="2025-05-17T01:06:06.434611655Z" level=info msg="TearDown network for sandbox \"d0fe4236d76d708298feebd63b43b6fd0cf876c07dcb9b984a060d5b0e2fa065\" successfully" May 17 01:06:06.446083 env[1453]: time="2025-05-17T01:06:06.446027015Z" level=info msg="RemovePodSandbox \"d0fe4236d76d708298feebd63b43b6fd0cf876c07dcb9b984a060d5b0e2fa065\" returns successfully" May 17 01:06:06.459166 kubelet[2439]: I0517 01:06:06.459094 2439 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-7bb465f89b-fvt58" podStartSLOduration=32.659184723 podStartE2EDuration="40.459077433s" podCreationTimestamp="2025-05-17 01:05:26 +0000 UTC" firstStartedPulling="2025-05-17 01:05:58.275055604 +0000 UTC m=+55.275512992" lastFinishedPulling="2025-05-17 01:06:06.074948314 +0000 UTC m=+63.075405702" observedRunningTime="2025-05-17 01:06:06.435333583 +0000 UTC m=+63.435790931" watchObservedRunningTime="2025-05-17 01:06:06.459077433 +0000 UTC m=+63.459534821" May 17 01:06:06.482000 audit[5235]: NETFILTER_CFG table=filter:127 family=2 entries=14 op=nft_register_rule pid=5235 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:06:06.482000 audit[5235]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5248 a0=3 a1=fffff1b478f0 a2=0 a3=1 items=0 ppid=2540 pid=5235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:06:06.482000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:06:06.491000 audit[5235]: NETFILTER_CFG table=nat:128 family=2 entries=20 op=nft_register_rule pid=5235 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:06:06.491000 audit[5235]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=fffff1b478f0 a2=0 a3=1 items=0 ppid=2540 pid=5235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:06:06.491000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:06:06.505000 audit[5238]: NETFILTER_CFG table=filter:129 family=2 entries=14 op=nft_register_rule pid=5238 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:06:06.505000 audit[5238]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5248 a0=3 a1=ffffed809890 a2=0 a3=1 items=0 ppid=2540 pid=5238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:06:06.505000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:06:06.518000 audit[5238]: NETFILTER_CFG table=nat:130 family=2 entries=20 op=nft_register_rule pid=5238 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:06:06.518000 audit[5238]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffed809890 a2=0 a3=1 items=0 ppid=2540 pid=5238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:06:06.518000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:06:07.214000 audit[2310]: AVC avc: denied { watch } for pid=2310 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c618,c658 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:06:07.214000 audit[2310]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4001e4fc20 a2=fc6 a3=0 items=0 ppid=2177 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c618,c658 key=(null) May 17 01:06:07.214000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 01:06:07.214000 audit[2310]: AVC avc: denied { watch } for pid=2310 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c618,c658 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:06:07.214000 audit[2310]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4001e4fc40 a2=fc6 a3=0 items=0 ppid=2177 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c618,c658 key=(null) May 17 01:06:07.214000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 01:06:07.214000 audit[2310]: AVC avc: denied { watch } for pid=2310 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c618,c658 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:06:07.214000 audit[2310]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002dbdc80 a2=fc6 a3=0 items=0 ppid=2177 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c618,c658 key=(null) May 17 01:06:07.214000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 01:06:07.215000 audit[2310]: AVC avc: denied { watch } for pid=2310 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c618,c658 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:06:07.215000 audit[2310]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4002dbdfa0 a2=fc6 a3=0 items=0 ppid=2177 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c618,c658 key=(null) May 17 01:06:07.215000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 01:06:07.420517 kubelet[2439]: I0517 01:06:07.420436 2439 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 01:06:07.728277 env[1453]: time="2025-05-17T01:06:07.728234493Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:06:07.738958 env[1453]: time="2025-05-17T01:06:07.738917164Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ebe7e098653491dec9f15f87d7f5d33f47b09d1d6f3ef83deeaaa6237024c045,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:06:07.744519 env[1453]: time="2025-05-17T01:06:07.744491702Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:06:07.749495 env[1453]: time="2025-05-17T01:06:07.749468354Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:27883a4104876fe239311dd93ce6efd0c4a87de7163d57a4c8d96bd65a287ffd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:06:07.749964 env[1453]: time="2025-05-17T01:06:07.749916919Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.0\" returns image reference \"sha256:ebe7e098653491dec9f15f87d7f5d33f47b09d1d6f3ef83deeaaa6237024c045\"" May 17 01:06:07.763210 env[1453]: time="2025-05-17T01:06:07.763176577Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\"" May 17 01:06:07.766955 env[1453]: time="2025-05-17T01:06:07.764993196Z" level=info msg="CreateContainer within sandbox \"648a93c6516a9d3eb426cba128b94b02782242e59967d9901c54a4cc92744d12\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 17 01:06:07.813525 env[1453]: time="2025-05-17T01:06:07.813477500Z" level=info msg="CreateContainer within sandbox \"648a93c6516a9d3eb426cba128b94b02782242e59967d9901c54a4cc92744d12\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"01a950b94400bc1377c386449d85e36646278f5a000a35167592906db4aa2314\"" May 17 01:06:07.814218 env[1453]: time="2025-05-17T01:06:07.814192827Z" level=info msg="StartContainer for \"01a950b94400bc1377c386449d85e36646278f5a000a35167592906db4aa2314\"" May 17 01:06:07.848134 systemd[1]: run-containerd-runc-k8s.io-01a950b94400bc1377c386449d85e36646278f5a000a35167592906db4aa2314-runc.Oo0l2J.mount: Deactivated successfully. May 17 01:06:07.852230 systemd[1]: Started cri-containerd-01a950b94400bc1377c386449d85e36646278f5a000a35167592906db4aa2314.scope. May 17 01:06:07.909000 audit[5248]: AVC avc: denied { perfmon } for pid=5248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:07.909000 audit[5248]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=4408 pid=5248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:06:07.909000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031613935306239343430306263313337376333383634343964383565 May 17 01:06:07.909000 audit[5248]: AVC avc: denied { bpf } for pid=5248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:07.909000 audit[5248]: AVC avc: denied { bpf } for pid=5248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:07.909000 audit[5248]: AVC avc: denied { bpf } for pid=5248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:07.909000 audit[5248]: AVC avc: denied { perfmon } for pid=5248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:07.909000 audit[5248]: AVC avc: denied { perfmon } for pid=5248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:07.909000 audit[5248]: AVC avc: denied { perfmon } for pid=5248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:07.909000 audit[5248]: AVC avc: denied { perfmon } for pid=5248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:07.909000 audit[5248]: AVC avc: denied { perfmon } for pid=5248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:07.909000 audit[5248]: AVC avc: denied { bpf } for pid=5248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:07.909000 audit[5248]: AVC avc: denied { bpf } for pid=5248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:07.909000 audit: BPF prog-id=208 op=LOAD May 17 01:06:07.909000 audit[5248]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001478e0 a2=78 a3=0 items=0 ppid=4408 pid=5248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:06:07.909000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031613935306239343430306263313337376333383634343964383565 May 17 01:06:07.910000 audit[5248]: AVC avc: denied { bpf } for pid=5248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:07.910000 audit[5248]: AVC avc: denied { bpf } for pid=5248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:07.910000 audit[5248]: AVC avc: denied { perfmon } for pid=5248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:07.910000 audit[5248]: AVC avc: denied { perfmon } for pid=5248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:07.910000 audit[5248]: AVC avc: denied { perfmon } for pid=5248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:07.910000 audit[5248]: AVC avc: denied { perfmon } for pid=5248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:07.910000 audit[5248]: AVC avc: denied { perfmon } for pid=5248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:07.910000 audit[5248]: AVC avc: denied { bpf } for pid=5248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:07.910000 audit[5248]: AVC avc: denied { bpf } for pid=5248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:07.910000 audit: BPF prog-id=209 op=LOAD May 17 01:06:07.910000 audit[5248]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000147670 a2=78 a3=0 items=0 ppid=4408 pid=5248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:06:07.910000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031613935306239343430306263313337376333383634343964383565 May 17 01:06:07.910000 audit: BPF prog-id=209 op=UNLOAD May 17 01:06:07.911000 audit: BPF prog-id=208 op=UNLOAD May 17 01:06:07.911000 audit[5248]: AVC avc: denied { bpf } for pid=5248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:07.911000 audit[5248]: AVC avc: denied { bpf } for pid=5248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:07.911000 audit[5248]: AVC avc: denied { bpf } for pid=5248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:07.911000 audit[5248]: AVC avc: denied { perfmon } for pid=5248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:07.911000 audit[5248]: AVC avc: denied { perfmon } for pid=5248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:07.911000 audit[5248]: AVC avc: denied { perfmon } for pid=5248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:07.911000 audit[5248]: AVC avc: denied { perfmon } for pid=5248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:07.911000 audit[5248]: AVC avc: denied { perfmon } for pid=5248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:07.911000 audit[5248]: AVC avc: denied { bpf } for pid=5248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:07.911000 audit[5248]: AVC avc: denied { bpf } for pid=5248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:07.911000 audit: BPF prog-id=210 op=LOAD May 17 01:06:07.911000 audit[5248]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000147b40 a2=78 a3=0 items=0 ppid=4408 pid=5248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:06:07.911000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031613935306239343430306263313337376333383634343964383565 May 17 01:06:07.927651 env[1453]: time="2025-05-17T01:06:07.927602767Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 01:06:07.963507 env[1453]: time="2025-05-17T01:06:07.963466540Z" level=info msg="StartContainer for \"01a950b94400bc1377c386449d85e36646278f5a000a35167592906db4aa2314\" returns successfully" May 17 01:06:07.968121 env[1453]: time="2025-05-17T01:06:07.968080268Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 01:06:07.970331 kubelet[2439]: E0517 01:06:07.970033 2439 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 01:06:07.970331 kubelet[2439]: E0517 01:06:07.970074 2439 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 01:06:07.970331 kubelet[2439]: E0517 01:06:07.970259 2439 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-5c46r,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-78d55f7ddc-5zbrn_calico-system(03203f23-8aa4-41b1-ba45-7088ffc7359f): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 01:06:07.970919 env[1453]: time="2025-05-17T01:06:07.970896177Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0\"" May 17 01:06:07.974486 kubelet[2439]: E0517 01:06:07.973882 2439 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-5zbrn" podUID="03203f23-8aa4-41b1-ba45-7088ffc7359f" May 17 01:06:08.423816 kubelet[2439]: I0517 01:06:08.423544 2439 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 01:06:08.424564 kubelet[2439]: E0517 01:06:08.424382 2439 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-5zbrn" podUID="03203f23-8aa4-41b1-ba45-7088ffc7359f" May 17 01:06:08.444531 kubelet[2439]: I0517 01:06:08.444445 2439 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-7bb465f89b-nhrhw" podStartSLOduration=35.096586257 podStartE2EDuration="42.444430054s" podCreationTimestamp="2025-05-17 01:05:26 +0000 UTC" firstStartedPulling="2025-05-17 01:05:58.229047472 +0000 UTC m=+55.229504860" lastFinishedPulling="2025-05-17 01:06:05.576891189 +0000 UTC m=+62.577348657" observedRunningTime="2025-05-17 01:06:06.461305976 +0000 UTC m=+63.461763364" watchObservedRunningTime="2025-05-17 01:06:08.444430054 +0000 UTC m=+65.444887442" May 17 01:06:08.478000 audit[5278]: NETFILTER_CFG table=filter:131 family=2 entries=14 op=nft_register_rule pid=5278 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:06:08.478000 audit[5278]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5248 a0=3 a1=ffffd6da8690 a2=0 a3=1 items=0 ppid=2540 pid=5278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:06:08.478000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:06:08.481000 audit[5278]: NETFILTER_CFG table=nat:132 family=2 entries=20 op=nft_register_rule pid=5278 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:06:08.481000 audit[5278]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffd6da8690 a2=0 a3=1 items=0 ppid=2540 pid=5278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:06:08.481000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:06:08.607000 audit[5080]: AVC avc: denied { watch } for pid=5080 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_01_05_43.247640675/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c220,c659 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c220,c659 tclass=file permissive=0 May 17 01:06:08.607000 audit[5080]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=400033f860 a2=fc6 a3=0 items=0 ppid=4308 pid=5080 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c220,c659 key=(null) May 17 01:06:08.607000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 01:06:08.691000 audit[5280]: NETFILTER_CFG table=filter:133 family=2 entries=13 op=nft_register_rule pid=5280 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:06:08.691000 audit[5280]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=ffffc63657c0 a2=0 a3=1 items=0 ppid=2540 pid=5280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:06:08.691000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:06:08.698000 audit[5280]: NETFILTER_CFG table=nat:134 family=2 entries=27 op=nft_register_chain pid=5280 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:06:08.698000 audit[5280]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=9348 a0=3 a1=ffffc63657c0 a2=0 a3=1 items=0 ppid=2540 pid=5280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:06:08.698000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:06:09.703569 env[1453]: time="2025-05-17T01:06:09.703527737Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:06:09.757755 env[1453]: time="2025-05-17T01:06:09.757691329Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a5d5f2a68204ed0dbc50f8778616ee92a63c0e342d178a4620e6271484e5c8b2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:06:09.762566 env[1453]: time="2025-05-17T01:06:09.762530098Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:06:09.770121 env[1453]: time="2025-05-17T01:06:09.770089495Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:dca5c16181edde2e860463615523ce457cd9dcfca85b7cfdcd6f3ea7de6f2ac8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:06:09.770519 env[1453]: time="2025-05-17T01:06:09.770490939Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0\" returns image reference \"sha256:a5d5f2a68204ed0dbc50f8778616ee92a63c0e342d178a4620e6271484e5c8b2\"" May 17 01:06:09.773894 env[1453]: time="2025-05-17T01:06:09.773853494Z" level=info msg="CreateContainer within sandbox \"648a93c6516a9d3eb426cba128b94b02782242e59967d9901c54a4cc92744d12\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 17 01:06:09.831215 env[1453]: time="2025-05-17T01:06:09.831165117Z" level=info msg="CreateContainer within sandbox \"648a93c6516a9d3eb426cba128b94b02782242e59967d9901c54a4cc92744d12\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"7074762c5007c0fd4e8dc2d2bdf4edef8384e65313e706125179cecdc9c0a2a0\"" May 17 01:06:09.832115 env[1453]: time="2025-05-17T01:06:09.832083767Z" level=info msg="StartContainer for \"7074762c5007c0fd4e8dc2d2bdf4edef8384e65313e706125179cecdc9c0a2a0\"" May 17 01:06:09.944706 systemd[1]: run-containerd-runc-k8s.io-7074762c5007c0fd4e8dc2d2bdf4edef8384e65313e706125179cecdc9c0a2a0-runc.slxoL2.mount: Deactivated successfully. May 17 01:06:09.950621 systemd[1]: Started cri-containerd-7074762c5007c0fd4e8dc2d2bdf4edef8384e65313e706125179cecdc9c0a2a0.scope. May 17 01:06:10.007000 audit[5295]: AVC avc: denied { perfmon } for pid=5295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:10.007000 audit[5295]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=4408 pid=5295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:06:10.007000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730373437363263353030376330666434653864633264326264663465 May 17 01:06:10.008000 audit[5295]: AVC avc: denied { bpf } for pid=5295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:10.008000 audit[5295]: AVC avc: denied { bpf } for pid=5295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:10.008000 audit[5295]: AVC avc: denied { bpf } for pid=5295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:10.008000 audit[5295]: AVC avc: denied { perfmon } for pid=5295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:10.008000 audit[5295]: AVC avc: denied { perfmon } for pid=5295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:10.008000 audit[5295]: AVC avc: denied { perfmon } for pid=5295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:10.008000 audit[5295]: AVC avc: denied { perfmon } for pid=5295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:10.008000 audit[5295]: AVC avc: denied { perfmon } for pid=5295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:10.008000 audit[5295]: AVC avc: denied { bpf } for pid=5295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:10.008000 audit[5295]: AVC avc: denied { bpf } for pid=5295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:10.008000 audit: BPF prog-id=211 op=LOAD May 17 01:06:10.008000 audit[5295]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=4408 pid=5295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:06:10.008000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730373437363263353030376330666434653864633264326264663465 May 17 01:06:10.008000 audit[5295]: AVC avc: denied { bpf } for pid=5295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:10.008000 audit[5295]: AVC avc: denied { bpf } for pid=5295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:10.008000 audit[5295]: AVC avc: denied { perfmon } for pid=5295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:10.008000 audit[5295]: AVC avc: denied { perfmon } for pid=5295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:10.008000 audit[5295]: AVC avc: denied { perfmon } for pid=5295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:10.008000 audit[5295]: AVC avc: denied { perfmon } for pid=5295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:10.008000 audit[5295]: AVC avc: denied { perfmon } for pid=5295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:10.008000 audit[5295]: AVC avc: denied { bpf } for pid=5295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:10.008000 audit[5295]: AVC avc: denied { bpf } for pid=5295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:10.008000 audit: BPF prog-id=212 op=LOAD May 17 01:06:10.008000 audit[5295]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=4408 pid=5295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:06:10.008000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730373437363263353030376330666434653864633264326264663465 May 17 01:06:10.008000 audit: BPF prog-id=212 op=UNLOAD May 17 01:06:10.008000 audit: BPF prog-id=211 op=UNLOAD May 17 01:06:10.008000 audit[5295]: AVC avc: denied { bpf } for pid=5295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:10.008000 audit[5295]: AVC avc: denied { bpf } for pid=5295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:10.008000 audit[5295]: AVC avc: denied { bpf } for pid=5295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:10.008000 audit[5295]: AVC avc: denied { perfmon } for pid=5295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:10.008000 audit[5295]: AVC avc: denied { perfmon } for pid=5295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:10.008000 audit[5295]: AVC avc: denied { perfmon } for pid=5295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:10.008000 audit[5295]: AVC avc: denied { perfmon } for pid=5295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:10.008000 audit[5295]: AVC avc: denied { perfmon } for pid=5295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:10.008000 audit[5295]: AVC avc: denied { bpf } for pid=5295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:10.008000 audit[5295]: AVC avc: denied { bpf } for pid=5295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:06:10.008000 audit: BPF prog-id=213 op=LOAD May 17 01:06:10.008000 audit[5295]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=4408 pid=5295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:06:10.008000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730373437363263353030376330666434653864633264326264663465 May 17 01:06:10.029706 env[1453]: time="2025-05-17T01:06:10.029666576Z" level=info msg="StartContainer for \"7074762c5007c0fd4e8dc2d2bdf4edef8384e65313e706125179cecdc9c0a2a0\" returns successfully" May 17 01:06:10.042000 audit[5174]: AVC avc: denied { watch } for pid=5174 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_01_05_43.3059935743/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c241,c599 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c241,c599 tclass=file permissive=0 May 17 01:06:10.042000 audit[5174]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=40007f0e00 a2=fc6 a3=0 items=0 ppid=4344 pid=5174 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c241,c599 key=(null) May 17 01:06:10.042000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 01:06:10.121719 env[1453]: time="2025-05-17T01:06:10.121681304Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\"" May 17 01:06:10.246818 kubelet[2439]: I0517 01:06:10.246779 2439 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 17 01:06:10.249631 kubelet[2439]: I0517 01:06:10.249596 2439 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 17 01:06:10.320883 env[1453]: time="2025-05-17T01:06:10.320623990Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 01:06:10.325647 env[1453]: time="2025-05-17T01:06:10.325514879Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 01:06:10.325836 kubelet[2439]: E0517 01:06:10.325787 2439 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 01:06:10.325908 kubelet[2439]: E0517 01:06:10.325852 2439 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 01:06:10.327025 kubelet[2439]: E0517 01:06:10.326970 2439 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.0,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:e8f448703ed64084b96c12586cf5068a,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-8h7xc,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-7dd859898d-fckds_calico-system(e6dfc9d9-b9da-4002-976e-1b3ffcb7dc07): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 01:06:10.329065 env[1453]: time="2025-05-17T01:06:10.328838633Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\"" May 17 01:06:10.479277 env[1453]: time="2025-05-17T01:06:10.479219349Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 01:06:10.485983 env[1453]: time="2025-05-17T01:06:10.485899457Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 01:06:10.486377 kubelet[2439]: E0517 01:06:10.486327 2439 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 01:06:10.486458 kubelet[2439]: E0517 01:06:10.486393 2439 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 01:06:10.486925 kubelet[2439]: E0517 01:06:10.486868 2439 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-8h7xc,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-7dd859898d-fckds_calico-system(e6dfc9d9-b9da-4002-976e-1b3ffcb7dc07): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 01:06:10.488245 kubelet[2439]: E0517 01:06:10.488192 2439 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-7dd859898d-fckds" podUID="e6dfc9d9-b9da-4002-976e-1b3ffcb7dc07" May 17 01:06:22.121489 env[1453]: time="2025-05-17T01:06:22.121195428Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\"" May 17 01:06:22.137689 kubelet[2439]: I0517 01:06:22.137605 2439 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-92ktb" podStartSLOduration=39.652124639 podStartE2EDuration="51.137588377s" podCreationTimestamp="2025-05-17 01:05:31 +0000 UTC" firstStartedPulling="2025-05-17 01:05:58.286496416 +0000 UTC m=+55.286953804" lastFinishedPulling="2025-05-17 01:06:09.771960154 +0000 UTC m=+66.772417542" observedRunningTime="2025-05-17 01:06:10.460238198 +0000 UTC m=+67.460695586" watchObservedRunningTime="2025-05-17 01:06:22.137588377 +0000 UTC m=+79.138045765" May 17 01:06:22.321519 env[1453]: time="2025-05-17T01:06:22.321321045Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 01:06:22.325651 env[1453]: time="2025-05-17T01:06:22.325536283Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 01:06:22.325827 kubelet[2439]: E0517 01:06:22.325783 2439 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 01:06:22.325896 kubelet[2439]: E0517 01:06:22.325846 2439 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 01:06:22.326102 kubelet[2439]: E0517 01:06:22.326043 2439 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-5c46r,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-78d55f7ddc-5zbrn_calico-system(03203f23-8aa4-41b1-ba45-7088ffc7359f): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 01:06:22.327654 kubelet[2439]: E0517 01:06:22.327623 2439 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-5zbrn" podUID="03203f23-8aa4-41b1-ba45-7088ffc7359f" May 17 01:06:23.134183 kubelet[2439]: E0517 01:06:23.134143 2439 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-7dd859898d-fckds" podUID="e6dfc9d9-b9da-4002-976e-1b3ffcb7dc07" May 17 01:06:30.341065 systemd[1]: run-containerd-runc-k8s.io-96108ddebfbacf09ebf988c2935cb82538e0fa2ad63784d0abfa3728fb4f9143-runc.12vMTI.mount: Deactivated successfully. May 17 01:06:32.401585 systemd[1]: run-containerd-runc-k8s.io-4fbf99a208adc0400b6cc87cc6e826f35edf1f10d7a48fdcc4ae74d6ba450ab9-runc.TXuo9q.mount: Deactivated successfully. May 17 01:06:33.277501 kubelet[2439]: I0517 01:06:33.277463 2439 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 01:06:33.370000 audit[5379]: NETFILTER_CFG table=filter:135 family=2 entries=12 op=nft_register_rule pid=5379 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:06:33.376490 kernel: kauditd_printk_skb: 232 callbacks suppressed May 17 01:06:33.376603 kernel: audit: type=1325 audit(1747443993.370:1285): table=filter:135 family=2 entries=12 op=nft_register_rule pid=5379 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:06:33.370000 audit[5379]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=ffffe17991b0 a2=0 a3=1 items=0 ppid=2540 pid=5379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:06:33.418380 kernel: audit: type=1300 audit(1747443993.370:1285): arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=ffffe17991b0 a2=0 a3=1 items=0 ppid=2540 pid=5379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:06:33.370000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:06:33.434330 kernel: audit: type=1327 audit(1747443993.370:1285): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:06:33.418000 audit[5379]: NETFILTER_CFG table=nat:136 family=2 entries=34 op=nft_register_chain pid=5379 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:06:33.448461 kernel: audit: type=1325 audit(1747443993.418:1286): table=nat:136 family=2 entries=34 op=nft_register_chain pid=5379 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:06:33.448566 kernel: audit: type=1300 audit(1747443993.418:1286): arch=c00000b7 syscall=211 success=yes exit=11236 a0=3 a1=ffffe17991b0 a2=0 a3=1 items=0 ppid=2540 pid=5379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:06:33.418000 audit[5379]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11236 a0=3 a1=ffffe17991b0 a2=0 a3=1 items=0 ppid=2540 pid=5379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:06:33.418000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:06:33.493348 kernel: audit: type=1327 audit(1747443993.418:1286): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:06:35.121647 env[1453]: time="2025-05-17T01:06:35.121488309Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\"" May 17 01:06:35.342835 env[1453]: time="2025-05-17T01:06:35.342760916Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 01:06:35.347185 env[1453]: time="2025-05-17T01:06:35.347127152Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 01:06:35.347503 kubelet[2439]: E0517 01:06:35.347460 2439 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 01:06:35.347759 kubelet[2439]: E0517 01:06:35.347511 2439 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 01:06:35.348100 kubelet[2439]: E0517 01:06:35.347649 2439 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.0,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:e8f448703ed64084b96c12586cf5068a,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-8h7xc,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-7dd859898d-fckds_calico-system(e6dfc9d9-b9da-4002-976e-1b3ffcb7dc07): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 01:06:35.350103 env[1453]: time="2025-05-17T01:06:35.350071857Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\"" May 17 01:06:35.543409 env[1453]: time="2025-05-17T01:06:35.543343229Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 01:06:35.547740 env[1453]: time="2025-05-17T01:06:35.547649105Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 01:06:35.547987 kubelet[2439]: E0517 01:06:35.547915 2439 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 01:06:35.548055 kubelet[2439]: E0517 01:06:35.547996 2439 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 01:06:35.548340 kubelet[2439]: E0517 01:06:35.548295 2439 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-8h7xc,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-7dd859898d-fckds_calico-system(e6dfc9d9-b9da-4002-976e-1b3ffcb7dc07): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 01:06:35.549600 kubelet[2439]: E0517 01:06:35.549532 2439 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-7dd859898d-fckds" podUID="e6dfc9d9-b9da-4002-976e-1b3ffcb7dc07" May 17 01:06:38.120501 kubelet[2439]: E0517 01:06:38.120442 2439 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-5zbrn" podUID="03203f23-8aa4-41b1-ba45-7088ffc7359f" May 17 01:06:46.121196 kubelet[2439]: E0517 01:06:46.121080 2439 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-7dd859898d-fckds" podUID="e6dfc9d9-b9da-4002-976e-1b3ffcb7dc07" May 17 01:06:50.121487 env[1453]: time="2025-05-17T01:06:50.121439032Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\"" May 17 01:06:50.274787 env[1453]: time="2025-05-17T01:06:50.274713899Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 01:06:50.279356 env[1453]: time="2025-05-17T01:06:50.279322263Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 01:06:50.280225 kubelet[2439]: E0517 01:06:50.279626 2439 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 01:06:50.280225 kubelet[2439]: E0517 01:06:50.279672 2439 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 01:06:50.280225 kubelet[2439]: E0517 01:06:50.279804 2439 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-5c46r,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-78d55f7ddc-5zbrn_calico-system(03203f23-8aa4-41b1-ba45-7088ffc7359f): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 01:06:50.281121 kubelet[2439]: E0517 01:06:50.281062 2439 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-5zbrn" podUID="03203f23-8aa4-41b1-ba45-7088ffc7359f" May 17 01:06:57.122292 kubelet[2439]: E0517 01:06:57.122246 2439 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-7dd859898d-fckds" podUID="e6dfc9d9-b9da-4002-976e-1b3ffcb7dc07" May 17 01:06:58.982000 audit[2310]: AVC avc: denied { watch } for pid=2310 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c618,c658 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:06:58.982000 audit[2310]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000e17020 a2=fc6 a3=0 items=0 ppid=2177 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c618,c658 key=(null) May 17 01:06:59.036010 kernel: audit: type=1400 audit(1747444018.982:1287): avc: denied { watch } for pid=2310 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c618,c658 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:06:59.036194 kernel: audit: type=1300 audit(1747444018.982:1287): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000e17020 a2=fc6 a3=0 items=0 ppid=2177 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c618,c658 key=(null) May 17 01:06:58.982000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 01:06:59.060368 kernel: audit: type=1327 audit(1747444018.982:1287): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 01:06:58.987000 audit[2310]: AVC avc: denied { watch } for pid=2310 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c618,c658 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:06:59.083375 kernel: audit: type=1400 audit(1747444018.987:1288): avc: denied { watch } for pid=2310 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c618,c658 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:06:58.987000 audit[2310]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000a2dc80 a2=fc6 a3=0 items=0 ppid=2177 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c618,c658 key=(null) May 17 01:06:59.112437 kernel: audit: type=1300 audit(1747444018.987:1288): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000a2dc80 a2=fc6 a3=0 items=0 ppid=2177 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c618,c658 key=(null) May 17 01:06:58.987000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 01:06:59.136694 kernel: audit: type=1327 audit(1747444018.987:1288): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 01:06:59.461000 audit[2252]: AVC avc: denied { watch } for pid=2252 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c429,c763 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:06:59.461000 audit[2252]: AVC avc: denied { watch } for pid=2252 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c429,c763 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:06:59.507488 kernel: audit: type=1400 audit(1747444019.461:1289): avc: denied { watch } for pid=2252 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c429,c763 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:06:59.507621 kernel: audit: type=1400 audit(1747444019.461:1290): avc: denied { watch } for pid=2252 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c429,c763 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:06:59.461000 audit[2252]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=78 a1=4005e89c20 a2=fc6 a3=0 items=0 ppid=2126 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c429,c763 key=(null) May 17 01:06:59.537107 kernel: audit: type=1300 audit(1747444019.461:1290): arch=c00000b7 syscall=27 success=no exit=-13 a0=78 a1=4005e89c20 a2=fc6 a3=0 items=0 ppid=2126 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c429,c763 key=(null) May 17 01:06:59.461000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 01:06:59.561322 kernel: audit: type=1327 audit(1747444019.461:1290): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 01:06:59.461000 audit[2252]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=76 a1=40051c1660 a2=fc6 a3=0 items=0 ppid=2126 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c429,c763 key=(null) May 17 01:06:59.461000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 01:06:59.464000 audit[2252]: AVC avc: denied { watch } for pid=2252 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c429,c763 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:06:59.464000 audit[2252]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=76 a1=4009c1a930 a2=fc6 a3=0 items=0 ppid=2126 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c429,c763 key=(null) May 17 01:06:59.464000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 01:06:59.468000 audit[2252]: AVC avc: denied { watch } for pid=2252 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520987 scontext=system_u:system_r:svirt_lxc_net_t:s0:c429,c763 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:06:59.468000 audit[2252]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=76 a1=4009c1aa80 a2=fc6 a3=0 items=0 ppid=2126 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c429,c763 key=(null) May 17 01:06:59.468000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 01:06:59.489000 audit[2252]: AVC avc: denied { watch } for pid=2252 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c429,c763 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:06:59.489000 audit[2252]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=76 a1=40051c1800 a2=fc6 a3=0 items=0 ppid=2126 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c429,c763 key=(null) May 17 01:06:59.489000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 01:06:59.489000 audit[2252]: AVC avc: denied { watch } for pid=2252 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c429,c763 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:06:59.489000 audit[2252]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=76 a1=4009c1acf0 a2=fc6 a3=0 items=0 ppid=2126 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c429,c763 key=(null) May 17 01:06:59.489000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 01:07:01.121170 kubelet[2439]: E0517 01:07:01.121126 2439 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-5zbrn" podUID="03203f23-8aa4-41b1-ba45-7088ffc7359f" May 17 01:07:07.215000 audit[2310]: AVC avc: denied { watch } for pid=2310 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c618,c658 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:07:07.221737 kernel: kauditd_printk_skb: 14 callbacks suppressed May 17 01:07:07.221839 kernel: audit: type=1400 audit(1747444027.215:1295): avc: denied { watch } for pid=2310 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c618,c658 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:07:07.215000 audit[2310]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000884860 a2=fc6 a3=0 items=0 ppid=2177 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c618,c658 key=(null) May 17 01:07:07.273172 kernel: audit: type=1300 audit(1747444027.215:1295): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000884860 a2=fc6 a3=0 items=0 ppid=2177 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c618,c658 key=(null) May 17 01:07:07.215000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 01:07:07.297543 kernel: audit: type=1327 audit(1747444027.215:1295): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 01:07:07.215000 audit[2310]: AVC avc: denied { watch } for pid=2310 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c618,c658 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:07:07.319027 kernel: audit: type=1400 audit(1747444027.215:1296): avc: denied { watch } for pid=2310 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c618,c658 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:07:07.319111 kernel: audit: type=1300 audit(1747444027.215:1296): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40009e8180 a2=fc6 a3=0 items=0 ppid=2177 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c618,c658 key=(null) May 17 01:07:07.215000 audit[2310]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40009e8180 a2=fc6 a3=0 items=0 ppid=2177 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c618,c658 key=(null) May 17 01:07:07.215000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 01:07:07.372723 kernel: audit: type=1327 audit(1747444027.215:1296): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 01:07:07.372832 kernel: audit: type=1400 audit(1747444027.215:1297): avc: denied { watch } for pid=2310 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c618,c658 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:07:07.215000 audit[2310]: AVC avc: denied { watch } for pid=2310 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c618,c658 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:07:07.215000 audit[2310]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40009e83e0 a2=fc6 a3=0 items=0 ppid=2177 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c618,c658 key=(null) May 17 01:07:07.425001 kernel: audit: type=1300 audit(1747444027.215:1297): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40009e83e0 a2=fc6 a3=0 items=0 ppid=2177 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c618,c658 key=(null) May 17 01:07:07.215000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 01:07:07.450040 kernel: audit: type=1327 audit(1747444027.215:1297): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 01:07:07.216000 audit[2310]: AVC avc: denied { watch } for pid=2310 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c618,c658 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:07:07.477345 kernel: audit: type=1400 audit(1747444027.216:1298): avc: denied { watch } for pid=2310 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c618,c658 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:07:07.216000 audit[2310]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000884ea0 a2=fc6 a3=0 items=0 ppid=2177 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c618,c658 key=(null) May 17 01:07:07.216000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 01:07:08.608000 audit[5080]: AVC avc: denied { watch } for pid=5080 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_01_05_43.247640675/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c220,c659 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c220,c659 tclass=file permissive=0 May 17 01:07:08.608000 audit[5080]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000e8c9c0 a2=fc6 a3=0 items=0 ppid=4308 pid=5080 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c220,c659 key=(null) May 17 01:07:08.608000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 01:07:10.044000 audit[5174]: AVC avc: denied { watch } for pid=5174 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_01_05_43.3059935743/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c241,c599 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c241,c599 tclass=file permissive=0 May 17 01:07:10.044000 audit[5174]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000fe7920 a2=fc6 a3=0 items=0 ppid=4344 pid=5174 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c241,c599 key=(null) May 17 01:07:10.044000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 01:07:10.121921 kubelet[2439]: E0517 01:07:10.121866 2439 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-7dd859898d-fckds" podUID="e6dfc9d9-b9da-4002-976e-1b3ffcb7dc07" May 17 01:07:15.121569 kubelet[2439]: E0517 01:07:15.121519 2439 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-5zbrn" podUID="03203f23-8aa4-41b1-ba45-7088ffc7359f" May 17 01:07:22.120948 env[1453]: time="2025-05-17T01:07:22.120879709Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\"" May 17 01:07:22.299716 env[1453]: time="2025-05-17T01:07:22.299644080Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 01:07:22.306225 env[1453]: time="2025-05-17T01:07:22.306179675Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 01:07:22.306432 kubelet[2439]: E0517 01:07:22.306388 2439 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 01:07:22.306724 kubelet[2439]: E0517 01:07:22.306442 2439 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 01:07:22.306724 kubelet[2439]: E0517 01:07:22.306572 2439 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.0,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:e8f448703ed64084b96c12586cf5068a,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-8h7xc,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-7dd859898d-fckds_calico-system(e6dfc9d9-b9da-4002-976e-1b3ffcb7dc07): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 01:07:22.309160 env[1453]: time="2025-05-17T01:07:22.308912047Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\"" May 17 01:07:22.513605 env[1453]: time="2025-05-17T01:07:22.513398449Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 01:07:22.517801 env[1453]: time="2025-05-17T01:07:22.517724420Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 01:07:22.518089 kubelet[2439]: E0517 01:07:22.518043 2439 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 01:07:22.518163 kubelet[2439]: E0517 01:07:22.518097 2439 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 01:07:22.518643 kubelet[2439]: E0517 01:07:22.518234 2439 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-8h7xc,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-7dd859898d-fckds_calico-system(e6dfc9d9-b9da-4002-976e-1b3ffcb7dc07): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 01:07:22.519906 kubelet[2439]: E0517 01:07:22.519874 2439 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-7dd859898d-fckds" podUID="e6dfc9d9-b9da-4002-976e-1b3ffcb7dc07" May 17 01:07:26.120786 kubelet[2439]: E0517 01:07:26.120745 2439 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-5zbrn" podUID="03203f23-8aa4-41b1-ba45-7088ffc7359f" May 17 01:07:27.378000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.20.11:22-10.200.16.10:40016 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:07:27.379670 systemd[1]: Started sshd@7-10.200.20.11:22-10.200.16.10:40016.service. May 17 01:07:27.385008 kernel: kauditd_printk_skb: 8 callbacks suppressed May 17 01:07:27.385077 kernel: audit: type=1130 audit(1747444047.378:1301): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.20.11:22-10.200.16.10:40016 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:07:27.859759 sshd[5483]: Accepted publickey for core from 10.200.16.10 port 40016 ssh2: RSA SHA256:x3d6fk4o7Gi9e3Ae36hiTT61fdQx083j9gAothd9hI4 May 17 01:07:27.858000 audit[5483]: USER_ACCT pid=5483 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:07:27.884200 sshd[5483]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 01:07:27.882000 audit[5483]: CRED_ACQ pid=5483 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:07:27.884967 kernel: audit: type=1101 audit(1747444047.858:1302): pid=5483 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:07:27.921738 kernel: audit: type=1103 audit(1747444047.882:1303): pid=5483 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:07:27.921837 kernel: audit: type=1006 audit(1747444047.882:1304): pid=5483 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 May 17 01:07:27.882000 audit[5483]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd10be9c0 a2=3 a3=1 items=0 ppid=1 pid=5483 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:07:27.947487 kernel: audit: type=1300 audit(1747444047.882:1304): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd10be9c0 a2=3 a3=1 items=0 ppid=1 pid=5483 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:07:27.950175 systemd[1]: Started session-10.scope. May 17 01:07:27.951100 systemd-logind[1440]: New session 10 of user core. May 17 01:07:27.882000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 01:07:27.964652 kernel: audit: type=1327 audit(1747444047.882:1304): proctitle=737368643A20636F7265205B707269765D May 17 01:07:27.964000 audit[5483]: USER_START pid=5483 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:07:27.965000 audit[5492]: CRED_ACQ pid=5492 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:07:28.016455 kernel: audit: type=1105 audit(1747444047.964:1305): pid=5483 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:07:28.016614 kernel: audit: type=1103 audit(1747444047.965:1306): pid=5492 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:07:28.366012 sshd[5483]: pam_unix(sshd:session): session closed for user core May 17 01:07:28.365000 audit[5483]: USER_END pid=5483 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:07:28.395320 systemd-logind[1440]: Session 10 logged out. Waiting for processes to exit. May 17 01:07:28.396437 systemd[1]: session-10.scope: Deactivated successfully. May 17 01:07:28.397493 systemd-logind[1440]: Removed session 10. May 17 01:07:28.398028 systemd[1]: sshd@7-10.200.20.11:22-10.200.16.10:40016.service: Deactivated successfully. May 17 01:07:28.366000 audit[5483]: CRED_DISP pid=5483 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:07:28.432041 kernel: audit: type=1106 audit(1747444048.365:1307): pid=5483 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:07:28.432142 kernel: audit: type=1104 audit(1747444048.366:1308): pid=5483 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:07:28.397000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.20.11:22-10.200.16.10:40016 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:07:30.340762 systemd[1]: run-containerd-runc-k8s.io-96108ddebfbacf09ebf988c2935cb82538e0fa2ad63784d0abfa3728fb4f9143-runc.ADu8VH.mount: Deactivated successfully. May 17 01:07:32.403326 systemd[1]: run-containerd-runc-k8s.io-4fbf99a208adc0400b6cc87cc6e826f35edf1f10d7a48fdcc4ae74d6ba450ab9-runc.CnctXL.mount: Deactivated successfully. May 17 01:07:33.445927 systemd[1]: Started sshd@8-10.200.20.11:22-10.200.16.10:40712.service. May 17 01:07:33.445000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.20.11:22-10.200.16.10:40712 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:07:33.451754 kernel: kauditd_printk_skb: 1 callbacks suppressed May 17 01:07:33.451857 kernel: audit: type=1130 audit(1747444053.445:1310): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.20.11:22-10.200.16.10:40712 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:07:33.953000 audit[5544]: USER_ACCT pid=5544 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:07:33.955738 sshd[5544]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 01:07:33.967463 sshd[5544]: Accepted publickey for core from 10.200.16.10 port 40712 ssh2: RSA SHA256:x3d6fk4o7Gi9e3Ae36hiTT61fdQx083j9gAothd9hI4 May 17 01:07:33.953000 audit[5544]: CRED_ACQ pid=5544 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:07:34.001428 kernel: audit: type=1101 audit(1747444053.953:1311): pid=5544 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:07:34.001541 kernel: audit: type=1103 audit(1747444053.953:1312): pid=5544 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:07:34.006225 systemd[1]: Started session-11.scope. May 17 01:07:34.007409 systemd-logind[1440]: New session 11 of user core. May 17 01:07:34.018205 kernel: audit: type=1006 audit(1747444053.953:1313): pid=5544 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 May 17 01:07:33.953000 audit[5544]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff33397c0 a2=3 a3=1 items=0 ppid=1 pid=5544 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:07:34.042916 kernel: audit: type=1300 audit(1747444053.953:1313): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff33397c0 a2=3 a3=1 items=0 ppid=1 pid=5544 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:07:33.953000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 01:07:34.051640 kernel: audit: type=1327 audit(1747444053.953:1313): proctitle=737368643A20636F7265205B707269765D May 17 01:07:34.042000 audit[5544]: USER_START pid=5544 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:07:34.078213 kernel: audit: type=1105 audit(1747444054.042:1314): pid=5544 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:07:34.051000 audit[5546]: CRED_ACQ pid=5546 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:07:34.100233 kernel: audit: type=1103 audit(1747444054.051:1315): pid=5546 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:07:34.387662 sshd[5544]: pam_unix(sshd:session): session closed for user core May 17 01:07:34.387000 audit[5544]: USER_END pid=5544 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:07:34.390500 systemd-logind[1440]: Session 11 logged out. Waiting for processes to exit. May 17 01:07:34.391889 systemd[1]: sshd@8-10.200.20.11:22-10.200.16.10:40712.service: Deactivated successfully. May 17 01:07:34.392712 systemd[1]: session-11.scope: Deactivated successfully. May 17 01:07:34.394117 systemd-logind[1440]: Removed session 11. May 17 01:07:34.387000 audit[5544]: CRED_DISP pid=5544 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:07:34.438014 kernel: audit: type=1106 audit(1747444054.387:1316): pid=5544 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:07:34.438125 kernel: audit: type=1104 audit(1747444054.387:1317): pid=5544 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:07:34.391000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.20.11:22-10.200.16.10:40712 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:07:37.121306 env[1453]: time="2025-05-17T01:07:37.121046156Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\"" May 17 01:07:37.122054 kubelet[2439]: E0517 01:07:37.122013 2439 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-7dd859898d-fckds" podUID="e6dfc9d9-b9da-4002-976e-1b3ffcb7dc07" May 17 01:07:37.337521 env[1453]: time="2025-05-17T01:07:37.337201352Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 01:07:37.345942 env[1453]: time="2025-05-17T01:07:37.345837302Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 01:07:37.346261 kubelet[2439]: E0517 01:07:37.346204 2439 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 01:07:37.346337 kubelet[2439]: E0517 01:07:37.346270 2439 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 01:07:37.346478 kubelet[2439]: E0517 01:07:37.346421 2439 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-5c46r,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-78d55f7ddc-5zbrn_calico-system(03203f23-8aa4-41b1-ba45-7088ffc7359f): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 01:07:37.347550 kubelet[2439]: E0517 01:07:37.347521 2439 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-5zbrn" podUID="03203f23-8aa4-41b1-ba45-7088ffc7359f" May 17 01:07:39.464949 systemd[1]: Started sshd@9-10.200.20.11:22-10.200.16.10:44776.service. May 17 01:07:39.464000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.20.11:22-10.200.16.10:44776 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:07:39.472816 kernel: kauditd_printk_skb: 1 callbacks suppressed May 17 01:07:39.472885 kernel: audit: type=1130 audit(1747444059.464:1319): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.20.11:22-10.200.16.10:44776 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:07:39.909000 audit[5557]: USER_ACCT pid=5557 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:07:39.910618 sshd[5557]: Accepted publickey for core from 10.200.16.10 port 44776 ssh2: RSA SHA256:x3d6fk4o7Gi9e3Ae36hiTT61fdQx083j9gAothd9hI4 May 17 01:07:39.934000 audit[5557]: CRED_ACQ pid=5557 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:07:39.936226 sshd[5557]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 01:07:39.957508 kernel: audit: type=1101 audit(1747444059.909:1320): pid=5557 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:07:39.958063 kernel: audit: type=1103 audit(1747444059.934:1321): pid=5557 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:07:39.971996 kernel: audit: type=1006 audit(1747444059.934:1322): pid=5557 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 May 17 01:07:39.934000 audit[5557]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdc543de0 a2=3 a3=1 items=0 ppid=1 pid=5557 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:07:39.995209 kernel: audit: type=1300 audit(1747444059.934:1322): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdc543de0 a2=3 a3=1 items=0 ppid=1 pid=5557 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:07:39.934000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 01:07:40.003690 kernel: audit: type=1327 audit(1747444059.934:1322): proctitle=737368643A20636F7265205B707269765D May 17 01:07:40.004535 systemd-logind[1440]: New session 12 of user core. May 17 01:07:40.004927 systemd[1]: Started session-12.scope. May 17 01:07:40.008000 audit[5557]: USER_START pid=5557 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:07:40.035000 audit[5561]: CRED_ACQ pid=5561 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:07:40.057514 kernel: audit: type=1105 audit(1747444060.008:1323): pid=5557 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:07:40.057616 kernel: audit: type=1103 audit(1747444060.035:1324): pid=5561 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:07:40.355252 sshd[5557]: pam_unix(sshd:session): session closed for user core May 17 01:07:40.355000 audit[5557]: USER_END pid=5557 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:07:40.358383 systemd[1]: session-12.scope: Deactivated successfully. May 17 01:07:40.359133 systemd[1]: sshd@9-10.200.20.11:22-10.200.16.10:44776.service: Deactivated successfully. May 17 01:07:40.405439 kernel: audit: type=1106 audit(1747444060.355:1325): pid=5557 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:07:40.405576 kernel: audit: type=1104 audit(1747444060.356:1326): pid=5557 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:07:40.356000 audit[5557]: CRED_DISP pid=5557 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:07:40.408021 systemd-logind[1440]: Session 12 logged out. Waiting for processes to exit. May 17 01:07:40.410523 systemd-logind[1440]: Removed session 12. May 17 01:07:40.358000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.20.11:22-10.200.16.10:44776 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:07:40.435522 systemd[1]: Started sshd@10-10.200.20.11:22-10.200.16.10:44780.service. May 17 01:07:40.434000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.20.11:22-10.200.16.10:44780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:07:40.916000 audit[5571]: USER_ACCT pid=5571 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:07:40.918064 sshd[5571]: Accepted publickey for core from 10.200.16.10 port 44780 ssh2: RSA SHA256:x3d6fk4o7Gi9e3Ae36hiTT61fdQx083j9gAothd9hI4 May 17 01:07:40.918000 audit[5571]: CRED_ACQ pid=5571 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:07:40.918000 audit[5571]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe1869e60 a2=3 a3=1 items=0 ppid=1 pid=5571 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:07:40.918000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 01:07:40.919705 sshd[5571]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 01:07:40.923293 systemd-logind[1440]: New session 13 of user core. May 17 01:07:40.924216 systemd[1]: Started session-13.scope. May 17 01:07:40.927000 audit[5571]: USER_START pid=5571 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:07:40.929000 audit[5573]: CRED_ACQ pid=5573 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:07:41.378821 sshd[5571]: pam_unix(sshd:session): session closed for user core May 17 01:07:41.379000 audit[5571]: USER_END pid=5571 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:07:41.379000 audit[5571]: CRED_DISP pid=5571 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:07:41.382048 systemd[1]: sshd@10-10.200.20.11:22-10.200.16.10:44780.service: Deactivated successfully. May 17 01:07:41.381000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.20.11:22-10.200.16.10:44780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:07:41.382839 systemd[1]: session-13.scope: Deactivated successfully. May 17 01:07:41.383513 systemd-logind[1440]: Session 13 logged out. Waiting for processes to exit. May 17 01:07:41.384589 systemd-logind[1440]: Removed session 13. May 17 01:07:41.457413 systemd[1]: Started sshd@11-10.200.20.11:22-10.200.16.10:44792.service. May 17 01:07:41.456000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.20.11:22-10.200.16.10:44792 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:07:41.937000 audit[5581]: USER_ACCT pid=5581 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:07:41.938850 sshd[5581]: Accepted publickey for core from 10.200.16.10 port 44792 ssh2: RSA SHA256:x3d6fk4o7Gi9e3Ae36hiTT61fdQx083j9gAothd9hI4 May 17 01:07:41.939000 audit[5581]: CRED_ACQ pid=5581 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:07:41.939000 audit[5581]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdbf66640 a2=3 a3=1 items=0 ppid=1 pid=5581 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:07:41.939000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 01:07:41.940426 sshd[5581]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 01:07:41.944208 systemd-logind[1440]: New session 14 of user core. May 17 01:07:41.945238 systemd[1]: Started session-14.scope. May 17 01:07:41.949000 audit[5581]: USER_START pid=5581 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:07:41.950000 audit[5583]: CRED_ACQ pid=5583 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:07:42.354819 sshd[5581]: pam_unix(sshd:session): session closed for user core May 17 01:07:42.354000 audit[5581]: USER_END pid=5581 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:07:42.354000 audit[5581]: CRED_DISP pid=5581 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:07:42.357779 systemd-logind[1440]: Session 14 logged out. Waiting for processes to exit. May 17 01:07:42.357965 systemd[1]: session-14.scope: Deactivated successfully. May 17 01:07:42.358914 systemd-logind[1440]: Removed session 14. May 17 01:07:42.359221 systemd[1]: sshd@11-10.200.20.11:22-10.200.16.10:44792.service: Deactivated successfully. May 17 01:07:42.358000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.20.11:22-10.200.16.10:44792 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:07:47.466085 kernel: kauditd_printk_skb: 23 callbacks suppressed May 17 01:07:47.466212 kernel: audit: type=1130 audit(1747444067.437:1346): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.20.11:22-10.200.16.10:44798 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:07:47.437000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.20.11:22-10.200.16.10:44798 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:07:47.438079 systemd[1]: Started sshd@12-10.200.20.11:22-10.200.16.10:44798.service. May 17 01:07:47.924000 audit[5593]: USER_ACCT pid=5593 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:07:47.925488 sshd[5593]: Accepted publickey for core from 10.200.16.10 port 44798 ssh2: RSA SHA256:x3d6fk4o7Gi9e3Ae36hiTT61fdQx083j9gAothd9hI4 May 17 01:07:47.927468 sshd[5593]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 01:07:47.926000 audit[5593]: CRED_ACQ pid=5593 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:07:47.971492 kernel: audit: type=1101 audit(1747444067.924:1347): pid=5593 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:07:47.971630 kernel: audit: type=1103 audit(1747444067.926:1348): pid=5593 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:07:47.987140 kernel: audit: type=1006 audit(1747444067.926:1349): pid=5593 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 May 17 01:07:47.926000 audit[5593]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff4f6df50 a2=3 a3=1 items=0 ppid=1 pid=5593 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:07:48.010723 kernel: audit: type=1300 audit(1747444067.926:1349): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff4f6df50 a2=3 a3=1 items=0 ppid=1 pid=5593 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:07:47.926000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 01:07:48.019593 kernel: audit: type=1327 audit(1747444067.926:1349): proctitle=737368643A20636F7265205B707269765D May 17 01:07:48.023649 systemd[1]: Started session-15.scope. May 17 01:07:48.024004 systemd-logind[1440]: New session 15 of user core. May 17 01:07:48.027000 audit[5593]: USER_START pid=5593 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:07:48.055973 kernel: audit: type=1105 audit(1747444068.027:1350): pid=5593 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:07:48.055000 audit[5595]: CRED_ACQ pid=5595 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:07:48.078965 kernel: audit: type=1103 audit(1747444068.055:1351): pid=5595 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:07:48.122585 kubelet[2439]: E0517 01:07:48.122313 2439 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-7dd859898d-fckds" podUID="e6dfc9d9-b9da-4002-976e-1b3ffcb7dc07" May 17 01:07:48.396921 sshd[5593]: pam_unix(sshd:session): session closed for user core May 17 01:07:48.397000 audit[5593]: USER_END pid=5593 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:07:48.425249 systemd[1]: sshd@12-10.200.20.11:22-10.200.16.10:44798.service: Deactivated successfully. May 17 01:07:48.397000 audit[5593]: CRED_DISP pid=5593 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:07:48.426028 kernel: audit: type=1106 audit(1747444068.397:1352): pid=5593 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:07:48.426117 systemd[1]: session-15.scope: Deactivated successfully. May 17 01:07:48.424000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.20.11:22-10.200.16.10:44798 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:07:48.448601 systemd-logind[1440]: Session 15 logged out. Waiting for processes to exit. May 17 01:07:48.449045 kernel: audit: type=1104 audit(1747444068.397:1353): pid=5593 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:07:48.449778 systemd-logind[1440]: Removed session 15. May 17 01:07:50.174242 systemd[1]: run-containerd-runc-k8s.io-4fbf99a208adc0400b6cc87cc6e826f35edf1f10d7a48fdcc4ae74d6ba450ab9-runc.Cxdbjr.mount: Deactivated successfully. May 17 01:07:51.121908 kubelet[2439]: E0517 01:07:51.121870 2439 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-5zbrn" podUID="03203f23-8aa4-41b1-ba45-7088ffc7359f" May 17 01:07:53.500239 kernel: kauditd_printk_skb: 1 callbacks suppressed May 17 01:07:53.500392 kernel: audit: type=1130 audit(1747444073.470:1355): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.20.11:22-10.200.16.10:48942 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:07:53.470000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.20.11:22-10.200.16.10:48942 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:07:53.471771 systemd[1]: Started sshd@13-10.200.20.11:22-10.200.16.10:48942.service. May 17 01:07:53.918000 audit[5625]: USER_ACCT pid=5625 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:07:53.919708 sshd[5625]: Accepted publickey for core from 10.200.16.10 port 48942 ssh2: RSA SHA256:x3d6fk4o7Gi9e3Ae36hiTT61fdQx083j9gAothd9hI4 May 17 01:07:53.921536 sshd[5625]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 01:07:53.920000 audit[5625]: CRED_ACQ pid=5625 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:07:53.966406 kernel: audit: type=1101 audit(1747444073.918:1356): pid=5625 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:07:53.966532 kernel: audit: type=1103 audit(1747444073.920:1357): pid=5625 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:07:53.981640 kernel: audit: type=1006 audit(1747444073.920:1358): pid=5625 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 May 17 01:07:53.920000 audit[5625]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffed65f2a0 a2=3 a3=1 items=0 ppid=1 pid=5625 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:07:54.007049 kernel: audit: type=1300 audit(1747444073.920:1358): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffed65f2a0 a2=3 a3=1 items=0 ppid=1 pid=5625 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:07:53.985254 systemd-logind[1440]: New session 16 of user core. May 17 01:07:54.007431 systemd[1]: Started session-16.scope. May 17 01:07:54.022255 kernel: audit: type=1327 audit(1747444073.920:1358): proctitle=737368643A20636F7265205B707269765D May 17 01:07:53.920000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 01:07:54.022000 audit[5625]: USER_START pid=5625 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:07:54.053062 kernel: audit: type=1105 audit(1747444074.022:1359): pid=5625 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:07:54.023000 audit[5627]: CRED_ACQ pid=5627 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:07:54.079311 kernel: audit: type=1103 audit(1747444074.023:1360): pid=5627 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:07:54.355908 sshd[5625]: pam_unix(sshd:session): session closed for user core May 17 01:07:54.356000 audit[5625]: USER_END pid=5625 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:07:54.365244 systemd-logind[1440]: Session 16 logged out. Waiting for processes to exit. May 17 01:07:54.366595 systemd[1]: session-16.scope: Deactivated successfully. May 17 01:07:54.367800 systemd-logind[1440]: Removed session 16. May 17 01:07:54.368581 systemd[1]: sshd@13-10.200.20.11:22-10.200.16.10:48942.service: Deactivated successfully. May 17 01:07:54.362000 audit[5625]: CRED_DISP pid=5625 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:07:54.406163 kernel: audit: type=1106 audit(1747444074.356:1361): pid=5625 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:07:54.406299 kernel: audit: type=1104 audit(1747444074.362:1362): pid=5625 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:07:54.367000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.20.11:22-10.200.16.10:48942 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:07:58.993984 kernel: kauditd_printk_skb: 1 callbacks suppressed May 17 01:07:58.994111 kernel: audit: type=1400 audit(1747444078.987:1364): avc: denied { watch } for pid=2310 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c618,c658 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:07:58.987000 audit[2310]: AVC avc: denied { watch } for pid=2310 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c618,c658 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:07:58.987000 audit[2310]: AVC avc: denied { watch } for pid=2310 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c618,c658 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:07:58.987000 audit[2310]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4001e2c060 a2=fc6 a3=0 items=0 ppid=2177 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c618,c658 key=(null) May 17 01:07:59.050139 kernel: audit: type=1400 audit(1747444078.987:1365): avc: denied { watch } for pid=2310 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c618,c658 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:07:58.987000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 01:07:59.097155 kernel: audit: type=1300 audit(1747444078.987:1365): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4001e2c060 a2=fc6 a3=0 items=0 ppid=2177 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c618,c658 key=(null) May 17 01:07:58.987000 audit[2310]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002bb71a0 a2=fc6 a3=0 items=0 ppid=2177 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c618,c658 key=(null) May 17 01:07:59.163672 kernel: audit: type=1327 audit(1747444078.987:1365): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 01:07:59.163813 kernel: audit: type=1300 audit(1747444078.987:1364): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002bb71a0 a2=fc6 a3=0 items=0 ppid=2177 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c618,c658 key=(null) May 17 01:07:58.987000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 01:07:59.193924 kernel: audit: type=1327 audit(1747444078.987:1364): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 01:07:59.438622 systemd[1]: Started sshd@14-10.200.20.11:22-10.200.16.10:60544.service. May 17 01:07:59.437000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.20.11:22-10.200.16.10:60544 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:07:59.496536 kernel: audit: type=1130 audit(1747444079.437:1366): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.20.11:22-10.200.16.10:60544 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:07:59.496679 kernel: audit: type=1400 audit(1747444079.462:1367): avc: denied { watch } for pid=2252 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c429,c763 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:07:59.462000 audit[2252]: AVC avc: denied { watch } for pid=2252 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c429,c763 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:07:59.462000 audit[2252]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7a a1=400440ee80 a2=fc6 a3=0 items=0 ppid=2126 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c429,c763 key=(null) May 17 01:07:59.529403 kernel: audit: type=1300 audit(1747444079.462:1367): arch=c00000b7 syscall=27 success=no exit=-13 a0=7a a1=400440ee80 a2=fc6 a3=0 items=0 ppid=2126 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c429,c763 key=(null) May 17 01:07:59.462000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 01:07:59.560631 kernel: audit: type=1327 audit(1747444079.462:1367): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 01:07:59.464000 audit[2252]: AVC avc: denied { watch } for pid=2252 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c429,c763 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:07:59.464000 audit[2252]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7a a1=4011276000 a2=fc6 a3=0 items=0 ppid=2126 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c429,c763 key=(null) May 17 01:07:59.464000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 01:07:59.465000 audit[2252]: AVC avc: denied { watch } for pid=2252 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c429,c763 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:07:59.465000 audit[2252]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7a a1=4009670cc0 a2=fc6 a3=0 items=0 ppid=2126 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c429,c763 key=(null) May 17 01:07:59.465000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 01:07:59.469000 audit[2252]: AVC avc: denied { watch } for pid=2252 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520987 scontext=system_u:system_r:svirt_lxc_net_t:s0:c429,c763 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:07:59.469000 audit[2252]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7a a1=4009670d80 a2=fc6 a3=0 items=0 ppid=2126 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c429,c763 key=(null) May 17 01:07:59.469000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 01:07:59.496000 audit[2252]: AVC avc: denied { watch } for pid=2252 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c429,c763 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:07:59.496000 audit[2252]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7a a1=400440f2a0 a2=fc6 a3=0 items=0 ppid=2126 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c429,c763 key=(null) May 17 01:07:59.496000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 01:07:59.496000 audit[2252]: AVC avc: denied { watch } for pid=2252 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c429,c763 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:07:59.496000 audit[2252]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7a a1=4009671050 a2=fc6 a3=0 items=0 ppid=2126 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c429,c763 key=(null) May 17 01:07:59.496000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 17 01:07:59.941000 audit[5643]: USER_ACCT pid=5643 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:07:59.942712 sshd[5643]: Accepted publickey for core from 10.200.16.10 port 60544 ssh2: RSA SHA256:x3d6fk4o7Gi9e3Ae36hiTT61fdQx083j9gAothd9hI4 May 17 01:07:59.942000 audit[5643]: CRED_ACQ pid=5643 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:07:59.942000 audit[5643]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc9bdf300 a2=3 a3=1 items=0 ppid=1 pid=5643 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:07:59.942000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 01:07:59.944365 sshd[5643]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 01:07:59.949169 systemd-logind[1440]: New session 17 of user core. May 17 01:07:59.949613 systemd[1]: Started session-17.scope. May 17 01:07:59.953000 audit[5643]: USER_START pid=5643 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:07:59.954000 audit[5645]: CRED_ACQ pid=5645 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:00.352201 systemd[1]: run-containerd-runc-k8s.io-96108ddebfbacf09ebf988c2935cb82538e0fa2ad63784d0abfa3728fb4f9143-runc.Rk8qOd.mount: Deactivated successfully. May 17 01:08:00.378237 sshd[5643]: pam_unix(sshd:session): session closed for user core May 17 01:08:00.379000 audit[5643]: USER_END pid=5643 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:00.379000 audit[5643]: CRED_DISP pid=5643 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:00.381805 systemd[1]: sshd@14-10.200.20.11:22-10.200.16.10:60544.service: Deactivated successfully. May 17 01:08:00.382558 systemd[1]: session-17.scope: Deactivated successfully. May 17 01:08:00.381000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.20.11:22-10.200.16.10:60544 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:08:00.383168 systemd-logind[1440]: Session 17 logged out. Waiting for processes to exit. May 17 01:08:00.383919 systemd-logind[1440]: Removed session 17. May 17 01:08:02.403339 systemd[1]: run-containerd-runc-k8s.io-4fbf99a208adc0400b6cc87cc6e826f35edf1f10d7a48fdcc4ae74d6ba450ab9-runc.JnAKem.mount: Deactivated successfully. May 17 01:08:03.121927 kubelet[2439]: E0517 01:08:03.121888 2439 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-5zbrn" podUID="03203f23-8aa4-41b1-ba45-7088ffc7359f" May 17 01:08:03.124988 kubelet[2439]: E0517 01:08:03.124305 2439 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-7dd859898d-fckds" podUID="e6dfc9d9-b9da-4002-976e-1b3ffcb7dc07" May 17 01:08:05.459000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.20.11:22-10.200.16.10:60556 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:08:05.459954 systemd[1]: Started sshd@15-10.200.20.11:22-10.200.16.10:60556.service. May 17 01:08:05.465453 kernel: kauditd_printk_skb: 25 callbacks suppressed May 17 01:08:05.465547 kernel: audit: type=1130 audit(1747444085.459:1381): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.20.11:22-10.200.16.10:60556 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:08:05.936000 audit[5696]: USER_ACCT pid=5696 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:05.937756 sshd[5696]: Accepted publickey for core from 10.200.16.10 port 60556 ssh2: RSA SHA256:x3d6fk4o7Gi9e3Ae36hiTT61fdQx083j9gAothd9hI4 May 17 01:08:05.939627 sshd[5696]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 01:08:05.938000 audit[5696]: CRED_ACQ pid=5696 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:05.984210 kernel: audit: type=1101 audit(1747444085.936:1382): pid=5696 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:05.984360 kernel: audit: type=1103 audit(1747444085.938:1383): pid=5696 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:05.989399 systemd[1]: Started session-18.scope. May 17 01:08:05.990888 systemd-logind[1440]: New session 18 of user core. May 17 01:08:05.999755 kernel: audit: type=1006 audit(1747444085.938:1384): pid=5696 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 May 17 01:08:05.938000 audit[5696]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff9d7c450 a2=3 a3=1 items=0 ppid=1 pid=5696 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:08:06.025756 kernel: audit: type=1300 audit(1747444085.938:1384): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff9d7c450 a2=3 a3=1 items=0 ppid=1 pid=5696 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:08:05.938000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 01:08:06.035136 kernel: audit: type=1327 audit(1747444085.938:1384): proctitle=737368643A20636F7265205B707269765D May 17 01:08:05.994000 audit[5696]: USER_START pid=5696 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:06.063408 kernel: audit: type=1105 audit(1747444085.994:1385): pid=5696 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:06.063540 kernel: audit: type=1103 audit(1747444085.996:1386): pid=5698 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:05.996000 audit[5698]: CRED_ACQ pid=5698 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:06.363727 sshd[5696]: pam_unix(sshd:session): session closed for user core May 17 01:08:06.364000 audit[5696]: USER_END pid=5696 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:06.367164 systemd[1]: session-18.scope: Deactivated successfully. May 17 01:08:06.367841 systemd[1]: sshd@15-10.200.20.11:22-10.200.16.10:60556.service: Deactivated successfully. May 17 01:08:06.364000 audit[5696]: CRED_DISP pid=5696 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:06.412631 kernel: audit: type=1106 audit(1747444086.364:1387): pid=5696 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:06.412724 kernel: audit: type=1104 audit(1747444086.364:1388): pid=5696 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:06.367000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.20.11:22-10.200.16.10:60556 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:08:06.412806 systemd-logind[1440]: Session 18 logged out. Waiting for processes to exit. May 17 01:08:06.413629 systemd-logind[1440]: Removed session 18. May 17 01:08:07.216000 audit[2310]: AVC avc: denied { watch } for pid=2310 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c618,c658 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:08:07.216000 audit[2310]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001c3cf00 a2=fc6 a3=0 items=0 ppid=2177 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c618,c658 key=(null) May 17 01:08:07.216000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 01:08:07.216000 audit[2310]: AVC avc: denied { watch } for pid=2310 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c618,c658 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:08:07.216000 audit[2310]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4001dcc380 a2=fc6 a3=0 items=0 ppid=2177 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c618,c658 key=(null) May 17 01:08:07.216000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 01:08:07.216000 audit[2310]: AVC avc: denied { watch } for pid=2310 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c618,c658 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:08:07.216000 audit[2310]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4001dcc3c0 a2=fc6 a3=0 items=0 ppid=2177 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c618,c658 key=(null) May 17 01:08:07.216000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 01:08:07.217000 audit[2310]: AVC avc: denied { watch } for pid=2310 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c618,c658 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:08:07.217000 audit[2310]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001c3cf20 a2=fc6 a3=0 items=0 ppid=2177 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c618,c658 key=(null) May 17 01:08:07.217000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 01:08:08.609000 audit[5080]: AVC avc: denied { watch } for pid=5080 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_01_05_43.247640675/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c220,c659 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c220,c659 tclass=file permissive=0 May 17 01:08:08.609000 audit[5080]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40028ce520 a2=fc6 a3=0 items=0 ppid=4308 pid=5080 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c220,c659 key=(null) May 17 01:08:08.609000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 01:08:10.045000 audit[5174]: AVC avc: denied { watch } for pid=5174 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_01_05_43.3059935743/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c241,c599 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c241,c599 tclass=file permissive=0 May 17 01:08:10.045000 audit[5174]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4002b98020 a2=fc6 a3=0 items=0 ppid=4344 pid=5174 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c241,c599 key=(null) May 17 01:08:10.045000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 01:08:11.463000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.20.11:22-10.200.16.10:43704 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:08:11.463891 systemd[1]: Started sshd@16-10.200.20.11:22-10.200.16.10:43704.service. May 17 01:08:11.469055 kernel: kauditd_printk_skb: 19 callbacks suppressed May 17 01:08:11.469159 kernel: audit: type=1130 audit(1747444091.463:1396): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.20.11:22-10.200.16.10:43704 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:08:11.951000 audit[5710]: USER_ACCT pid=5710 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:11.952971 sshd[5710]: Accepted publickey for core from 10.200.16.10 port 43704 ssh2: RSA SHA256:x3d6fk4o7Gi9e3Ae36hiTT61fdQx083j9gAothd9hI4 May 17 01:08:11.980957 kernel: audit: type=1101 audit(1747444091.951:1397): pid=5710 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:11.982584 sshd[5710]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 01:08:11.981000 audit[5710]: CRED_ACQ pid=5710 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:12.022237 kernel: audit: type=1103 audit(1747444091.981:1398): pid=5710 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:12.022353 kernel: audit: type=1006 audit(1747444091.981:1399): pid=5710 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 May 17 01:08:11.981000 audit[5710]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff1d429c0 a2=3 a3=1 items=0 ppid=1 pid=5710 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:08:12.048856 kernel: audit: type=1300 audit(1747444091.981:1399): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff1d429c0 a2=3 a3=1 items=0 ppid=1 pid=5710 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:08:11.981000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 01:08:12.057606 kernel: audit: type=1327 audit(1747444091.981:1399): proctitle=737368643A20636F7265205B707269765D May 17 01:08:12.052610 systemd-logind[1440]: New session 19 of user core. May 17 01:08:12.058330 systemd[1]: Started session-19.scope. May 17 01:08:12.062000 audit[5710]: USER_START pid=5710 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:12.093558 kernel: audit: type=1105 audit(1747444092.062:1400): pid=5710 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:12.091000 audit[5712]: CRED_ACQ pid=5712 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:12.118974 kernel: audit: type=1103 audit(1747444092.091:1401): pid=5712 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:12.437501 sshd[5710]: pam_unix(sshd:session): session closed for user core May 17 01:08:12.438000 audit[5710]: USER_END pid=5710 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:12.441894 systemd-logind[1440]: Session 19 logged out. Waiting for processes to exit. May 17 01:08:12.443141 systemd[1]: session-19.scope: Deactivated successfully. May 17 01:08:12.444405 systemd-logind[1440]: Removed session 19. May 17 01:08:12.445073 systemd[1]: sshd@16-10.200.20.11:22-10.200.16.10:43704.service: Deactivated successfully. May 17 01:08:12.439000 audit[5710]: CRED_DISP pid=5710 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:12.491902 kernel: audit: type=1106 audit(1747444092.438:1402): pid=5710 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:12.492062 kernel: audit: type=1104 audit(1747444092.439:1403): pid=5710 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:12.444000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.20.11:22-10.200.16.10:43704 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:08:12.512107 systemd[1]: Started sshd@17-10.200.20.11:22-10.200.16.10:43706.service. May 17 01:08:12.511000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.20.11:22-10.200.16.10:43706 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:08:12.958000 audit[5721]: USER_ACCT pid=5721 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:12.959338 sshd[5721]: Accepted publickey for core from 10.200.16.10 port 43706 ssh2: RSA SHA256:x3d6fk4o7Gi9e3Ae36hiTT61fdQx083j9gAothd9hI4 May 17 01:08:12.959000 audit[5721]: CRED_ACQ pid=5721 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:12.959000 audit[5721]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdec7d190 a2=3 a3=1 items=0 ppid=1 pid=5721 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:08:12.959000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 01:08:12.961061 sshd[5721]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 01:08:12.965197 systemd-logind[1440]: New session 20 of user core. May 17 01:08:12.965630 systemd[1]: Started session-20.scope. May 17 01:08:12.969000 audit[5721]: USER_START pid=5721 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:12.970000 audit[5723]: CRED_ACQ pid=5723 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:13.492630 sshd[5721]: pam_unix(sshd:session): session closed for user core May 17 01:08:13.492000 audit[5721]: USER_END pid=5721 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:13.492000 audit[5721]: CRED_DISP pid=5721 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:13.495285 systemd-logind[1440]: Session 20 logged out. Waiting for processes to exit. May 17 01:08:13.495464 systemd[1]: sshd@17-10.200.20.11:22-10.200.16.10:43706.service: Deactivated successfully. May 17 01:08:13.494000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.20.11:22-10.200.16.10:43706 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:08:13.496338 systemd[1]: session-20.scope: Deactivated successfully. May 17 01:08:13.497016 systemd-logind[1440]: Removed session 20. May 17 01:08:13.569783 systemd[1]: Started sshd@18-10.200.20.11:22-10.200.16.10:43712.service. May 17 01:08:13.569000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.20.11:22-10.200.16.10:43712 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:08:14.014000 audit[5730]: USER_ACCT pid=5730 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:14.016004 sshd[5730]: Accepted publickey for core from 10.200.16.10 port 43712 ssh2: RSA SHA256:x3d6fk4o7Gi9e3Ae36hiTT61fdQx083j9gAothd9hI4 May 17 01:08:14.016000 audit[5730]: CRED_ACQ pid=5730 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:14.016000 audit[5730]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc7a1b280 a2=3 a3=1 items=0 ppid=1 pid=5730 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:08:14.016000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 01:08:14.017659 sshd[5730]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 01:08:14.022101 systemd[1]: Started session-21.scope. May 17 01:08:14.023229 systemd-logind[1440]: New session 21 of user core. May 17 01:08:14.026000 audit[5730]: USER_START pid=5730 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:14.027000 audit[5732]: CRED_ACQ pid=5732 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:14.120898 kubelet[2439]: E0517 01:08:14.120842 2439 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-5zbrn" podUID="03203f23-8aa4-41b1-ba45-7088ffc7359f" May 17 01:08:15.141000 audit[5742]: NETFILTER_CFG table=filter:137 family=2 entries=24 op=nft_register_rule pid=5742 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:08:15.141000 audit[5742]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=13432 a0=3 a1=ffffeded4d90 a2=0 a3=1 items=0 ppid=2540 pid=5742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:08:15.141000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:08:15.146000 audit[5742]: NETFILTER_CFG table=nat:138 family=2 entries=22 op=nft_register_rule pid=5742 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:08:15.146000 audit[5742]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffeded4d90 a2=0 a3=1 items=0 ppid=2540 pid=5742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:08:15.146000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:08:15.162000 audit[5744]: NETFILTER_CFG table=filter:139 family=2 entries=36 op=nft_register_rule pid=5744 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:08:15.162000 audit[5744]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=13432 a0=3 a1=ffffed8a5540 a2=0 a3=1 items=0 ppid=2540 pid=5744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:08:15.162000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:08:15.166000 audit[5744]: NETFILTER_CFG table=nat:140 family=2 entries=22 op=nft_register_rule pid=5744 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:08:15.166000 audit[5744]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffed8a5540 a2=0 a3=1 items=0 ppid=2540 pid=5744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:08:15.166000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:08:15.225209 sshd[5730]: pam_unix(sshd:session): session closed for user core May 17 01:08:15.226000 audit[5730]: USER_END pid=5730 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:15.226000 audit[5730]: CRED_DISP pid=5730 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:15.227000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.20.11:22-10.200.16.10:43712 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:08:15.228684 systemd[1]: sshd@18-10.200.20.11:22-10.200.16.10:43712.service: Deactivated successfully. May 17 01:08:15.229503 systemd[1]: session-21.scope: Deactivated successfully. May 17 01:08:15.230705 systemd-logind[1440]: Session 21 logged out. Waiting for processes to exit. May 17 01:08:15.231461 systemd-logind[1440]: Removed session 21. May 17 01:08:15.301539 systemd[1]: Started sshd@19-10.200.20.11:22-10.200.16.10:43728.service. May 17 01:08:15.300000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.20.11:22-10.200.16.10:43728 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:08:15.756000 audit[5747]: USER_ACCT pid=5747 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:15.757764 sshd[5747]: Accepted publickey for core from 10.200.16.10 port 43728 ssh2: RSA SHA256:x3d6fk4o7Gi9e3Ae36hiTT61fdQx083j9gAothd9hI4 May 17 01:08:15.758000 audit[5747]: CRED_ACQ pid=5747 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:15.758000 audit[5747]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc61a07e0 a2=3 a3=1 items=0 ppid=1 pid=5747 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:08:15.758000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 01:08:15.759361 sshd[5747]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 01:08:15.763838 systemd[1]: Started session-22.scope. May 17 01:08:15.764986 systemd-logind[1440]: New session 22 of user core. May 17 01:08:15.768000 audit[5747]: USER_START pid=5747 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:15.769000 audit[5749]: CRED_ACQ pid=5749 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:16.266295 sshd[5747]: pam_unix(sshd:session): session closed for user core May 17 01:08:16.266000 audit[5747]: USER_END pid=5747 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:16.266000 audit[5747]: CRED_DISP pid=5747 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:16.268754 systemd[1]: sshd@19-10.200.20.11:22-10.200.16.10:43728.service: Deactivated successfully. May 17 01:08:16.268000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.20.11:22-10.200.16.10:43728 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:08:16.269567 systemd[1]: session-22.scope: Deactivated successfully. May 17 01:08:16.270262 systemd-logind[1440]: Session 22 logged out. Waiting for processes to exit. May 17 01:08:16.271043 systemd-logind[1440]: Removed session 22. May 17 01:08:16.340000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.20.11:22-10.200.16.10:43732 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:08:16.341044 systemd[1]: Started sshd@20-10.200.20.11:22-10.200.16.10:43732.service. May 17 01:08:16.794000 audit[5756]: USER_ACCT pid=5756 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:16.800557 sshd[5756]: Accepted publickey for core from 10.200.16.10 port 43732 ssh2: RSA SHA256:x3d6fk4o7Gi9e3Ae36hiTT61fdQx083j9gAothd9hI4 May 17 01:08:16.801035 kernel: kauditd_printk_skb: 47 callbacks suppressed May 17 01:08:16.801101 kernel: audit: type=1101 audit(1747444096.794:1437): pid=5756 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:16.800427 sshd[5756]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 01:08:16.799000 audit[5756]: CRED_ACQ pid=5756 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:16.846430 kernel: audit: type=1103 audit(1747444096.799:1438): pid=5756 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:16.860852 kernel: audit: type=1006 audit(1747444096.799:1439): pid=5756 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 May 17 01:08:16.799000 audit[5756]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc9499d40 a2=3 a3=1 items=0 ppid=1 pid=5756 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:08:16.864798 systemd-logind[1440]: New session 23 of user core. May 17 01:08:16.886147 kernel: audit: type=1300 audit(1747444096.799:1439): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc9499d40 a2=3 a3=1 items=0 ppid=1 pid=5756 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:08:16.799000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 01:08:16.886982 systemd[1]: Started session-23.scope. May 17 01:08:16.894954 kernel: audit: type=1327 audit(1747444096.799:1439): proctitle=737368643A20636F7265205B707269765D May 17 01:08:16.895000 audit[5756]: USER_START pid=5756 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:16.897000 audit[5759]: CRED_ACQ pid=5759 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:16.924098 kernel: audit: type=1105 audit(1747444096.895:1440): pid=5756 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:16.946035 kernel: audit: type=1103 audit(1747444096.897:1441): pid=5759 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:17.232191 sshd[5756]: pam_unix(sshd:session): session closed for user core May 17 01:08:17.232000 audit[5756]: USER_END pid=5756 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:17.235706 systemd[1]: session-23.scope: Deactivated successfully. May 17 01:08:17.236510 systemd[1]: sshd@20-10.200.20.11:22-10.200.16.10:43732.service: Deactivated successfully. May 17 01:08:17.233000 audit[5756]: CRED_DISP pid=5756 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:17.260609 systemd-logind[1440]: Session 23 logged out. Waiting for processes to exit. May 17 01:08:17.261499 systemd-logind[1440]: Removed session 23. May 17 01:08:17.281506 kernel: audit: type=1106 audit(1747444097.232:1442): pid=5756 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:17.281639 kernel: audit: type=1104 audit(1747444097.233:1443): pid=5756 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:17.235000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.20.11:22-10.200.16.10:43732 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:08:17.303109 kernel: audit: type=1131 audit(1747444097.235:1444): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.20.11:22-10.200.16.10:43732 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:08:18.121608 kubelet[2439]: E0517 01:08:18.121559 2439 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-7dd859898d-fckds" podUID="e6dfc9d9-b9da-4002-976e-1b3ffcb7dc07" May 17 01:08:22.325000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.20.11:22-10.200.16.10:36720 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:08:22.326002 systemd[1]: Started sshd@21-10.200.20.11:22-10.200.16.10:36720.service. May 17 01:08:22.347996 kernel: audit: type=1130 audit(1747444102.325:1445): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.20.11:22-10.200.16.10:36720 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:08:22.805568 sshd[5769]: Accepted publickey for core from 10.200.16.10 port 36720 ssh2: RSA SHA256:x3d6fk4o7Gi9e3Ae36hiTT61fdQx083j9gAothd9hI4 May 17 01:08:22.804000 audit[5769]: USER_ACCT pid=5769 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:22.807534 sshd[5769]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 01:08:22.806000 audit[5769]: CRED_ACQ pid=5769 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:22.837678 systemd[1]: Started session-24.scope. May 17 01:08:22.839165 systemd-logind[1440]: New session 24 of user core. May 17 01:08:22.854008 kernel: audit: type=1101 audit(1747444102.804:1446): pid=5769 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:22.854154 kernel: audit: type=1103 audit(1747444102.806:1447): pid=5769 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:22.868077 kernel: audit: type=1006 audit(1747444102.806:1448): pid=5769 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 May 17 01:08:22.868298 kernel: audit: type=1300 audit(1747444102.806:1448): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc579f050 a2=3 a3=1 items=0 ppid=1 pid=5769 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:08:22.806000 audit[5769]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc579f050 a2=3 a3=1 items=0 ppid=1 pid=5769 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:08:22.806000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 01:08:22.901407 kernel: audit: type=1327 audit(1747444102.806:1448): proctitle=737368643A20636F7265205B707269765D May 17 01:08:22.843000 audit[5769]: USER_START pid=5769 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:22.926617 kernel: audit: type=1105 audit(1747444102.843:1449): pid=5769 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:22.845000 audit[5771]: CRED_ACQ pid=5771 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:22.948562 kernel: audit: type=1103 audit(1747444102.845:1450): pid=5771 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:23.228802 sshd[5769]: pam_unix(sshd:session): session closed for user core May 17 01:08:23.228000 audit[5769]: USER_END pid=5769 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:23.232513 systemd[1]: session-24.scope: Deactivated successfully. May 17 01:08:23.233357 systemd[1]: sshd@21-10.200.20.11:22-10.200.16.10:36720.service: Deactivated successfully. May 17 01:08:23.257332 systemd-logind[1440]: Session 24 logged out. Waiting for processes to exit. May 17 01:08:23.230000 audit[5769]: CRED_DISP pid=5769 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:23.279998 kernel: audit: type=1106 audit(1747444103.228:1451): pid=5769 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:23.280147 kernel: audit: type=1104 audit(1747444103.230:1452): pid=5769 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:23.232000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.20.11:22-10.200.16.10:36720 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:08:23.281471 systemd-logind[1440]: Removed session 24. May 17 01:08:23.514000 audit[5782]: NETFILTER_CFG table=filter:141 family=2 entries=24 op=nft_register_rule pid=5782 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:08:23.514000 audit[5782]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=fffff7c1ff90 a2=0 a3=1 items=0 ppid=2540 pid=5782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:08:23.514000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:08:23.523000 audit[5782]: NETFILTER_CFG table=nat:142 family=2 entries=106 op=nft_register_chain pid=5782 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:08:23.523000 audit[5782]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=49452 a0=3 a1=fffff7c1ff90 a2=0 a3=1 items=0 ppid=2540 pid=5782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:08:23.523000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:08:28.318735 kernel: kauditd_printk_skb: 7 callbacks suppressed May 17 01:08:28.318910 kernel: audit: type=1130 audit(1747444108.306:1456): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.20.11:22-10.200.16.10:36736 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:08:28.306000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.20.11:22-10.200.16.10:36736 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:08:28.307698 systemd[1]: Started sshd@22-10.200.20.11:22-10.200.16.10:36736.service. May 17 01:08:28.763000 audit[5784]: USER_ACCT pid=5784 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:28.764280 sshd[5784]: Accepted publickey for core from 10.200.16.10 port 36736 ssh2: RSA SHA256:x3d6fk4o7Gi9e3Ae36hiTT61fdQx083j9gAothd9hI4 May 17 01:08:28.766163 sshd[5784]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 01:08:28.771232 systemd[1]: Started session-25.scope. May 17 01:08:28.771984 systemd-logind[1440]: New session 25 of user core. May 17 01:08:28.764000 audit[5784]: CRED_ACQ pid=5784 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:28.810870 kernel: audit: type=1101 audit(1747444108.763:1457): pid=5784 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:28.811286 kernel: audit: type=1103 audit(1747444108.764:1458): pid=5784 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:28.825077 kernel: audit: type=1006 audit(1747444108.764:1459): pid=5784 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 May 17 01:08:28.764000 audit[5784]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd85333a0 a2=3 a3=1 items=0 ppid=1 pid=5784 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:08:28.848957 kernel: audit: type=1300 audit(1747444108.764:1459): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd85333a0 a2=3 a3=1 items=0 ppid=1 pid=5784 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:08:28.764000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 01:08:28.856872 kernel: audit: type=1327 audit(1747444108.764:1459): proctitle=737368643A20636F7265205B707269765D May 17 01:08:28.857038 kernel: audit: type=1105 audit(1747444108.776:1460): pid=5784 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:28.776000 audit[5784]: USER_START pid=5784 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:28.777000 audit[5786]: CRED_ACQ pid=5786 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:28.905199 kernel: audit: type=1103 audit(1747444108.777:1461): pid=5786 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:29.122047 kubelet[2439]: E0517 01:08:29.121925 2439 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-5zbrn" podUID="03203f23-8aa4-41b1-ba45-7088ffc7359f" May 17 01:08:29.123315 kubelet[2439]: E0517 01:08:29.123245 2439 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-7dd859898d-fckds" podUID="e6dfc9d9-b9da-4002-976e-1b3ffcb7dc07" May 17 01:08:29.161437 sshd[5784]: pam_unix(sshd:session): session closed for user core May 17 01:08:29.161000 audit[5784]: USER_END pid=5784 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:29.166682 systemd[1]: session-25.scope: Deactivated successfully. May 17 01:08:29.167433 systemd[1]: sshd@22-10.200.20.11:22-10.200.16.10:36736.service: Deactivated successfully. May 17 01:08:29.164000 audit[5784]: CRED_DISP pid=5784 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:29.190633 systemd-logind[1440]: Session 25 logged out. Waiting for processes to exit. May 17 01:08:29.191645 systemd-logind[1440]: Removed session 25. May 17 01:08:29.212209 kernel: audit: type=1106 audit(1747444109.161:1462): pid=5784 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:29.212318 kernel: audit: type=1104 audit(1747444109.164:1463): pid=5784 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:29.166000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.20.11:22-10.200.16.10:36736 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:08:30.347411 systemd[1]: run-containerd-runc-k8s.io-96108ddebfbacf09ebf988c2935cb82538e0fa2ad63784d0abfa3728fb4f9143-runc.kJngDm.mount: Deactivated successfully. May 17 01:08:32.412852 systemd[1]: run-containerd-runc-k8s.io-4fbf99a208adc0400b6cc87cc6e826f35edf1f10d7a48fdcc4ae74d6ba450ab9-runc.Qnb08g.mount: Deactivated successfully. May 17 01:08:34.235000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.20.11:22-10.200.16.10:38170 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:08:34.237711 systemd[1]: Started sshd@23-10.200.20.11:22-10.200.16.10:38170.service. May 17 01:08:34.245094 kernel: kauditd_printk_skb: 1 callbacks suppressed May 17 01:08:34.245316 kernel: audit: type=1130 audit(1747444114.235:1465): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.20.11:22-10.200.16.10:38170 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:08:34.712152 sshd[5839]: Accepted publickey for core from 10.200.16.10 port 38170 ssh2: RSA SHA256:x3d6fk4o7Gi9e3Ae36hiTT61fdQx083j9gAothd9hI4 May 17 01:08:34.710000 audit[5839]: USER_ACCT pid=5839 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:34.724587 sshd[5839]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 01:08:34.730829 systemd[1]: Started session-26.scope. May 17 01:08:34.732042 systemd-logind[1440]: New session 26 of user core. May 17 01:08:34.722000 audit[5839]: CRED_ACQ pid=5839 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:34.760256 kernel: audit: type=1101 audit(1747444114.710:1466): pid=5839 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:34.760395 kernel: audit: type=1103 audit(1747444114.722:1467): pid=5839 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:34.774655 kernel: audit: type=1006 audit(1747444114.722:1468): pid=5839 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 May 17 01:08:34.722000 audit[5839]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffcb76af0 a2=3 a3=1 items=0 ppid=1 pid=5839 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:08:34.799229 kernel: audit: type=1300 audit(1747444114.722:1468): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffcb76af0 a2=3 a3=1 items=0 ppid=1 pid=5839 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:08:34.722000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 01:08:34.808091 kernel: audit: type=1327 audit(1747444114.722:1468): proctitle=737368643A20636F7265205B707269765D May 17 01:08:34.735000 audit[5839]: USER_START pid=5839 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:34.833728 kernel: audit: type=1105 audit(1747444114.735:1469): pid=5839 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:34.742000 audit[5843]: CRED_ACQ pid=5843 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:34.855542 kernel: audit: type=1103 audit(1747444114.742:1470): pid=5843 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:35.132974 sshd[5839]: pam_unix(sshd:session): session closed for user core May 17 01:08:35.132000 audit[5839]: USER_END pid=5839 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:35.136312 systemd-logind[1440]: Session 26 logged out. Waiting for processes to exit. May 17 01:08:35.137659 systemd[1]: session-26.scope: Deactivated successfully. May 17 01:08:35.138794 systemd-logind[1440]: Removed session 26. May 17 01:08:35.139461 systemd[1]: sshd@23-10.200.20.11:22-10.200.16.10:38170.service: Deactivated successfully. May 17 01:08:35.132000 audit[5839]: CRED_DISP pid=5839 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:35.181098 kernel: audit: type=1106 audit(1747444115.132:1471): pid=5839 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:35.181256 kernel: audit: type=1104 audit(1747444115.132:1472): pid=5839 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:35.137000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.20.11:22-10.200.16.10:38170 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:08:40.207847 systemd[1]: Started sshd@24-10.200.20.11:22-10.200.16.10:39482.service. May 17 01:08:40.235586 kernel: kauditd_printk_skb: 1 callbacks suppressed May 17 01:08:40.235708 kernel: audit: type=1130 audit(1747444120.206:1474): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.20.11:22-10.200.16.10:39482 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:08:40.206000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.20.11:22-10.200.16.10:39482 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:08:40.651000 audit[5863]: USER_ACCT pid=5863 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:40.654634 sshd[5863]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 01:08:40.655560 sshd[5863]: Accepted publickey for core from 10.200.16.10 port 39482 ssh2: RSA SHA256:x3d6fk4o7Gi9e3Ae36hiTT61fdQx083j9gAothd9hI4 May 17 01:08:40.652000 audit[5863]: CRED_ACQ pid=5863 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:40.699586 kernel: audit: type=1101 audit(1747444120.651:1475): pid=5863 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:40.699732 kernel: audit: type=1103 audit(1747444120.652:1476): pid=5863 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:40.714008 kernel: audit: type=1006 audit(1747444120.652:1477): pid=5863 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 May 17 01:08:40.652000 audit[5863]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdefa08f0 a2=3 a3=1 items=0 ppid=1 pid=5863 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:08:40.738154 kernel: audit: type=1300 audit(1747444120.652:1477): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdefa08f0 a2=3 a3=1 items=0 ppid=1 pid=5863 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:08:40.652000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 01:08:40.746414 kernel: audit: type=1327 audit(1747444120.652:1477): proctitle=737368643A20636F7265205B707269765D May 17 01:08:40.746819 systemd-logind[1440]: New session 27 of user core. May 17 01:08:40.747974 systemd[1]: Started session-27.scope. May 17 01:08:40.750000 audit[5863]: USER_START pid=5863 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:40.777000 audit[5865]: CRED_ACQ pid=5865 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:40.800623 kernel: audit: type=1105 audit(1747444120.750:1478): pid=5863 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:40.800738 kernel: audit: type=1103 audit(1747444120.777:1479): pid=5865 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:41.106774 sshd[5863]: pam_unix(sshd:session): session closed for user core May 17 01:08:41.106000 audit[5863]: USER_END pid=5863 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:41.110020 systemd[1]: sshd@24-10.200.20.11:22-10.200.16.10:39482.service: Deactivated successfully. May 17 01:08:41.110829 systemd[1]: session-27.scope: Deactivated successfully. May 17 01:08:41.106000 audit[5863]: CRED_DISP pid=5863 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:41.135111 kernel: audit: type=1106 audit(1747444121.106:1480): pid=5863 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:41.134993 systemd-logind[1440]: Session 27 logged out. Waiting for processes to exit. May 17 01:08:41.157950 kernel: audit: type=1104 audit(1747444121.106:1481): pid=5863 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:41.106000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.20.11:22-10.200.16.10:39482 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:08:41.158327 systemd-logind[1440]: Removed session 27. May 17 01:08:41.161754 kubelet[2439]: E0517 01:08:41.161622 2439 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-5zbrn" podUID="03203f23-8aa4-41b1-ba45-7088ffc7359f" May 17 01:08:41.163981 kubelet[2439]: E0517 01:08:41.163370 2439 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-7dd859898d-fckds" podUID="e6dfc9d9-b9da-4002-976e-1b3ffcb7dc07" May 17 01:08:46.208032 kernel: kauditd_printk_skb: 1 callbacks suppressed May 17 01:08:46.208296 kernel: audit: type=1130 audit(1747444126.181:1483): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.20.11:22-10.200.16.10:39490 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:08:46.181000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.20.11:22-10.200.16.10:39490 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:08:46.182219 systemd[1]: Started sshd@25-10.200.20.11:22-10.200.16.10:39490.service. May 17 01:08:46.631000 audit[5875]: USER_ACCT pid=5875 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:46.632901 sshd[5875]: Accepted publickey for core from 10.200.16.10 port 39490 ssh2: RSA SHA256:x3d6fk4o7Gi9e3Ae36hiTT61fdQx083j9gAothd9hI4 May 17 01:08:46.634817 sshd[5875]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 01:08:46.633000 audit[5875]: CRED_ACQ pid=5875 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:46.660395 systemd-logind[1440]: New session 28 of user core. May 17 01:08:46.660993 systemd[1]: Started session-28.scope. May 17 01:08:46.679208 kernel: audit: type=1101 audit(1747444126.631:1484): pid=5875 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:46.679515 kernel: audit: type=1103 audit(1747444126.633:1485): pid=5875 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:46.694007 kernel: audit: type=1006 audit(1747444126.633:1486): pid=5875 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=28 res=1 May 17 01:08:46.694111 kernel: audit: type=1300 audit(1747444126.633:1486): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcb3b4760 a2=3 a3=1 items=0 ppid=1 pid=5875 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:08:46.633000 audit[5875]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcb3b4760 a2=3 a3=1 items=0 ppid=1 pid=5875 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:08:46.633000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 01:08:46.726059 kernel: audit: type=1327 audit(1747444126.633:1486): proctitle=737368643A20636F7265205B707269765D May 17 01:08:46.726207 kernel: audit: type=1105 audit(1747444126.665:1487): pid=5875 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:46.665000 audit[5875]: USER_START pid=5875 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:46.666000 audit[5877]: CRED_ACQ pid=5877 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:46.773181 kernel: audit: type=1103 audit(1747444126.666:1488): pid=5877 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:47.050429 sshd[5875]: pam_unix(sshd:session): session closed for user core May 17 01:08:47.050000 audit[5875]: USER_END pid=5875 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:47.054054 systemd[1]: session-28.scope: Deactivated successfully. May 17 01:08:47.054653 systemd[1]: sshd@25-10.200.20.11:22-10.200.16.10:39490.service: Deactivated successfully. May 17 01:08:47.051000 audit[5875]: CRED_DISP pid=5875 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:47.080103 systemd-logind[1440]: Session 28 logged out. Waiting for processes to exit. May 17 01:08:47.100480 kernel: audit: type=1106 audit(1747444127.050:1489): pid=5875 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:47.100633 kernel: audit: type=1104 audit(1747444127.051:1490): pid=5875 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:47.053000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.20.11:22-10.200.16.10:39490 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:08:47.102154 systemd-logind[1440]: Removed session 28. May 17 01:08:52.145307 systemd[1]: Started sshd@26-10.200.20.11:22-10.200.16.10:53010.service. May 17 01:08:52.172754 kernel: kauditd_printk_skb: 1 callbacks suppressed May 17 01:08:52.172901 kernel: audit: type=1130 audit(1747444132.144:1492): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.200.20.11:22-10.200.16.10:53010 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:08:52.144000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.200.20.11:22-10.200.16.10:53010 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:08:52.597000 audit[5906]: USER_ACCT pid=5906 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:52.598562 sshd[5906]: Accepted publickey for core from 10.200.16.10 port 53010 ssh2: RSA SHA256:x3d6fk4o7Gi9e3Ae36hiTT61fdQx083j9gAothd9hI4 May 17 01:08:52.600465 sshd[5906]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 01:08:52.599000 audit[5906]: CRED_ACQ pid=5906 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:52.646646 kernel: audit: type=1101 audit(1747444132.597:1493): pid=5906 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:52.646775 kernel: audit: type=1103 audit(1747444132.599:1494): pid=5906 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:52.661631 kernel: audit: type=1006 audit(1747444132.599:1495): pid=5906 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=29 res=1 May 17 01:08:52.599000 audit[5906]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe0901c30 a2=3 a3=1 items=0 ppid=1 pid=5906 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:08:52.687431 kernel: audit: type=1300 audit(1747444132.599:1495): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe0901c30 a2=3 a3=1 items=0 ppid=1 pid=5906 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:08:52.688039 kernel: audit: type=1327 audit(1747444132.599:1495): proctitle=737368643A20636F7265205B707269765D May 17 01:08:52.599000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 01:08:52.692035 systemd[1]: Started session-29.scope. May 17 01:08:52.693331 systemd-logind[1440]: New session 29 of user core. May 17 01:08:52.696000 audit[5906]: USER_START pid=5906 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:52.726821 kernel: audit: type=1105 audit(1747444132.696:1496): pid=5906 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:52.726981 kernel: audit: type=1103 audit(1747444132.698:1497): pid=5908 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:52.698000 audit[5908]: CRED_ACQ pid=5908 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:53.024747 sshd[5906]: pam_unix(sshd:session): session closed for user core May 17 01:08:53.024000 audit[5906]: USER_END pid=5906 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:53.028089 systemd-logind[1440]: Session 29 logged out. Waiting for processes to exit. May 17 01:08:53.029342 systemd[1]: session-29.scope: Deactivated successfully. May 17 01:08:53.030518 systemd-logind[1440]: Removed session 29. May 17 01:08:53.030984 systemd[1]: sshd@26-10.200.20.11:22-10.200.16.10:53010.service: Deactivated successfully. May 17 01:08:53.025000 audit[5906]: CRED_DISP pid=5906 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:53.077612 kernel: audit: type=1106 audit(1747444133.024:1498): pid=5906 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:53.077762 kernel: audit: type=1104 audit(1747444133.025:1499): pid=5906 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 01:08:53.030000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.200.20.11:22-10.200.16.10:53010 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:08:55.121446 kubelet[2439]: E0517 01:08:55.121403 2439 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-5zbrn" podUID="03203f23-8aa4-41b1-ba45-7088ffc7359f" May 17 01:08:55.122185 env[1453]: time="2025-05-17T01:08:55.122134213Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\"" May 17 01:08:55.304182 env[1453]: time="2025-05-17T01:08:55.304125818Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 01:08:55.308721 env[1453]: time="2025-05-17T01:08:55.308667276Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 01:08:55.309132 kubelet[2439]: E0517 01:08:55.309094 2439 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 01:08:55.309277 kubelet[2439]: E0517 01:08:55.309260 2439 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 01:08:55.309751 kubelet[2439]: E0517 01:08:55.309468 2439 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.0,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:e8f448703ed64084b96c12586cf5068a,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-8h7xc,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-7dd859898d-fckds_calico-system(e6dfc9d9-b9da-4002-976e-1b3ffcb7dc07): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 01:08:55.311958 env[1453]: time="2025-05-17T01:08:55.311913301Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\"" May 17 01:08:55.487115 env[1453]: time="2025-05-17T01:08:55.487059419Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 01:08:55.491919 env[1453]: time="2025-05-17T01:08:55.491868915Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 01:08:55.492354 kubelet[2439]: E0517 01:08:55.492309 2439 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 01:08:55.492499 kubelet[2439]: E0517 01:08:55.492469 2439 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 01:08:55.492735 kubelet[2439]: E0517 01:08:55.492689 2439 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-8h7xc,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-7dd859898d-fckds_calico-system(e6dfc9d9-b9da-4002-976e-1b3ffcb7dc07): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 01:08:55.494016 kubelet[2439]: E0517 01:08:55.493975 2439 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-7dd859898d-fckds" podUID="e6dfc9d9-b9da-4002-976e-1b3ffcb7dc07"